Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-4389 (GCVE-0-2013-4389)
Vulnerability from cvelistv5
Published
2013-10-17 00:00
Modified
2024-08-06 16:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:45:13.235Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-2887",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"name": "openSUSE-SU-2014:0009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "openSUSE-SU-2013:1931",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"name": "openSUSE-SU-2013:1928",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "DSA-2888",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2014/dsa-2888"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-10-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-03-28T12:57:00",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "DSA-2887",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"name": "openSUSE-SU-2014:0009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "openSUSE-SU-2013:1931",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"name": "openSUSE-SU-2013:1928",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "DSA-2888",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2014/dsa-2888"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4389",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-2887",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"name": "openSUSE-SU-2014:0009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "openSUSE-SU-2013:1931",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"name": "openSUSE-SU-2013:1928",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "DSA-2888",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2888"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-4389",
"datePublished": "2013-10-17T00:00:00",
"dateReserved": "2013-06-12T00:00:00",
"dateUpdated": "2024-08-06T16:45:13.235Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2013-4389\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-10-17T00:55:03.320\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidadews de format string en archivos log_subscriber.rb en el componente de suscripci\u00f3n de log de Action Mailer en Ruby on Rails 3.x anterior a 3.2.15 permite a atacantes remotos causar una denegaci\u00f3n de servicio a trav\u00e9s de una direcci\u00f3n de email manipulada que es manejada de manera inapropiada durante la construcci\u00f3n de un mensaje de log.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-134\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.2.15\",\"matchCriteriaId\":\"393CE9B0-AD9B-4A51-AC58-CF10BF115251\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D806A17E-B8F9-466D-807D-3F1E77603DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2887\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2888\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Exploit\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2887\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Exploit\"]}]}}"
}
}
ghsa-rg5m-3fqp-6px8
Vulnerability from github
Published
2017-10-24 18:33
Modified
2023-07-04 00:18
VLAI Severity ?
Summary
actionmailer email address processing causes Denial of service
Details
Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
{
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "actionmailer"
},
"ranges": [
{
"events": [
{
"introduced": "3.0.0"
},
{
"fixed": "3.2.15"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2013-4389"
],
"database_specific": {
"cwe_ids": [
"CWE-134"
],
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:54:42Z",
"nvd_published_at": "2013-10-17T00:55:03Z",
"severity": "MODERATE"
},
"details": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"id": "GHSA-rg5m-3fqp-6px8",
"modified": "2023-07-04T00:18:31Z",
"published": "2017-10-24T18:33:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-rg5m-3fqp-6px8"
},
{
"type": "PACKAGE",
"url": "https://github.com/rails/rails/tree/main/actionmailer"
},
{
"type": "WEB",
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionmailer/CVE-2013-4389.yml"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20201208175929/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2014/dsa-2888"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "actionmailer email address processing causes Denial of service"
}
fkie_cve-2013-4389
Vulnerability from fkie_nvd
Published
2013-10-17 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2014/dsa-2887 | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2014/dsa-2888 | Third Party Advisory | |
| secalert@redhat.com | https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ | Broken Link, Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-2887 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-2888 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ | Broken Link, Exploit |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| rubyonrails | rails | * | |
| opensuse | opensuse | 12.2 | |
| opensuse | opensuse | 12.3 | |
| opensuse | opensuse | 13.1 | |
| debian | debian_linux | 7.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"matchCriteriaId": "393CE9B0-AD9B-4A51-AC58-CF10BF115251",
"versionEndExcluding": "3.2.15",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidadews de format string en archivos log_subscriber.rb en el componente de suscripci\u00f3n de log de Action Mailer en Ruby on Rails 3.x anterior a 3.2.15 permite a atacantes remotos causar una denegaci\u00f3n de servicio a trav\u00e9s de una direcci\u00f3n de email manipulada que es manejada de manera inapropiada durante la construcci\u00f3n de un mensaje de log."
}
],
"id": "CVE-2013-4389",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-10-17T00:55:03.320",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2888"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Exploit"
],
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2888"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Exploit"
],
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-134"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
rhba-2015:1100
Vulnerability from csaf_redhat
Published
2015-06-16 12:28
Modified
2025-10-09 14:41
Summary
Red Hat Bug Fix Advisory: CFME 5.4.0 bug fixes, and enhancement update
Notes
Topic
Updated cfme packages that fix several bugs, and add various enhancements are now available for Red Hat CloudForms 3.2.
Details
Red Hat CloudForms Management Engine delivers the insight, control, and
automation needed to address the challenges of managing virtual
environments. CloudForms Management Engine is built on Ruby on Rails, a
model-view-controller (MVC) framework for web application development.
Action Pack implements the controller and the view components.
This update also fixes several bugs and adds various enhancements.
Documentation for these changes is available in the Release Notes and Technical Notes documents linked to in the References section.
All cfme users are advised to upgrade to these updated packages, which
correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated cfme packages that fix several bugs, and add various enhancements are now available for Red Hat CloudForms 3.2.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat CloudForms Management Engine delivers the insight, control, and\nautomation needed to address the challenges of managing virtual\nenvironments. CloudForms Management Engine is built on Ruby on Rails, a\nmodel-view-controller (MVC) framework for web application development.\nAction Pack implements the controller and the view components.\n\nThis update also fixes several bugs and adds various enhancements.\nDocumentation for these changes is available in the Release Notes and Technical Notes documents linked to in the References section.\n\nAll cfme users are advised to upgrade to these updated packages, which\ncorrect these issues and add these enhancements.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2015:1100",
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/Red_Hat_CloudForms/3.2/html/Release_Notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/Red_Hat_CloudForms/3.2/html/Release_Notes/index.html"
},
{
"category": "external",
"summary": "1146178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146178"
},
{
"category": "external",
"summary": "1160890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1160890"
},
{
"category": "external",
"summary": "1161248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161248"
},
{
"category": "external",
"summary": "1161253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161253"
},
{
"category": "external",
"summary": "1161322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161322"
},
{
"category": "external",
"summary": "1161701",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161701"
},
{
"category": "external",
"summary": "1161744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161744"
},
{
"category": "external",
"summary": "1163382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163382"
},
{
"category": "external",
"summary": "1163465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163465"
},
{
"category": "external",
"summary": "1163468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163468"
},
{
"category": "external",
"summary": "1163469",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163469"
},
{
"category": "external",
"summary": "1163472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163472"
},
{
"category": "external",
"summary": "1163661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163661"
},
{
"category": "external",
"summary": "1163952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163952"
},
{
"category": "external",
"summary": "1163978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163978"
},
{
"category": "external",
"summary": "1164033",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164033"
},
{
"category": "external",
"summary": "1164386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164386"
},
{
"category": "external",
"summary": "1164764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164764"
},
{
"category": "external",
"summary": "1166187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166187"
},
{
"category": "external",
"summary": "1166198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166198"
},
{
"category": "external",
"summary": "1166303",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166303"
},
{
"category": "external",
"summary": "1166328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166328"
},
{
"category": "external",
"summary": "1166861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166861"
},
{
"category": "external",
"summary": "1167110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167110"
},
{
"category": "external",
"summary": "1167308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167308"
},
{
"category": "external",
"summary": "1167410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167410"
},
{
"category": "external",
"summary": "1168337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168337"
},
{
"category": "external",
"summary": "1168345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168345"
},
{
"category": "external",
"summary": "1169351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169351"
},
{
"category": "external",
"summary": "1169502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169502"
},
{
"category": "external",
"summary": "1169930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169930"
},
{
"category": "external",
"summary": "1169937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169937"
},
{
"category": "external",
"summary": "1170319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170319"
},
{
"category": "external",
"summary": "1170358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170358"
},
{
"category": "external",
"summary": "1170813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170813"
},
{
"category": "external",
"summary": "1171167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171167"
},
{
"category": "external",
"summary": "1171286",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171286"
},
{
"category": "external",
"summary": "1171577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171577"
},
{
"category": "external",
"summary": "1171589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171589"
},
{
"category": "external",
"summary": "1171738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171738"
},
{
"category": "external",
"summary": "1171780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171780"
},
{
"category": "external",
"summary": "1172298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172298"
},
{
"category": "external",
"summary": "1173213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173213"
},
{
"category": "external",
"summary": "1173216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173216"
},
{
"category": "external",
"summary": "1173251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173251"
},
{
"category": "external",
"summary": "1173336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173336"
},
{
"category": "external",
"summary": "1173712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173712"
},
{
"category": "external",
"summary": "1174855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174855"
},
{
"category": "external",
"summary": "1174881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174881"
},
{
"category": "external",
"summary": "1176280",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176280"
},
{
"category": "external",
"summary": "1176619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176619"
},
{
"category": "external",
"summary": "1176689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176689"
},
{
"category": "external",
"summary": "1176721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176721"
},
{
"category": "external",
"summary": "1177015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177015"
},
{
"category": "external",
"summary": "1177809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177809"
},
{
"category": "external",
"summary": "1178078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178078"
},
{
"category": "external",
"summary": "1178697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178697"
},
{
"category": "external",
"summary": "1178729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178729"
},
{
"category": "external",
"summary": "1179503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179503"
},
{
"category": "external",
"summary": "1179797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179797"
},
{
"category": "external",
"summary": "1186502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186502"
},
{
"category": "external",
"summary": "1186911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186911"
},
{
"category": "external",
"summary": "1179807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179807"
},
{
"category": "external",
"summary": "1179907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179907"
},
{
"category": "external",
"summary": "1179908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179908"
},
{
"category": "external",
"summary": "1179958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179958"
},
{
"category": "external",
"summary": "1180313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180313"
},
{
"category": "external",
"summary": "1180649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180649"
},
{
"category": "external",
"summary": "1180746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180746"
},
{
"category": "external",
"summary": "1181429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181429"
},
{
"category": "external",
"summary": "1181768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181768"
},
{
"category": "external",
"summary": "1182329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182329"
},
{
"category": "external",
"summary": "1182330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182330"
},
{
"category": "external",
"summary": "1182654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182654"
},
{
"category": "external",
"summary": "1182795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182795"
},
{
"category": "external",
"summary": "1183757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183757"
},
{
"category": "external",
"summary": "1184250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184250"
},
{
"category": "external",
"summary": "1184267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184267"
},
{
"category": "external",
"summary": "1184343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184343"
},
{
"category": "external",
"summary": "1184465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184465"
},
{
"category": "external",
"summary": "1184575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184575"
},
{
"category": "external",
"summary": "1184637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184637"
},
{
"category": "external",
"summary": "1184990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184990"
},
{
"category": "external",
"summary": "1185042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185042"
},
{
"category": "external",
"summary": "1186364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186364"
},
{
"category": "external",
"summary": "1186413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186413"
},
{
"category": "external",
"summary": "1186485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186485"
},
{
"category": "external",
"summary": "1187233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187233"
},
{
"category": "external",
"summary": "1187836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187836"
},
{
"category": "external",
"summary": "1188401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188401"
},
{
"category": "external",
"summary": "1188427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188427"
},
{
"category": "external",
"summary": "1188436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188436"
},
{
"category": "external",
"summary": "1188585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188585"
},
{
"category": "external",
"summary": "1188597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188597"
},
{
"category": "external",
"summary": "1188798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188798"
},
{
"category": "external",
"summary": "1190054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190054"
},
{
"category": "external",
"summary": "1190211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190211"
},
{
"category": "external",
"summary": "1190260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190260"
},
{
"category": "external",
"summary": "1190293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190293"
},
{
"category": "external",
"summary": "1190564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190564"
},
{
"category": "external",
"summary": "1190565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190565"
},
{
"category": "external",
"summary": "1190584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190584"
},
{
"category": "external",
"summary": "1190603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190603"
},
{
"category": "external",
"summary": "1190667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190667"
},
{
"category": "external",
"summary": "1190672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190672"
},
{
"category": "external",
"summary": "1190852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190852"
},
{
"category": "external",
"summary": "1190855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190855"
},
{
"category": "external",
"summary": "1191197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191197"
},
{
"category": "external",
"summary": "1191279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191279"
},
{
"category": "external",
"summary": "1191468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191468"
},
{
"category": "external",
"summary": "1191489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191489"
},
{
"category": "external",
"summary": "1191496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191496"
},
{
"category": "external",
"summary": "1191585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191585"
},
{
"category": "external",
"summary": "1192039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192039"
},
{
"category": "external",
"summary": "1192198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192198"
},
{
"category": "external",
"summary": "1192223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192223"
},
{
"category": "external",
"summary": "1192409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192409"
},
{
"category": "external",
"summary": "1192518",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192518"
},
{
"category": "external",
"summary": "1192562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192562"
},
{
"category": "external",
"summary": "1193183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193183"
},
{
"category": "external",
"summary": "1193522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193522"
},
{
"category": "external",
"summary": "1193615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193615"
},
{
"category": "external",
"summary": "1193847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193847"
},
{
"category": "external",
"summary": "1194223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194223"
},
{
"category": "external",
"summary": "1194242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194242"
},
{
"category": "external",
"summary": "1194319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194319"
},
{
"category": "external",
"summary": "1194479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194479"
},
{
"category": "external",
"summary": "1195407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195407"
},
{
"category": "external",
"summary": "1198814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198814"
},
{
"category": "external",
"summary": "1195754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195754"
},
{
"category": "external",
"summary": "1195832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195832"
},
{
"category": "external",
"summary": "1195877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195877"
},
{
"category": "external",
"summary": "1196369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196369"
},
{
"category": "external",
"summary": "1196384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196384"
},
{
"category": "external",
"summary": "1196851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196851"
},
{
"category": "external",
"summary": "1196852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196852"
},
{
"category": "external",
"summary": "1197067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197067"
},
{
"category": "external",
"summary": "1198111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198111"
},
{
"category": "external",
"summary": "1198594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198594"
},
{
"category": "external",
"summary": "1198735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198735"
},
{
"category": "external",
"summary": "1198867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198867"
},
{
"category": "external",
"summary": "1199240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199240"
},
{
"category": "external",
"summary": "1199915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199915"
},
{
"category": "external",
"summary": "1200424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200424"
},
{
"category": "external",
"summary": "1200601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200601"
},
{
"category": "external",
"summary": "1200757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200757"
},
{
"category": "external",
"summary": "1200783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200783"
},
{
"category": "external",
"summary": "1200854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200854"
},
{
"category": "external",
"summary": "1200925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200925"
},
{
"category": "external",
"summary": "1201092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201092"
},
{
"category": "external",
"summary": "1201093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201093"
},
{
"category": "external",
"summary": "1201097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201097"
},
{
"category": "external",
"summary": "1201132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201132"
},
{
"category": "external",
"summary": "1201137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201137"
},
{
"category": "external",
"summary": "1201140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201140"
},
{
"category": "external",
"summary": "1201378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201378"
},
{
"category": "external",
"summary": "1201383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201383"
},
{
"category": "external",
"summary": "1201531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201531"
},
{
"category": "external",
"summary": "1201684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201684"
},
{
"category": "external",
"summary": "1201716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201716"
},
{
"category": "external",
"summary": "1201720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201720"
},
{
"category": "external",
"summary": "1201751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201751"
},
{
"category": "external",
"summary": "1201771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201771"
},
{
"category": "external",
"summary": "1201883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201883"
},
{
"category": "external",
"summary": "1201920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201920"
},
{
"category": "external",
"summary": "1201932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201932"
},
{
"category": "external",
"summary": "1202195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202195"
},
{
"category": "external",
"summary": "1202216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202216"
},
{
"category": "external",
"summary": "1202229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202229"
},
{
"category": "external",
"summary": "1202394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202394"
},
{
"category": "external",
"summary": "1202412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202412"
},
{
"category": "external",
"summary": "1202415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202415"
},
{
"category": "external",
"summary": "1202427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202427"
},
{
"category": "external",
"summary": "1202465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202465"
},
{
"category": "external",
"summary": "1202478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202478"
},
{
"category": "external",
"summary": "1202491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202491"
},
{
"category": "external",
"summary": "1202543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202543"
},
{
"category": "external",
"summary": "1202648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202648"
},
{
"category": "external",
"summary": "1202655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202655"
},
{
"category": "external",
"summary": "1202660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202660"
},
{
"category": "external",
"summary": "1202681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202681"
},
{
"category": "external",
"summary": "1202816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202816"
},
{
"category": "external",
"summary": "1203003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203003"
},
{
"category": "external",
"summary": "1203168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203168"
},
{
"category": "external",
"summary": "1203184",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203184"
},
{
"category": "external",
"summary": "1203207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203207"
},
{
"category": "external",
"summary": "1203301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203301"
},
{
"category": "external",
"summary": "1203426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203426"
},
{
"category": "external",
"summary": "1203442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203442"
},
{
"category": "external",
"summary": "1203547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203547"
},
{
"category": "external",
"summary": "1203713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203713"
},
{
"category": "external",
"summary": "1204115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204115"
},
{
"category": "external",
"summary": "1204117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204117"
},
{
"category": "external",
"summary": "1204125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204125"
},
{
"category": "external",
"summary": "1204232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204232"
},
{
"category": "external",
"summary": "1204252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204252"
},
{
"category": "external",
"summary": "1204548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204548"
},
{
"category": "external",
"summary": "1204599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204599"
},
{
"category": "external",
"summary": "1204629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204629"
},
{
"category": "external",
"summary": "1204635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204635"
},
{
"category": "external",
"summary": "1204899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204899"
},
{
"category": "external",
"summary": "1204912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204912"
},
{
"category": "external",
"summary": "1204943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204943"
},
{
"category": "external",
"summary": "1205137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205137"
},
{
"category": "external",
"summary": "1205213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205213"
},
{
"category": "external",
"summary": "1205235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205235"
},
{
"category": "external",
"summary": "1205247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205247"
},
{
"category": "external",
"summary": "1205347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205347"
},
{
"category": "external",
"summary": "1205386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205386"
},
{
"category": "external",
"summary": "1205407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205407"
},
{
"category": "external",
"summary": "1205453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205453"
},
{
"category": "external",
"summary": "1205496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205496"
},
{
"category": "external",
"summary": "1205779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205779"
},
{
"category": "external",
"summary": "1205898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205898"
},
{
"category": "external",
"summary": "1205918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205918"
},
{
"category": "external",
"summary": "1205919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205919"
},
{
"category": "external",
"summary": "1205920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205920"
},
{
"category": "external",
"summary": "1206016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206016"
},
{
"category": "external",
"summary": "1206022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206022"
},
{
"category": "external",
"summary": "1206023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206023"
},
{
"category": "external",
"summary": "1206028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206028"
},
{
"category": "external",
"summary": "1206122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206122"
},
{
"category": "external",
"summary": "1206124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206124"
},
{
"category": "external",
"summary": "1206141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206141"
},
{
"category": "external",
"summary": "1206142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206142"
},
{
"category": "external",
"summary": "1206204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206204"
},
{
"category": "external",
"summary": "1206263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206263"
},
{
"category": "external",
"summary": "1206662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206662"
},
{
"category": "external",
"summary": "1206672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206672"
},
{
"category": "external",
"summary": "1206675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206675"
},
{
"category": "external",
"summary": "1206687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206687"
},
{
"category": "external",
"summary": "1206727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206727"
},
{
"category": "external",
"summary": "1206729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206729"
},
{
"category": "external",
"summary": "1207018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207018"
},
{
"category": "external",
"summary": "1207112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207112"
},
{
"category": "external",
"summary": "1207209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207209"
},
{
"category": "external",
"summary": "1207259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207259"
},
{
"category": "external",
"summary": "1207298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207298"
},
{
"category": "external",
"summary": "1207313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207313"
},
{
"category": "external",
"summary": "1207631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207631"
},
{
"category": "external",
"summary": "1207641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207641"
},
{
"category": "external",
"summary": "1207788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207788"
},
{
"category": "external",
"summary": "1207842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207842"
},
{
"category": "external",
"summary": "1207859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207859"
},
{
"category": "external",
"summary": "1207865",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207865"
},
{
"category": "external",
"summary": "1207895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207895"
},
{
"category": "external",
"summary": "1208129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208129"
},
{
"category": "external",
"summary": "1208152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208152"
},
{
"category": "external",
"summary": "1208258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208258"
},
{
"category": "external",
"summary": "1208642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208642"
},
{
"category": "external",
"summary": "1208698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208698"
},
{
"category": "external",
"summary": "1208852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208852"
},
{
"category": "external",
"summary": "1209015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209015"
},
{
"category": "external",
"summary": "1209262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209262"
},
{
"category": "external",
"summary": "1209421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209421"
},
{
"category": "external",
"summary": "1209557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209557"
},
{
"category": "external",
"summary": "1209629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209629"
},
{
"category": "external",
"summary": "1209641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209641"
},
{
"category": "external",
"summary": "1209642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209642"
},
{
"category": "external",
"summary": "1209711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209711"
},
{
"category": "external",
"summary": "1209756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209756"
},
{
"category": "external",
"summary": "1209847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209847"
},
{
"category": "external",
"summary": "1209945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209945"
},
{
"category": "external",
"summary": "1210089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210089"
},
{
"category": "external",
"summary": "1210094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210094"
},
{
"category": "external",
"summary": "1210277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210277"
},
{
"category": "external",
"summary": "1210376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210376"
},
{
"category": "external",
"summary": "1210385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210385"
},
{
"category": "external",
"summary": "1210507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210507"
},
{
"category": "external",
"summary": "1210761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210761"
},
{
"category": "external",
"summary": "1211121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211121"
},
{
"category": "external",
"summary": "1211125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211125"
},
{
"category": "external",
"summary": "1211209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211209"
},
{
"category": "external",
"summary": "1211241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211241"
},
{
"category": "external",
"summary": "1211249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211249"
},
{
"category": "external",
"summary": "1211306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211306"
},
{
"category": "external",
"summary": "1211308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211308"
},
{
"category": "external",
"summary": "1211364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211364"
},
{
"category": "external",
"summary": "1211385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211385"
},
{
"category": "external",
"summary": "1211392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211392"
},
{
"category": "external",
"summary": "1212428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212428"
},
{
"category": "external",
"summary": "1211409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211409"
},
{
"category": "external",
"summary": "1211410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211410"
},
{
"category": "external",
"summary": "1211489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211489"
},
{
"category": "external",
"summary": "1211553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211553"
},
{
"category": "external",
"summary": "1211592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211592"
},
{
"category": "external",
"summary": "1211620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211620"
},
{
"category": "external",
"summary": "1211652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211652"
},
{
"category": "external",
"summary": "1211687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211687"
},
{
"category": "external",
"summary": "1211693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211693"
},
{
"category": "external",
"summary": "1212052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212052"
},
{
"category": "external",
"summary": "1212123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212123"
},
{
"category": "external",
"summary": "1212164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212164"
},
{
"category": "external",
"summary": "1212382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212382"
},
{
"category": "external",
"summary": "1212411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212411"
},
{
"category": "external",
"summary": "1212423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212423"
},
{
"category": "external",
"summary": "1212466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212466"
},
{
"category": "external",
"summary": "1212534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212534"
},
{
"category": "external",
"summary": "1212656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212656"
},
{
"category": "external",
"summary": "1212687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212687"
},
{
"category": "external",
"summary": "1212778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212778"
},
{
"category": "external",
"summary": "1213014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213014"
},
{
"category": "external",
"summary": "1213044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213044"
},
{
"category": "external",
"summary": "1213145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213145"
},
{
"category": "external",
"summary": "1213378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213378"
},
{
"category": "external",
"summary": "1213533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213533"
},
{
"category": "external",
"summary": "1213553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213553"
},
{
"category": "external",
"summary": "1213570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213570"
},
{
"category": "external",
"summary": "1213853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213853"
},
{
"category": "external",
"summary": "1213863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213863"
},
{
"category": "external",
"summary": "1213874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213874"
},
{
"category": "external",
"summary": "1213939",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213939"
},
{
"category": "external",
"summary": "1214005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214005"
},
{
"category": "external",
"summary": "1214012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214012"
},
{
"category": "external",
"summary": "1214081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214081"
},
{
"category": "external",
"summary": "1214204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214204"
},
{
"category": "external",
"summary": "1214543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214543"
},
{
"category": "external",
"summary": "1214680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214680"
},
{
"category": "external",
"summary": "1214690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214690"
},
{
"category": "external",
"summary": "1214725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214725"
},
{
"category": "external",
"summary": "1214776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214776"
},
{
"category": "external",
"summary": "1214833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214833"
},
{
"category": "external",
"summary": "1214925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214925"
},
{
"category": "external",
"summary": "1215216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215216"
},
{
"category": "external",
"summary": "1215272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215272"
},
{
"category": "external",
"summary": "1215285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215285"
},
{
"category": "external",
"summary": "1215566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215566"
},
{
"category": "external",
"summary": "1215615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215615"
},
{
"category": "external",
"summary": "1215812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215812"
},
{
"category": "external",
"summary": "1216005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216005"
},
{
"category": "external",
"summary": "1216157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216157"
},
{
"category": "external",
"summary": "1216209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216209"
},
{
"category": "external",
"summary": "1216210",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216210"
},
{
"category": "external",
"summary": "1216222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216222"
},
{
"category": "external",
"summary": "1216224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216224"
},
{
"category": "external",
"summary": "1216969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216969"
},
{
"category": "external",
"summary": "1216978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216978"
},
{
"category": "external",
"summary": "1217161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217161"
},
{
"category": "external",
"summary": "1217195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217195"
},
{
"category": "external",
"summary": "1217216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217216"
},
{
"category": "external",
"summary": "1217253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217253"
},
{
"category": "external",
"summary": "1217257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217257"
},
{
"category": "external",
"summary": "1217262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217262"
},
{
"category": "external",
"summary": "1217324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217324"
},
{
"category": "external",
"summary": "1217336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217336"
},
{
"category": "external",
"summary": "1217348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217348"
},
{
"category": "external",
"summary": "1217391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217391"
},
{
"category": "external",
"summary": "1217394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217394"
},
{
"category": "external",
"summary": "1217532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217532"
},
{
"category": "external",
"summary": "1217597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217597"
},
{
"category": "external",
"summary": "1217601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217601"
},
{
"category": "external",
"summary": "1217637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217637"
},
{
"category": "external",
"summary": "1217812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217812"
},
{
"category": "external",
"summary": "1217818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217818"
},
{
"category": "external",
"summary": "1218406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218406"
},
{
"category": "external",
"summary": "1218429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218429"
},
{
"category": "external",
"summary": "1218436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218436"
},
{
"category": "external",
"summary": "1218441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218441"
},
{
"category": "external",
"summary": "1218607",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218607"
},
{
"category": "external",
"summary": "1218786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218786"
},
{
"category": "external",
"summary": "1218944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218944"
},
{
"category": "external",
"summary": "1219019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219019"
},
{
"category": "external",
"summary": "1219098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219098"
},
{
"category": "external",
"summary": "1219171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219171"
},
{
"category": "external",
"summary": "1219329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219329"
},
{
"category": "external",
"summary": "1219439",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219439"
},
{
"category": "external",
"summary": "1219614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219614"
},
{
"category": "external",
"summary": "1219642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219642"
},
{
"category": "external",
"summary": "1220383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220383"
},
{
"category": "external",
"summary": "1220516",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220516"
},
{
"category": "external",
"summary": "1220882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220882"
},
{
"category": "external",
"summary": "1220901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220901"
},
{
"category": "external",
"summary": "1221299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221299"
},
{
"category": "external",
"summary": "1221324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221324"
},
{
"category": "external",
"summary": "1221366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221366"
},
{
"category": "external",
"summary": "1221479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221479"
},
{
"category": "external",
"summary": "1221510",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221510"
},
{
"category": "external",
"summary": "1221716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221716"
},
{
"category": "external",
"summary": "1222035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222035"
},
{
"category": "external",
"summary": "1222138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222138"
},
{
"category": "external",
"summary": "1222615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222615"
},
{
"category": "external",
"summary": "1222616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222616"
},
{
"category": "external",
"summary": "1223042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223042"
},
{
"category": "external",
"summary": "1223835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223835"
},
{
"category": "external",
"summary": "1223934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223934"
},
{
"category": "external",
"summary": "1225173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225173"
},
{
"category": "external",
"summary": "1225178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225178"
},
{
"category": "external",
"summary": "1225205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225205"
},
{
"category": "external",
"summary": "1225377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225377"
},
{
"category": "external",
"summary": "1225662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225662"
},
{
"category": "external",
"summary": "1226428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1226428"
},
{
"category": "external",
"summary": "1227441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227441"
},
{
"category": "external",
"summary": "1228407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhba-2015_1100.json"
}
],
"title": "Red Hat Bug Fix Advisory: CFME 5.4.0 bug fixes, and enhancement update",
"tracking": {
"current_release_date": "2025-10-09T14:41:54+00:00",
"generator": {
"date": "2025-10-09T14:41:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHBA-2015:1100",
"initial_release_date": "2015-06-16T12:28:42+00:00",
"revision_history": [
{
"date": "2015-06-16T12:28:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-06-16T12:28:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T14:41:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CloudForms Management Engine 5.4",
"product": {
"name": "CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cloudforms_managementengine:5::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat CloudForms"
},
{
"branches": [
{
"category": "product_version",
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-desktop@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-debuginfo@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-devel@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product": {
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product_id": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma@0.5.3-7.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product": {
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product_id": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma-debuginfo@0.5.3-7.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-debuginfo@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-progs@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-devel@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prince-0:9.0r2-4.el6cf.x86_64",
"product": {
"name": "prince-0:9.0r2-4.el6cf.x86_64",
"product_id": "prince-0:9.0r2-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prince@9.0r2-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product_id": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk@4.0P1-3.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product": {
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product_id": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk-devel@4.0P1-3.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product": {
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product_id": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin-debuginfo@1.0.0-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product_id": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin@1.0.0-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw-debuginfo@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw-gui@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging@0.20.2-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging-debuginfo@0.20.2-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product": {
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product_id": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi-debuginfo@1.3.14-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wmi-0:1.3.14-1.el6cf.x86_64",
"product": {
"name": "wmi-0:1.3.14-1.el6cf.x86_64",
"product_id": "wmi-0:1.3.14-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi@1.3.14-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg-debuginfo@0.12.2-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg@0.12.2-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine-debuginfo@1.0.7-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine@1.0.7-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json-debuginfo@1.8.2-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json@1.8.2-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri-debuginfo@1.5.11-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri@1.5.11-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby@3.0.1-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby-debuginfo@3.0.1-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra-debuginfo@1.2.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra@1.2.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych-debuginfo@2.0.13-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych@2.0.13-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi@1.9.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi-debuginfo@1.9.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin-debuginfo@1.3.1-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin@1.3.1-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer@0.11.0-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer-debuginfo@0.11.0-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-lib@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-debuginfo@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.4.0.5-1.el6cf?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product_id": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools@9.2.3-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "sneakernet_ca-0:0.1-2.el6cf.src",
"product": {
"name": "sneakernet_ca-0:0.1-2.el6cf.src",
"product_id": "sneakernet_ca-0:0.1-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sneakernet_ca@0.1-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-0:0.5.3-7.el6cf.src",
"product": {
"name": "pyliblzma-0:0.5.3-7.el6cf.src",
"product_id": "pyliblzma-0:0.5.3-7.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma@0.5.3-7.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "libdnet-0:1.12-11.el6cf.src",
"product": {
"name": "libdnet-0:1.12-11.el6cf.src",
"product_id": "libdnet-0:1.12-11.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet@1.12-11.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "prince-0:9.0r2-4.el6cf.src",
"product": {
"name": "prince-0:9.0r2-4.el6cf.src",
"product_id": "prince-0:9.0r2-4.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prince@9.0r2-4.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product_id": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk@4.0P1-3.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product_id": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin@1.0.0-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "lshw-0:B.02.16-4.el6cf.src",
"product": {
"name": "lshw-0:B.02.16-4.el6cf.src",
"product_id": "lshw-0:B.02.16-4.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw@B.02.16-4.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product_id": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging@0.20.2-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "wmi-0:1.3.14-1.el6cf.src",
"product": {
"name": "wmi-0:1.3.14-1.el6cf.src",
"product_id": "wmi-0:1.3.14-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi@1.3.14-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product_id": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg@0.12.2-9.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product_id": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine@1.0.7-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product_id": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json@1.8.2-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product_id": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri@1.5.11-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product_id": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby@3.0.1-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product_id": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra@1.2.8-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product_id": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych@2.0.13-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product_id": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi@1.9.8-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product_id": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin@1.3.1-9.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product_id": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer@0.11.0-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.4.0.5-1.el6cf.src",
"product": {
"name": "cfme-0:5.4.0.5-1.el6cf.src",
"product_id": "cfme-0:5.4.0.5-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.4.0.5-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product_id": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.4.0.5-1.el6cf?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product": {
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product_id": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sneakernet_ca@0.1-2.el6cf?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.4.0.5-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src"
},
"product_reference": "cfme-0:5.4.0.5-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src"
},
"product_reference": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src"
},
"product_reference": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64"
},
"product_reference": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64"
},
"product_reference": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-0:1.12-11.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src"
},
"product_reference": "libdnet-0:1.12-11.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-0:B.02.16-4.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src"
},
"product_reference": "lshw-0:B.02.16-4.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src"
},
"product_reference": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64"
},
"product_reference": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64"
},
"product_reference": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src"
},
"product_reference": "open-vm-tools-0:9.2.3-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prince-0:9.0r2-4.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src"
},
"product_reference": "prince-0:9.0r2-4.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prince-0:9.0r2-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64"
},
"product_reference": "prince-0:9.0r2-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-0:0.5.3-7.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src"
},
"product_reference": "pyliblzma-0:0.5.3-7.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64"
},
"product_reference": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64"
},
"product_reference": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src"
},
"product_reference": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src"
},
"product_reference": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src"
},
"product_reference": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src"
},
"product_reference": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch"
},
"product_reference": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sneakernet_ca-0:0.1-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src"
},
"product_reference": "sneakernet_ca-0:0.1-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-0:1.3.14-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src"
},
"product_reference": "wmi-0:1.3.14-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-0:1.3.14-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64"
},
"product_reference": "wmi-0:1.3.14-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
},
"product_reference": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ruby on Rails project"
]
},
{
"names": [
"Aaron Neyer"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-4389",
"cwe": {
"id": "CWE-134",
"name": "Use of Externally-Controlled Format String"
},
"discovery_date": "2013-09-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1013913"
}
],
"notes": [
{
"category": "description",
"text": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-actionmailer: email address processing DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue did not affect the versions of rubygem-actionmailer as shipped with Red Hat Subscription Asset Manager 1 as they do not include support for sending email using user supplied addresses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4389"
},
{
"category": "external",
"summary": "RHBZ#1013913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1013913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389"
}
],
"release_date": "2013-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-actionmailer: email address processing DoS"
},
{
"cve": "CVE-2013-4492",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1039435"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-i18n: cross-site scripting flaw in exception handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4492"
},
{
"category": "external",
"summary": "RHBZ#1039435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4492"
}
],
"release_date": "2013-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-i18n: cross-site scripting flaw in exception handling"
},
{
"acknowledgments": [
{
"names": [
"Ruby on Rails project"
]
}
],
"cve": "CVE-2014-7819",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2014-10-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1161527"
}
],
"notes": [
{
"category": "description",
"text": "Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-sprockets: arbitrary file existence disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-7819"
},
{
"category": "external",
"summary": "RHBZ#1161527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161527"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-7819",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7819"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY",
"url": "https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY"
}
],
"release_date": "2014-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-sprockets: arbitrary file existence disclosure"
},
{
"cve": "CVE-2015-1820",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2015-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1205291"
}
],
"notes": [
{
"category": "description",
"text": "REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "With the release of Satellite 6.9 available, this bug is being closed as wontfix as all parts of our Ruby stack are running under the SCL now with rest-client.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-1820"
},
{
"category": "external",
"summary": "RHBZ#1205291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1820"
}
],
"release_date": "2015-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses"
},
{
"cve": "CVE-2015-3448",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2015-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1240982"
}
],
"notes": [
{
"category": "description",
"text": "REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-rest-client: unsanitized application logging",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-3448"
},
{
"category": "external",
"summary": "RHBZ#1240982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240982"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-3448",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3448"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3448",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3448"
}
],
"release_date": "2015-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "workaround",
"details": "The permissions on log files can be changed, e.g. using \"chmod o-rwx\" to prevent anyone but the user and group owner of the file from reading it. Additionally the group permissions can also be removed, e.g. \"chmod g-rwx\" if only the user owning the file should be able to see it.",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-rest-client: unsanitized application logging"
}
]
}
RHBA-2015:1100
Vulnerability from csaf_redhat
Published
2015-06-16 12:28
Modified
2025-10-09 14:41
Summary
Red Hat Bug Fix Advisory: CFME 5.4.0 bug fixes, and enhancement update
Notes
Topic
Updated cfme packages that fix several bugs, and add various enhancements are now available for Red Hat CloudForms 3.2.
Details
Red Hat CloudForms Management Engine delivers the insight, control, and
automation needed to address the challenges of managing virtual
environments. CloudForms Management Engine is built on Ruby on Rails, a
model-view-controller (MVC) framework for web application development.
Action Pack implements the controller and the view components.
This update also fixes several bugs and adds various enhancements.
Documentation for these changes is available in the Release Notes and Technical Notes documents linked to in the References section.
All cfme users are advised to upgrade to these updated packages, which
correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated cfme packages that fix several bugs, and add various enhancements are now available for Red Hat CloudForms 3.2.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat CloudForms Management Engine delivers the insight, control, and\nautomation needed to address the challenges of managing virtual\nenvironments. CloudForms Management Engine is built on Ruby on Rails, a\nmodel-view-controller (MVC) framework for web application development.\nAction Pack implements the controller and the view components.\n\nThis update also fixes several bugs and adds various enhancements.\nDocumentation for these changes is available in the Release Notes and Technical Notes documents linked to in the References section.\n\nAll cfme users are advised to upgrade to these updated packages, which\ncorrect these issues and add these enhancements.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2015:1100",
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/Red_Hat_CloudForms/3.2/html/Release_Notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/Red_Hat_CloudForms/3.2/html/Release_Notes/index.html"
},
{
"category": "external",
"summary": "1146178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146178"
},
{
"category": "external",
"summary": "1160890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1160890"
},
{
"category": "external",
"summary": "1161248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161248"
},
{
"category": "external",
"summary": "1161253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161253"
},
{
"category": "external",
"summary": "1161322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161322"
},
{
"category": "external",
"summary": "1161701",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161701"
},
{
"category": "external",
"summary": "1161744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161744"
},
{
"category": "external",
"summary": "1163382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163382"
},
{
"category": "external",
"summary": "1163465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163465"
},
{
"category": "external",
"summary": "1163468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163468"
},
{
"category": "external",
"summary": "1163469",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163469"
},
{
"category": "external",
"summary": "1163472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163472"
},
{
"category": "external",
"summary": "1163661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163661"
},
{
"category": "external",
"summary": "1163952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163952"
},
{
"category": "external",
"summary": "1163978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163978"
},
{
"category": "external",
"summary": "1164033",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164033"
},
{
"category": "external",
"summary": "1164386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164386"
},
{
"category": "external",
"summary": "1164764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164764"
},
{
"category": "external",
"summary": "1166187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166187"
},
{
"category": "external",
"summary": "1166198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166198"
},
{
"category": "external",
"summary": "1166303",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166303"
},
{
"category": "external",
"summary": "1166328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166328"
},
{
"category": "external",
"summary": "1166861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166861"
},
{
"category": "external",
"summary": "1167110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167110"
},
{
"category": "external",
"summary": "1167308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167308"
},
{
"category": "external",
"summary": "1167410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167410"
},
{
"category": "external",
"summary": "1168337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168337"
},
{
"category": "external",
"summary": "1168345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168345"
},
{
"category": "external",
"summary": "1169351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169351"
},
{
"category": "external",
"summary": "1169502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169502"
},
{
"category": "external",
"summary": "1169930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169930"
},
{
"category": "external",
"summary": "1169937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169937"
},
{
"category": "external",
"summary": "1170319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170319"
},
{
"category": "external",
"summary": "1170358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170358"
},
{
"category": "external",
"summary": "1170813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170813"
},
{
"category": "external",
"summary": "1171167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171167"
},
{
"category": "external",
"summary": "1171286",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171286"
},
{
"category": "external",
"summary": "1171577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171577"
},
{
"category": "external",
"summary": "1171589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171589"
},
{
"category": "external",
"summary": "1171738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171738"
},
{
"category": "external",
"summary": "1171780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171780"
},
{
"category": "external",
"summary": "1172298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172298"
},
{
"category": "external",
"summary": "1173213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173213"
},
{
"category": "external",
"summary": "1173216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173216"
},
{
"category": "external",
"summary": "1173251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173251"
},
{
"category": "external",
"summary": "1173336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173336"
},
{
"category": "external",
"summary": "1173712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173712"
},
{
"category": "external",
"summary": "1174855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174855"
},
{
"category": "external",
"summary": "1174881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174881"
},
{
"category": "external",
"summary": "1176280",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176280"
},
{
"category": "external",
"summary": "1176619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176619"
},
{
"category": "external",
"summary": "1176689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176689"
},
{
"category": "external",
"summary": "1176721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176721"
},
{
"category": "external",
"summary": "1177015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177015"
},
{
"category": "external",
"summary": "1177809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177809"
},
{
"category": "external",
"summary": "1178078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178078"
},
{
"category": "external",
"summary": "1178697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178697"
},
{
"category": "external",
"summary": "1178729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178729"
},
{
"category": "external",
"summary": "1179503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179503"
},
{
"category": "external",
"summary": "1179797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179797"
},
{
"category": "external",
"summary": "1186502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186502"
},
{
"category": "external",
"summary": "1186911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186911"
},
{
"category": "external",
"summary": "1179807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179807"
},
{
"category": "external",
"summary": "1179907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179907"
},
{
"category": "external",
"summary": "1179908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179908"
},
{
"category": "external",
"summary": "1179958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179958"
},
{
"category": "external",
"summary": "1180313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180313"
},
{
"category": "external",
"summary": "1180649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180649"
},
{
"category": "external",
"summary": "1180746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180746"
},
{
"category": "external",
"summary": "1181429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181429"
},
{
"category": "external",
"summary": "1181768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181768"
},
{
"category": "external",
"summary": "1182329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182329"
},
{
"category": "external",
"summary": "1182330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182330"
},
{
"category": "external",
"summary": "1182654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182654"
},
{
"category": "external",
"summary": "1182795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182795"
},
{
"category": "external",
"summary": "1183757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183757"
},
{
"category": "external",
"summary": "1184250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184250"
},
{
"category": "external",
"summary": "1184267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184267"
},
{
"category": "external",
"summary": "1184343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184343"
},
{
"category": "external",
"summary": "1184465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184465"
},
{
"category": "external",
"summary": "1184575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184575"
},
{
"category": "external",
"summary": "1184637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184637"
},
{
"category": "external",
"summary": "1184990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184990"
},
{
"category": "external",
"summary": "1185042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185042"
},
{
"category": "external",
"summary": "1186364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186364"
},
{
"category": "external",
"summary": "1186413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186413"
},
{
"category": "external",
"summary": "1186485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186485"
},
{
"category": "external",
"summary": "1187233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187233"
},
{
"category": "external",
"summary": "1187836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187836"
},
{
"category": "external",
"summary": "1188401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188401"
},
{
"category": "external",
"summary": "1188427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188427"
},
{
"category": "external",
"summary": "1188436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188436"
},
{
"category": "external",
"summary": "1188585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188585"
},
{
"category": "external",
"summary": "1188597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188597"
},
{
"category": "external",
"summary": "1188798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188798"
},
{
"category": "external",
"summary": "1190054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190054"
},
{
"category": "external",
"summary": "1190211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190211"
},
{
"category": "external",
"summary": "1190260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190260"
},
{
"category": "external",
"summary": "1190293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190293"
},
{
"category": "external",
"summary": "1190564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190564"
},
{
"category": "external",
"summary": "1190565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190565"
},
{
"category": "external",
"summary": "1190584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190584"
},
{
"category": "external",
"summary": "1190603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190603"
},
{
"category": "external",
"summary": "1190667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190667"
},
{
"category": "external",
"summary": "1190672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190672"
},
{
"category": "external",
"summary": "1190852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190852"
},
{
"category": "external",
"summary": "1190855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190855"
},
{
"category": "external",
"summary": "1191197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191197"
},
{
"category": "external",
"summary": "1191279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191279"
},
{
"category": "external",
"summary": "1191468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191468"
},
{
"category": "external",
"summary": "1191489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191489"
},
{
"category": "external",
"summary": "1191496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191496"
},
{
"category": "external",
"summary": "1191585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191585"
},
{
"category": "external",
"summary": "1192039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192039"
},
{
"category": "external",
"summary": "1192198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192198"
},
{
"category": "external",
"summary": "1192223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192223"
},
{
"category": "external",
"summary": "1192409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192409"
},
{
"category": "external",
"summary": "1192518",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192518"
},
{
"category": "external",
"summary": "1192562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192562"
},
{
"category": "external",
"summary": "1193183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193183"
},
{
"category": "external",
"summary": "1193522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193522"
},
{
"category": "external",
"summary": "1193615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193615"
},
{
"category": "external",
"summary": "1193847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193847"
},
{
"category": "external",
"summary": "1194223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194223"
},
{
"category": "external",
"summary": "1194242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194242"
},
{
"category": "external",
"summary": "1194319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194319"
},
{
"category": "external",
"summary": "1194479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194479"
},
{
"category": "external",
"summary": "1195407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195407"
},
{
"category": "external",
"summary": "1198814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198814"
},
{
"category": "external",
"summary": "1195754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195754"
},
{
"category": "external",
"summary": "1195832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195832"
},
{
"category": "external",
"summary": "1195877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195877"
},
{
"category": "external",
"summary": "1196369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196369"
},
{
"category": "external",
"summary": "1196384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196384"
},
{
"category": "external",
"summary": "1196851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196851"
},
{
"category": "external",
"summary": "1196852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196852"
},
{
"category": "external",
"summary": "1197067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197067"
},
{
"category": "external",
"summary": "1198111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198111"
},
{
"category": "external",
"summary": "1198594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198594"
},
{
"category": "external",
"summary": "1198735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198735"
},
{
"category": "external",
"summary": "1198867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198867"
},
{
"category": "external",
"summary": "1199240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199240"
},
{
"category": "external",
"summary": "1199915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199915"
},
{
"category": "external",
"summary": "1200424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200424"
},
{
"category": "external",
"summary": "1200601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200601"
},
{
"category": "external",
"summary": "1200757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200757"
},
{
"category": "external",
"summary": "1200783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200783"
},
{
"category": "external",
"summary": "1200854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200854"
},
{
"category": "external",
"summary": "1200925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200925"
},
{
"category": "external",
"summary": "1201092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201092"
},
{
"category": "external",
"summary": "1201093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201093"
},
{
"category": "external",
"summary": "1201097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201097"
},
{
"category": "external",
"summary": "1201132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201132"
},
{
"category": "external",
"summary": "1201137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201137"
},
{
"category": "external",
"summary": "1201140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201140"
},
{
"category": "external",
"summary": "1201378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201378"
},
{
"category": "external",
"summary": "1201383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201383"
},
{
"category": "external",
"summary": "1201531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201531"
},
{
"category": "external",
"summary": "1201684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201684"
},
{
"category": "external",
"summary": "1201716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201716"
},
{
"category": "external",
"summary": "1201720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201720"
},
{
"category": "external",
"summary": "1201751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201751"
},
{
"category": "external",
"summary": "1201771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201771"
},
{
"category": "external",
"summary": "1201883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201883"
},
{
"category": "external",
"summary": "1201920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201920"
},
{
"category": "external",
"summary": "1201932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201932"
},
{
"category": "external",
"summary": "1202195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202195"
},
{
"category": "external",
"summary": "1202216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202216"
},
{
"category": "external",
"summary": "1202229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202229"
},
{
"category": "external",
"summary": "1202394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202394"
},
{
"category": "external",
"summary": "1202412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202412"
},
{
"category": "external",
"summary": "1202415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202415"
},
{
"category": "external",
"summary": "1202427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202427"
},
{
"category": "external",
"summary": "1202465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202465"
},
{
"category": "external",
"summary": "1202478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202478"
},
{
"category": "external",
"summary": "1202491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202491"
},
{
"category": "external",
"summary": "1202543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202543"
},
{
"category": "external",
"summary": "1202648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202648"
},
{
"category": "external",
"summary": "1202655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202655"
},
{
"category": "external",
"summary": "1202660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202660"
},
{
"category": "external",
"summary": "1202681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202681"
},
{
"category": "external",
"summary": "1202816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202816"
},
{
"category": "external",
"summary": "1203003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203003"
},
{
"category": "external",
"summary": "1203168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203168"
},
{
"category": "external",
"summary": "1203184",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203184"
},
{
"category": "external",
"summary": "1203207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203207"
},
{
"category": "external",
"summary": "1203301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203301"
},
{
"category": "external",
"summary": "1203426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203426"
},
{
"category": "external",
"summary": "1203442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203442"
},
{
"category": "external",
"summary": "1203547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203547"
},
{
"category": "external",
"summary": "1203713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203713"
},
{
"category": "external",
"summary": "1204115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204115"
},
{
"category": "external",
"summary": "1204117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204117"
},
{
"category": "external",
"summary": "1204125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204125"
},
{
"category": "external",
"summary": "1204232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204232"
},
{
"category": "external",
"summary": "1204252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204252"
},
{
"category": "external",
"summary": "1204548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204548"
},
{
"category": "external",
"summary": "1204599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204599"
},
{
"category": "external",
"summary": "1204629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204629"
},
{
"category": "external",
"summary": "1204635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204635"
},
{
"category": "external",
"summary": "1204899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204899"
},
{
"category": "external",
"summary": "1204912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204912"
},
{
"category": "external",
"summary": "1204943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204943"
},
{
"category": "external",
"summary": "1205137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205137"
},
{
"category": "external",
"summary": "1205213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205213"
},
{
"category": "external",
"summary": "1205235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205235"
},
{
"category": "external",
"summary": "1205247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205247"
},
{
"category": "external",
"summary": "1205347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205347"
},
{
"category": "external",
"summary": "1205386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205386"
},
{
"category": "external",
"summary": "1205407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205407"
},
{
"category": "external",
"summary": "1205453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205453"
},
{
"category": "external",
"summary": "1205496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205496"
},
{
"category": "external",
"summary": "1205779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205779"
},
{
"category": "external",
"summary": "1205898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205898"
},
{
"category": "external",
"summary": "1205918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205918"
},
{
"category": "external",
"summary": "1205919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205919"
},
{
"category": "external",
"summary": "1205920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205920"
},
{
"category": "external",
"summary": "1206016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206016"
},
{
"category": "external",
"summary": "1206022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206022"
},
{
"category": "external",
"summary": "1206023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206023"
},
{
"category": "external",
"summary": "1206028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206028"
},
{
"category": "external",
"summary": "1206122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206122"
},
{
"category": "external",
"summary": "1206124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206124"
},
{
"category": "external",
"summary": "1206141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206141"
},
{
"category": "external",
"summary": "1206142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206142"
},
{
"category": "external",
"summary": "1206204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206204"
},
{
"category": "external",
"summary": "1206263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206263"
},
{
"category": "external",
"summary": "1206662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206662"
},
{
"category": "external",
"summary": "1206672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206672"
},
{
"category": "external",
"summary": "1206675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206675"
},
{
"category": "external",
"summary": "1206687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206687"
},
{
"category": "external",
"summary": "1206727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206727"
},
{
"category": "external",
"summary": "1206729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206729"
},
{
"category": "external",
"summary": "1207018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207018"
},
{
"category": "external",
"summary": "1207112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207112"
},
{
"category": "external",
"summary": "1207209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207209"
},
{
"category": "external",
"summary": "1207259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207259"
},
{
"category": "external",
"summary": "1207298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207298"
},
{
"category": "external",
"summary": "1207313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207313"
},
{
"category": "external",
"summary": "1207631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207631"
},
{
"category": "external",
"summary": "1207641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207641"
},
{
"category": "external",
"summary": "1207788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207788"
},
{
"category": "external",
"summary": "1207842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207842"
},
{
"category": "external",
"summary": "1207859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207859"
},
{
"category": "external",
"summary": "1207865",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207865"
},
{
"category": "external",
"summary": "1207895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207895"
},
{
"category": "external",
"summary": "1208129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208129"
},
{
"category": "external",
"summary": "1208152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208152"
},
{
"category": "external",
"summary": "1208258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208258"
},
{
"category": "external",
"summary": "1208642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208642"
},
{
"category": "external",
"summary": "1208698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208698"
},
{
"category": "external",
"summary": "1208852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208852"
},
{
"category": "external",
"summary": "1209015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209015"
},
{
"category": "external",
"summary": "1209262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209262"
},
{
"category": "external",
"summary": "1209421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209421"
},
{
"category": "external",
"summary": "1209557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209557"
},
{
"category": "external",
"summary": "1209629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209629"
},
{
"category": "external",
"summary": "1209641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209641"
},
{
"category": "external",
"summary": "1209642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209642"
},
{
"category": "external",
"summary": "1209711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209711"
},
{
"category": "external",
"summary": "1209756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209756"
},
{
"category": "external",
"summary": "1209847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209847"
},
{
"category": "external",
"summary": "1209945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209945"
},
{
"category": "external",
"summary": "1210089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210089"
},
{
"category": "external",
"summary": "1210094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210094"
},
{
"category": "external",
"summary": "1210277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210277"
},
{
"category": "external",
"summary": "1210376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210376"
},
{
"category": "external",
"summary": "1210385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210385"
},
{
"category": "external",
"summary": "1210507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210507"
},
{
"category": "external",
"summary": "1210761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210761"
},
{
"category": "external",
"summary": "1211121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211121"
},
{
"category": "external",
"summary": "1211125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211125"
},
{
"category": "external",
"summary": "1211209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211209"
},
{
"category": "external",
"summary": "1211241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211241"
},
{
"category": "external",
"summary": "1211249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211249"
},
{
"category": "external",
"summary": "1211306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211306"
},
{
"category": "external",
"summary": "1211308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211308"
},
{
"category": "external",
"summary": "1211364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211364"
},
{
"category": "external",
"summary": "1211385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211385"
},
{
"category": "external",
"summary": "1211392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211392"
},
{
"category": "external",
"summary": "1212428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212428"
},
{
"category": "external",
"summary": "1211409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211409"
},
{
"category": "external",
"summary": "1211410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211410"
},
{
"category": "external",
"summary": "1211489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211489"
},
{
"category": "external",
"summary": "1211553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211553"
},
{
"category": "external",
"summary": "1211592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211592"
},
{
"category": "external",
"summary": "1211620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211620"
},
{
"category": "external",
"summary": "1211652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211652"
},
{
"category": "external",
"summary": "1211687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211687"
},
{
"category": "external",
"summary": "1211693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211693"
},
{
"category": "external",
"summary": "1212052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212052"
},
{
"category": "external",
"summary": "1212123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212123"
},
{
"category": "external",
"summary": "1212164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212164"
},
{
"category": "external",
"summary": "1212382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212382"
},
{
"category": "external",
"summary": "1212411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212411"
},
{
"category": "external",
"summary": "1212423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212423"
},
{
"category": "external",
"summary": "1212466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212466"
},
{
"category": "external",
"summary": "1212534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212534"
},
{
"category": "external",
"summary": "1212656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212656"
},
{
"category": "external",
"summary": "1212687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212687"
},
{
"category": "external",
"summary": "1212778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212778"
},
{
"category": "external",
"summary": "1213014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213014"
},
{
"category": "external",
"summary": "1213044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213044"
},
{
"category": "external",
"summary": "1213145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213145"
},
{
"category": "external",
"summary": "1213378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213378"
},
{
"category": "external",
"summary": "1213533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213533"
},
{
"category": "external",
"summary": "1213553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213553"
},
{
"category": "external",
"summary": "1213570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213570"
},
{
"category": "external",
"summary": "1213853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213853"
},
{
"category": "external",
"summary": "1213863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213863"
},
{
"category": "external",
"summary": "1213874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213874"
},
{
"category": "external",
"summary": "1213939",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213939"
},
{
"category": "external",
"summary": "1214005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214005"
},
{
"category": "external",
"summary": "1214012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214012"
},
{
"category": "external",
"summary": "1214081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214081"
},
{
"category": "external",
"summary": "1214204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214204"
},
{
"category": "external",
"summary": "1214543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214543"
},
{
"category": "external",
"summary": "1214680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214680"
},
{
"category": "external",
"summary": "1214690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214690"
},
{
"category": "external",
"summary": "1214725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214725"
},
{
"category": "external",
"summary": "1214776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214776"
},
{
"category": "external",
"summary": "1214833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214833"
},
{
"category": "external",
"summary": "1214925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214925"
},
{
"category": "external",
"summary": "1215216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215216"
},
{
"category": "external",
"summary": "1215272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215272"
},
{
"category": "external",
"summary": "1215285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215285"
},
{
"category": "external",
"summary": "1215566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215566"
},
{
"category": "external",
"summary": "1215615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215615"
},
{
"category": "external",
"summary": "1215812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215812"
},
{
"category": "external",
"summary": "1216005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216005"
},
{
"category": "external",
"summary": "1216157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216157"
},
{
"category": "external",
"summary": "1216209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216209"
},
{
"category": "external",
"summary": "1216210",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216210"
},
{
"category": "external",
"summary": "1216222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216222"
},
{
"category": "external",
"summary": "1216224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216224"
},
{
"category": "external",
"summary": "1216969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216969"
},
{
"category": "external",
"summary": "1216978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216978"
},
{
"category": "external",
"summary": "1217161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217161"
},
{
"category": "external",
"summary": "1217195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217195"
},
{
"category": "external",
"summary": "1217216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217216"
},
{
"category": "external",
"summary": "1217253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217253"
},
{
"category": "external",
"summary": "1217257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217257"
},
{
"category": "external",
"summary": "1217262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217262"
},
{
"category": "external",
"summary": "1217324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217324"
},
{
"category": "external",
"summary": "1217336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217336"
},
{
"category": "external",
"summary": "1217348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217348"
},
{
"category": "external",
"summary": "1217391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217391"
},
{
"category": "external",
"summary": "1217394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217394"
},
{
"category": "external",
"summary": "1217532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217532"
},
{
"category": "external",
"summary": "1217597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217597"
},
{
"category": "external",
"summary": "1217601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217601"
},
{
"category": "external",
"summary": "1217637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217637"
},
{
"category": "external",
"summary": "1217812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217812"
},
{
"category": "external",
"summary": "1217818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217818"
},
{
"category": "external",
"summary": "1218406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218406"
},
{
"category": "external",
"summary": "1218429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218429"
},
{
"category": "external",
"summary": "1218436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218436"
},
{
"category": "external",
"summary": "1218441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218441"
},
{
"category": "external",
"summary": "1218607",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218607"
},
{
"category": "external",
"summary": "1218786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218786"
},
{
"category": "external",
"summary": "1218944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218944"
},
{
"category": "external",
"summary": "1219019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219019"
},
{
"category": "external",
"summary": "1219098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219098"
},
{
"category": "external",
"summary": "1219171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219171"
},
{
"category": "external",
"summary": "1219329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219329"
},
{
"category": "external",
"summary": "1219439",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219439"
},
{
"category": "external",
"summary": "1219614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219614"
},
{
"category": "external",
"summary": "1219642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219642"
},
{
"category": "external",
"summary": "1220383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220383"
},
{
"category": "external",
"summary": "1220516",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220516"
},
{
"category": "external",
"summary": "1220882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220882"
},
{
"category": "external",
"summary": "1220901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220901"
},
{
"category": "external",
"summary": "1221299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221299"
},
{
"category": "external",
"summary": "1221324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221324"
},
{
"category": "external",
"summary": "1221366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221366"
},
{
"category": "external",
"summary": "1221479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221479"
},
{
"category": "external",
"summary": "1221510",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221510"
},
{
"category": "external",
"summary": "1221716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221716"
},
{
"category": "external",
"summary": "1222035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222035"
},
{
"category": "external",
"summary": "1222138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222138"
},
{
"category": "external",
"summary": "1222615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222615"
},
{
"category": "external",
"summary": "1222616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222616"
},
{
"category": "external",
"summary": "1223042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223042"
},
{
"category": "external",
"summary": "1223835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223835"
},
{
"category": "external",
"summary": "1223934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223934"
},
{
"category": "external",
"summary": "1225173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225173"
},
{
"category": "external",
"summary": "1225178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225178"
},
{
"category": "external",
"summary": "1225205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225205"
},
{
"category": "external",
"summary": "1225377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225377"
},
{
"category": "external",
"summary": "1225662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225662"
},
{
"category": "external",
"summary": "1226428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1226428"
},
{
"category": "external",
"summary": "1227441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227441"
},
{
"category": "external",
"summary": "1228407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhba-2015_1100.json"
}
],
"title": "Red Hat Bug Fix Advisory: CFME 5.4.0 bug fixes, and enhancement update",
"tracking": {
"current_release_date": "2025-10-09T14:41:54+00:00",
"generator": {
"date": "2025-10-09T14:41:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHBA-2015:1100",
"initial_release_date": "2015-06-16T12:28:42+00:00",
"revision_history": [
{
"date": "2015-06-16T12:28:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-06-16T12:28:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T14:41:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CloudForms Management Engine 5.4",
"product": {
"name": "CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cloudforms_managementengine:5::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat CloudForms"
},
{
"branches": [
{
"category": "product_version",
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-desktop@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-debuginfo@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-devel@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product": {
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product_id": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma@0.5.3-7.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product": {
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product_id": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma-debuginfo@0.5.3-7.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-debuginfo@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-progs@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-devel@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prince-0:9.0r2-4.el6cf.x86_64",
"product": {
"name": "prince-0:9.0r2-4.el6cf.x86_64",
"product_id": "prince-0:9.0r2-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prince@9.0r2-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product_id": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk@4.0P1-3.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product": {
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product_id": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk-devel@4.0P1-3.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product": {
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product_id": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin-debuginfo@1.0.0-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product_id": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin@1.0.0-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw-debuginfo@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw-gui@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging@0.20.2-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging-debuginfo@0.20.2-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product": {
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product_id": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi-debuginfo@1.3.14-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wmi-0:1.3.14-1.el6cf.x86_64",
"product": {
"name": "wmi-0:1.3.14-1.el6cf.x86_64",
"product_id": "wmi-0:1.3.14-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi@1.3.14-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg-debuginfo@0.12.2-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg@0.12.2-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine-debuginfo@1.0.7-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine@1.0.7-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json-debuginfo@1.8.2-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json@1.8.2-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri-debuginfo@1.5.11-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri@1.5.11-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby@3.0.1-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby-debuginfo@3.0.1-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra-debuginfo@1.2.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra@1.2.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych-debuginfo@2.0.13-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych@2.0.13-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi@1.9.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi-debuginfo@1.9.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin-debuginfo@1.3.1-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin@1.3.1-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer@0.11.0-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer-debuginfo@0.11.0-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-lib@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-debuginfo@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.4.0.5-1.el6cf?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product_id": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools@9.2.3-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "sneakernet_ca-0:0.1-2.el6cf.src",
"product": {
"name": "sneakernet_ca-0:0.1-2.el6cf.src",
"product_id": "sneakernet_ca-0:0.1-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sneakernet_ca@0.1-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-0:0.5.3-7.el6cf.src",
"product": {
"name": "pyliblzma-0:0.5.3-7.el6cf.src",
"product_id": "pyliblzma-0:0.5.3-7.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma@0.5.3-7.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "libdnet-0:1.12-11.el6cf.src",
"product": {
"name": "libdnet-0:1.12-11.el6cf.src",
"product_id": "libdnet-0:1.12-11.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet@1.12-11.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "prince-0:9.0r2-4.el6cf.src",
"product": {
"name": "prince-0:9.0r2-4.el6cf.src",
"product_id": "prince-0:9.0r2-4.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prince@9.0r2-4.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product_id": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk@4.0P1-3.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product_id": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin@1.0.0-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "lshw-0:B.02.16-4.el6cf.src",
"product": {
"name": "lshw-0:B.02.16-4.el6cf.src",
"product_id": "lshw-0:B.02.16-4.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw@B.02.16-4.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product_id": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging@0.20.2-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "wmi-0:1.3.14-1.el6cf.src",
"product": {
"name": "wmi-0:1.3.14-1.el6cf.src",
"product_id": "wmi-0:1.3.14-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi@1.3.14-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product_id": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg@0.12.2-9.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product_id": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine@1.0.7-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product_id": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json@1.8.2-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product_id": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri@1.5.11-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product_id": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby@3.0.1-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product_id": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra@1.2.8-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product_id": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych@2.0.13-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product_id": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi@1.9.8-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product_id": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin@1.3.1-9.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product_id": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer@0.11.0-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.4.0.5-1.el6cf.src",
"product": {
"name": "cfme-0:5.4.0.5-1.el6cf.src",
"product_id": "cfme-0:5.4.0.5-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.4.0.5-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product_id": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.4.0.5-1.el6cf?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product": {
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product_id": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sneakernet_ca@0.1-2.el6cf?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.4.0.5-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src"
},
"product_reference": "cfme-0:5.4.0.5-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src"
},
"product_reference": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src"
},
"product_reference": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64"
},
"product_reference": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64"
},
"product_reference": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-0:1.12-11.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src"
},
"product_reference": "libdnet-0:1.12-11.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-0:B.02.16-4.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src"
},
"product_reference": "lshw-0:B.02.16-4.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src"
},
"product_reference": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64"
},
"product_reference": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64"
},
"product_reference": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src"
},
"product_reference": "open-vm-tools-0:9.2.3-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prince-0:9.0r2-4.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src"
},
"product_reference": "prince-0:9.0r2-4.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prince-0:9.0r2-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64"
},
"product_reference": "prince-0:9.0r2-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-0:0.5.3-7.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src"
},
"product_reference": "pyliblzma-0:0.5.3-7.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64"
},
"product_reference": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64"
},
"product_reference": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src"
},
"product_reference": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src"
},
"product_reference": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src"
},
"product_reference": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src"
},
"product_reference": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch"
},
"product_reference": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sneakernet_ca-0:0.1-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src"
},
"product_reference": "sneakernet_ca-0:0.1-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-0:1.3.14-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src"
},
"product_reference": "wmi-0:1.3.14-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-0:1.3.14-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64"
},
"product_reference": "wmi-0:1.3.14-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
},
"product_reference": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ruby on Rails project"
]
},
{
"names": [
"Aaron Neyer"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-4389",
"cwe": {
"id": "CWE-134",
"name": "Use of Externally-Controlled Format String"
},
"discovery_date": "2013-09-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1013913"
}
],
"notes": [
{
"category": "description",
"text": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-actionmailer: email address processing DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue did not affect the versions of rubygem-actionmailer as shipped with Red Hat Subscription Asset Manager 1 as they do not include support for sending email using user supplied addresses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4389"
},
{
"category": "external",
"summary": "RHBZ#1013913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1013913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389"
}
],
"release_date": "2013-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-actionmailer: email address processing DoS"
},
{
"cve": "CVE-2013-4492",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1039435"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-i18n: cross-site scripting flaw in exception handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4492"
},
{
"category": "external",
"summary": "RHBZ#1039435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4492"
}
],
"release_date": "2013-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-i18n: cross-site scripting flaw in exception handling"
},
{
"acknowledgments": [
{
"names": [
"Ruby on Rails project"
]
}
],
"cve": "CVE-2014-7819",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2014-10-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1161527"
}
],
"notes": [
{
"category": "description",
"text": "Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-sprockets: arbitrary file existence disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-7819"
},
{
"category": "external",
"summary": "RHBZ#1161527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161527"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-7819",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7819"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY",
"url": "https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY"
}
],
"release_date": "2014-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-sprockets: arbitrary file existence disclosure"
},
{
"cve": "CVE-2015-1820",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2015-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1205291"
}
],
"notes": [
{
"category": "description",
"text": "REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "With the release of Satellite 6.9 available, this bug is being closed as wontfix as all parts of our Ruby stack are running under the SCL now with rest-client.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-1820"
},
{
"category": "external",
"summary": "RHBZ#1205291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1820"
}
],
"release_date": "2015-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses"
},
{
"cve": "CVE-2015-3448",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2015-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1240982"
}
],
"notes": [
{
"category": "description",
"text": "REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-rest-client: unsanitized application logging",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-3448"
},
{
"category": "external",
"summary": "RHBZ#1240982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240982"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-3448",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3448"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3448",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3448"
}
],
"release_date": "2015-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "workaround",
"details": "The permissions on log files can be changed, e.g. using \"chmod o-rwx\" to prevent anyone but the user and group owner of the file from reading it. Additionally the group permissions can also be removed, e.g. \"chmod g-rwx\" if only the user owning the file should be able to see it.",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-rest-client: unsanitized application logging"
}
]
}
rhba-2015_1100
Vulnerability from csaf_redhat
Published
2015-06-16 12:28
Modified
2025-01-02 09:55
Summary
Red Hat Bug Fix Advisory: CFME 5.4.0 bug fixes, and enhancement update
Notes
Topic
Updated cfme packages that fix several bugs, and add various enhancements are now available for Red Hat CloudForms 3.2.
Details
Red Hat CloudForms Management Engine delivers the insight, control, and
automation needed to address the challenges of managing virtual
environments. CloudForms Management Engine is built on Ruby on Rails, a
model-view-controller (MVC) framework for web application development.
Action Pack implements the controller and the view components.
This update also fixes several bugs and adds various enhancements.
Documentation for these changes is available in the Release Notes and Technical Notes documents linked to in the References section.
All cfme users are advised to upgrade to these updated packages, which
correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated cfme packages that fix several bugs, and add various enhancements are now available for Red Hat CloudForms 3.2.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat CloudForms Management Engine delivers the insight, control, and\nautomation needed to address the challenges of managing virtual\nenvironments. CloudForms Management Engine is built on Ruby on Rails, a\nmodel-view-controller (MVC) framework for web application development.\nAction Pack implements the controller and the view components.\n\nThis update also fixes several bugs and adds various enhancements.\nDocumentation for these changes is available in the Release Notes and Technical Notes documents linked to in the References section.\n\nAll cfme users are advised to upgrade to these updated packages, which\ncorrect these issues and add these enhancements.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2015:1100",
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/Red_Hat_CloudForms/3.2/html/Release_Notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/Red_Hat_CloudForms/3.2/html/Release_Notes/index.html"
},
{
"category": "external",
"summary": "1146178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146178"
},
{
"category": "external",
"summary": "1160890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1160890"
},
{
"category": "external",
"summary": "1161248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161248"
},
{
"category": "external",
"summary": "1161253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161253"
},
{
"category": "external",
"summary": "1161322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161322"
},
{
"category": "external",
"summary": "1161701",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161701"
},
{
"category": "external",
"summary": "1161744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161744"
},
{
"category": "external",
"summary": "1163382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163382"
},
{
"category": "external",
"summary": "1163465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163465"
},
{
"category": "external",
"summary": "1163468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163468"
},
{
"category": "external",
"summary": "1163469",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163469"
},
{
"category": "external",
"summary": "1163472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163472"
},
{
"category": "external",
"summary": "1163661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163661"
},
{
"category": "external",
"summary": "1163952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163952"
},
{
"category": "external",
"summary": "1163978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163978"
},
{
"category": "external",
"summary": "1164033",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164033"
},
{
"category": "external",
"summary": "1164386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164386"
},
{
"category": "external",
"summary": "1164764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164764"
},
{
"category": "external",
"summary": "1166187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166187"
},
{
"category": "external",
"summary": "1166198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166198"
},
{
"category": "external",
"summary": "1166303",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166303"
},
{
"category": "external",
"summary": "1166328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166328"
},
{
"category": "external",
"summary": "1166861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166861"
},
{
"category": "external",
"summary": "1167110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167110"
},
{
"category": "external",
"summary": "1167308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167308"
},
{
"category": "external",
"summary": "1167410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167410"
},
{
"category": "external",
"summary": "1168337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168337"
},
{
"category": "external",
"summary": "1168345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168345"
},
{
"category": "external",
"summary": "1169351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169351"
},
{
"category": "external",
"summary": "1169502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169502"
},
{
"category": "external",
"summary": "1169930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169930"
},
{
"category": "external",
"summary": "1169937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169937"
},
{
"category": "external",
"summary": "1170319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170319"
},
{
"category": "external",
"summary": "1170358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170358"
},
{
"category": "external",
"summary": "1170813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170813"
},
{
"category": "external",
"summary": "1171167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171167"
},
{
"category": "external",
"summary": "1171286",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171286"
},
{
"category": "external",
"summary": "1171577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171577"
},
{
"category": "external",
"summary": "1171589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171589"
},
{
"category": "external",
"summary": "1171738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171738"
},
{
"category": "external",
"summary": "1171780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171780"
},
{
"category": "external",
"summary": "1172298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172298"
},
{
"category": "external",
"summary": "1173213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173213"
},
{
"category": "external",
"summary": "1173216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173216"
},
{
"category": "external",
"summary": "1173251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173251"
},
{
"category": "external",
"summary": "1173336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173336"
},
{
"category": "external",
"summary": "1173712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173712"
},
{
"category": "external",
"summary": "1174855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174855"
},
{
"category": "external",
"summary": "1174881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174881"
},
{
"category": "external",
"summary": "1176280",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176280"
},
{
"category": "external",
"summary": "1176619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176619"
},
{
"category": "external",
"summary": "1176689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176689"
},
{
"category": "external",
"summary": "1176721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176721"
},
{
"category": "external",
"summary": "1177015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177015"
},
{
"category": "external",
"summary": "1177809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177809"
},
{
"category": "external",
"summary": "1178078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178078"
},
{
"category": "external",
"summary": "1178697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178697"
},
{
"category": "external",
"summary": "1178729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178729"
},
{
"category": "external",
"summary": "1179503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179503"
},
{
"category": "external",
"summary": "1179797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179797"
},
{
"category": "external",
"summary": "1179807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179807"
},
{
"category": "external",
"summary": "1179907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179907"
},
{
"category": "external",
"summary": "1179908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179908"
},
{
"category": "external",
"summary": "1179958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179958"
},
{
"category": "external",
"summary": "1180313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180313"
},
{
"category": "external",
"summary": "1180649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180649"
},
{
"category": "external",
"summary": "1180746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180746"
},
{
"category": "external",
"summary": "1181429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181429"
},
{
"category": "external",
"summary": "1181768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181768"
},
{
"category": "external",
"summary": "1182329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182329"
},
{
"category": "external",
"summary": "1182330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182330"
},
{
"category": "external",
"summary": "1182654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182654"
},
{
"category": "external",
"summary": "1182795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182795"
},
{
"category": "external",
"summary": "1183757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183757"
},
{
"category": "external",
"summary": "1184250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184250"
},
{
"category": "external",
"summary": "1184267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184267"
},
{
"category": "external",
"summary": "1184343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184343"
},
{
"category": "external",
"summary": "1184465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184465"
},
{
"category": "external",
"summary": "1184575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184575"
},
{
"category": "external",
"summary": "1184637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184637"
},
{
"category": "external",
"summary": "1184990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184990"
},
{
"category": "external",
"summary": "1185042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185042"
},
{
"category": "external",
"summary": "1186364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186364"
},
{
"category": "external",
"summary": "1186413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186413"
},
{
"category": "external",
"summary": "1186485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186485"
},
{
"category": "external",
"summary": "1186502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186502"
},
{
"category": "external",
"summary": "1186911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186911"
},
{
"category": "external",
"summary": "1187233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187233"
},
{
"category": "external",
"summary": "1187836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187836"
},
{
"category": "external",
"summary": "1188401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188401"
},
{
"category": "external",
"summary": "1188427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188427"
},
{
"category": "external",
"summary": "1188436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188436"
},
{
"category": "external",
"summary": "1188585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188585"
},
{
"category": "external",
"summary": "1188597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188597"
},
{
"category": "external",
"summary": "1188798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188798"
},
{
"category": "external",
"summary": "1190054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190054"
},
{
"category": "external",
"summary": "1190211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190211"
},
{
"category": "external",
"summary": "1190260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190260"
},
{
"category": "external",
"summary": "1190293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190293"
},
{
"category": "external",
"summary": "1190564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190564"
},
{
"category": "external",
"summary": "1190565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190565"
},
{
"category": "external",
"summary": "1190584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190584"
},
{
"category": "external",
"summary": "1190603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190603"
},
{
"category": "external",
"summary": "1190667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190667"
},
{
"category": "external",
"summary": "1190672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190672"
},
{
"category": "external",
"summary": "1190852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190852"
},
{
"category": "external",
"summary": "1190855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190855"
},
{
"category": "external",
"summary": "1191197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191197"
},
{
"category": "external",
"summary": "1191279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191279"
},
{
"category": "external",
"summary": "1191468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191468"
},
{
"category": "external",
"summary": "1191489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191489"
},
{
"category": "external",
"summary": "1191496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191496"
},
{
"category": "external",
"summary": "1191585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191585"
},
{
"category": "external",
"summary": "1192039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192039"
},
{
"category": "external",
"summary": "1192198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192198"
},
{
"category": "external",
"summary": "1192223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192223"
},
{
"category": "external",
"summary": "1192409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192409"
},
{
"category": "external",
"summary": "1192518",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192518"
},
{
"category": "external",
"summary": "1192562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192562"
},
{
"category": "external",
"summary": "1193183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193183"
},
{
"category": "external",
"summary": "1193522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193522"
},
{
"category": "external",
"summary": "1193615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193615"
},
{
"category": "external",
"summary": "1193847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193847"
},
{
"category": "external",
"summary": "1194223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194223"
},
{
"category": "external",
"summary": "1194242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194242"
},
{
"category": "external",
"summary": "1194319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194319"
},
{
"category": "external",
"summary": "1194479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194479"
},
{
"category": "external",
"summary": "1195407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195407"
},
{
"category": "external",
"summary": "1195754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195754"
},
{
"category": "external",
"summary": "1195832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195832"
},
{
"category": "external",
"summary": "1195877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195877"
},
{
"category": "external",
"summary": "1196369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196369"
},
{
"category": "external",
"summary": "1196384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196384"
},
{
"category": "external",
"summary": "1196851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196851"
},
{
"category": "external",
"summary": "1196852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196852"
},
{
"category": "external",
"summary": "1197067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197067"
},
{
"category": "external",
"summary": "1198111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198111"
},
{
"category": "external",
"summary": "1198594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198594"
},
{
"category": "external",
"summary": "1198735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198735"
},
{
"category": "external",
"summary": "1198814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198814"
},
{
"category": "external",
"summary": "1198867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198867"
},
{
"category": "external",
"summary": "1199240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199240"
},
{
"category": "external",
"summary": "1199915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199915"
},
{
"category": "external",
"summary": "1200424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200424"
},
{
"category": "external",
"summary": "1200601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200601"
},
{
"category": "external",
"summary": "1200757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200757"
},
{
"category": "external",
"summary": "1200783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200783"
},
{
"category": "external",
"summary": "1200854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200854"
},
{
"category": "external",
"summary": "1200925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200925"
},
{
"category": "external",
"summary": "1201092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201092"
},
{
"category": "external",
"summary": "1201093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201093"
},
{
"category": "external",
"summary": "1201097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201097"
},
{
"category": "external",
"summary": "1201132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201132"
},
{
"category": "external",
"summary": "1201137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201137"
},
{
"category": "external",
"summary": "1201140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201140"
},
{
"category": "external",
"summary": "1201378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201378"
},
{
"category": "external",
"summary": "1201383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201383"
},
{
"category": "external",
"summary": "1201531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201531"
},
{
"category": "external",
"summary": "1201684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201684"
},
{
"category": "external",
"summary": "1201716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201716"
},
{
"category": "external",
"summary": "1201720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201720"
},
{
"category": "external",
"summary": "1201751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201751"
},
{
"category": "external",
"summary": "1201771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201771"
},
{
"category": "external",
"summary": "1201883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201883"
},
{
"category": "external",
"summary": "1201920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201920"
},
{
"category": "external",
"summary": "1201932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201932"
},
{
"category": "external",
"summary": "1202195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202195"
},
{
"category": "external",
"summary": "1202216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202216"
},
{
"category": "external",
"summary": "1202229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202229"
},
{
"category": "external",
"summary": "1202394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202394"
},
{
"category": "external",
"summary": "1202412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202412"
},
{
"category": "external",
"summary": "1202415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202415"
},
{
"category": "external",
"summary": "1202427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202427"
},
{
"category": "external",
"summary": "1202465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202465"
},
{
"category": "external",
"summary": "1202478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202478"
},
{
"category": "external",
"summary": "1202491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202491"
},
{
"category": "external",
"summary": "1202543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202543"
},
{
"category": "external",
"summary": "1202648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202648"
},
{
"category": "external",
"summary": "1202655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202655"
},
{
"category": "external",
"summary": "1202660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202660"
},
{
"category": "external",
"summary": "1202681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202681"
},
{
"category": "external",
"summary": "1202816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202816"
},
{
"category": "external",
"summary": "1203003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203003"
},
{
"category": "external",
"summary": "1203168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203168"
},
{
"category": "external",
"summary": "1203184",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203184"
},
{
"category": "external",
"summary": "1203207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203207"
},
{
"category": "external",
"summary": "1203301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203301"
},
{
"category": "external",
"summary": "1203426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203426"
},
{
"category": "external",
"summary": "1203442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203442"
},
{
"category": "external",
"summary": "1203547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203547"
},
{
"category": "external",
"summary": "1203713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203713"
},
{
"category": "external",
"summary": "1204115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204115"
},
{
"category": "external",
"summary": "1204117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204117"
},
{
"category": "external",
"summary": "1204125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204125"
},
{
"category": "external",
"summary": "1204232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204232"
},
{
"category": "external",
"summary": "1204252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204252"
},
{
"category": "external",
"summary": "1204548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204548"
},
{
"category": "external",
"summary": "1204599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204599"
},
{
"category": "external",
"summary": "1204629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204629"
},
{
"category": "external",
"summary": "1204635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204635"
},
{
"category": "external",
"summary": "1204899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204899"
},
{
"category": "external",
"summary": "1204912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204912"
},
{
"category": "external",
"summary": "1204943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204943"
},
{
"category": "external",
"summary": "1205137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205137"
},
{
"category": "external",
"summary": "1205213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205213"
},
{
"category": "external",
"summary": "1205235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205235"
},
{
"category": "external",
"summary": "1205247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205247"
},
{
"category": "external",
"summary": "1205347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205347"
},
{
"category": "external",
"summary": "1205386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205386"
},
{
"category": "external",
"summary": "1205407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205407"
},
{
"category": "external",
"summary": "1205453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205453"
},
{
"category": "external",
"summary": "1205496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205496"
},
{
"category": "external",
"summary": "1205779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205779"
},
{
"category": "external",
"summary": "1205898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205898"
},
{
"category": "external",
"summary": "1205918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205918"
},
{
"category": "external",
"summary": "1205919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205919"
},
{
"category": "external",
"summary": "1205920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205920"
},
{
"category": "external",
"summary": "1206016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206016"
},
{
"category": "external",
"summary": "1206022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206022"
},
{
"category": "external",
"summary": "1206023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206023"
},
{
"category": "external",
"summary": "1206028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206028"
},
{
"category": "external",
"summary": "1206122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206122"
},
{
"category": "external",
"summary": "1206124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206124"
},
{
"category": "external",
"summary": "1206141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206141"
},
{
"category": "external",
"summary": "1206142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206142"
},
{
"category": "external",
"summary": "1206204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206204"
},
{
"category": "external",
"summary": "1206263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206263"
},
{
"category": "external",
"summary": "1206662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206662"
},
{
"category": "external",
"summary": "1206672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206672"
},
{
"category": "external",
"summary": "1206675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206675"
},
{
"category": "external",
"summary": "1206687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206687"
},
{
"category": "external",
"summary": "1206727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206727"
},
{
"category": "external",
"summary": "1206729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206729"
},
{
"category": "external",
"summary": "1207018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207018"
},
{
"category": "external",
"summary": "1207112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207112"
},
{
"category": "external",
"summary": "1207209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207209"
},
{
"category": "external",
"summary": "1207259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207259"
},
{
"category": "external",
"summary": "1207298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207298"
},
{
"category": "external",
"summary": "1207313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207313"
},
{
"category": "external",
"summary": "1207631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207631"
},
{
"category": "external",
"summary": "1207641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207641"
},
{
"category": "external",
"summary": "1207788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207788"
},
{
"category": "external",
"summary": "1207842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207842"
},
{
"category": "external",
"summary": "1207859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207859"
},
{
"category": "external",
"summary": "1207865",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207865"
},
{
"category": "external",
"summary": "1207895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207895"
},
{
"category": "external",
"summary": "1208129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208129"
},
{
"category": "external",
"summary": "1208152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208152"
},
{
"category": "external",
"summary": "1208258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208258"
},
{
"category": "external",
"summary": "1208642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208642"
},
{
"category": "external",
"summary": "1208698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208698"
},
{
"category": "external",
"summary": "1208852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208852"
},
{
"category": "external",
"summary": "1209015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209015"
},
{
"category": "external",
"summary": "1209262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209262"
},
{
"category": "external",
"summary": "1209421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209421"
},
{
"category": "external",
"summary": "1209557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209557"
},
{
"category": "external",
"summary": "1209629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209629"
},
{
"category": "external",
"summary": "1209641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209641"
},
{
"category": "external",
"summary": "1209642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209642"
},
{
"category": "external",
"summary": "1209711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209711"
},
{
"category": "external",
"summary": "1209756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209756"
},
{
"category": "external",
"summary": "1209847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209847"
},
{
"category": "external",
"summary": "1209945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209945"
},
{
"category": "external",
"summary": "1210089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210089"
},
{
"category": "external",
"summary": "1210094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210094"
},
{
"category": "external",
"summary": "1210277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210277"
},
{
"category": "external",
"summary": "1210376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210376"
},
{
"category": "external",
"summary": "1210385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210385"
},
{
"category": "external",
"summary": "1210507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210507"
},
{
"category": "external",
"summary": "1210761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210761"
},
{
"category": "external",
"summary": "1211121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211121"
},
{
"category": "external",
"summary": "1211125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211125"
},
{
"category": "external",
"summary": "1211209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211209"
},
{
"category": "external",
"summary": "1211241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211241"
},
{
"category": "external",
"summary": "1211249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211249"
},
{
"category": "external",
"summary": "1211306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211306"
},
{
"category": "external",
"summary": "1211308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211308"
},
{
"category": "external",
"summary": "1211364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211364"
},
{
"category": "external",
"summary": "1211385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211385"
},
{
"category": "external",
"summary": "1211392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211392"
},
{
"category": "external",
"summary": "1211409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211409"
},
{
"category": "external",
"summary": "1211410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211410"
},
{
"category": "external",
"summary": "1211489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211489"
},
{
"category": "external",
"summary": "1211553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211553"
},
{
"category": "external",
"summary": "1211592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211592"
},
{
"category": "external",
"summary": "1211620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211620"
},
{
"category": "external",
"summary": "1211652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211652"
},
{
"category": "external",
"summary": "1211687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211687"
},
{
"category": "external",
"summary": "1211693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211693"
},
{
"category": "external",
"summary": "1212052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212052"
},
{
"category": "external",
"summary": "1212123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212123"
},
{
"category": "external",
"summary": "1212164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212164"
},
{
"category": "external",
"summary": "1212382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212382"
},
{
"category": "external",
"summary": "1212411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212411"
},
{
"category": "external",
"summary": "1212423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212423"
},
{
"category": "external",
"summary": "1212428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212428"
},
{
"category": "external",
"summary": "1212466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212466"
},
{
"category": "external",
"summary": "1212534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212534"
},
{
"category": "external",
"summary": "1212656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212656"
},
{
"category": "external",
"summary": "1212687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212687"
},
{
"category": "external",
"summary": "1212778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212778"
},
{
"category": "external",
"summary": "1213014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213014"
},
{
"category": "external",
"summary": "1213044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213044"
},
{
"category": "external",
"summary": "1213145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213145"
},
{
"category": "external",
"summary": "1213378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213378"
},
{
"category": "external",
"summary": "1213533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213533"
},
{
"category": "external",
"summary": "1213553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213553"
},
{
"category": "external",
"summary": "1213570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213570"
},
{
"category": "external",
"summary": "1213853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213853"
},
{
"category": "external",
"summary": "1213863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213863"
},
{
"category": "external",
"summary": "1213874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213874"
},
{
"category": "external",
"summary": "1213939",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213939"
},
{
"category": "external",
"summary": "1214005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214005"
},
{
"category": "external",
"summary": "1214012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214012"
},
{
"category": "external",
"summary": "1214081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214081"
},
{
"category": "external",
"summary": "1214204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214204"
},
{
"category": "external",
"summary": "1214543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214543"
},
{
"category": "external",
"summary": "1214680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214680"
},
{
"category": "external",
"summary": "1214690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214690"
},
{
"category": "external",
"summary": "1214725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214725"
},
{
"category": "external",
"summary": "1214776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214776"
},
{
"category": "external",
"summary": "1214833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214833"
},
{
"category": "external",
"summary": "1214925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214925"
},
{
"category": "external",
"summary": "1215216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215216"
},
{
"category": "external",
"summary": "1215272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215272"
},
{
"category": "external",
"summary": "1215285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215285"
},
{
"category": "external",
"summary": "1215566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215566"
},
{
"category": "external",
"summary": "1215615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215615"
},
{
"category": "external",
"summary": "1215812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215812"
},
{
"category": "external",
"summary": "1216005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216005"
},
{
"category": "external",
"summary": "1216157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216157"
},
{
"category": "external",
"summary": "1216209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216209"
},
{
"category": "external",
"summary": "1216210",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216210"
},
{
"category": "external",
"summary": "1216222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216222"
},
{
"category": "external",
"summary": "1216224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216224"
},
{
"category": "external",
"summary": "1216969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216969"
},
{
"category": "external",
"summary": "1216978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216978"
},
{
"category": "external",
"summary": "1217161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217161"
},
{
"category": "external",
"summary": "1217195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217195"
},
{
"category": "external",
"summary": "1217216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217216"
},
{
"category": "external",
"summary": "1217253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217253"
},
{
"category": "external",
"summary": "1217257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217257"
},
{
"category": "external",
"summary": "1217262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217262"
},
{
"category": "external",
"summary": "1217324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217324"
},
{
"category": "external",
"summary": "1217336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217336"
},
{
"category": "external",
"summary": "1217348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217348"
},
{
"category": "external",
"summary": "1217391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217391"
},
{
"category": "external",
"summary": "1217394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217394"
},
{
"category": "external",
"summary": "1217532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217532"
},
{
"category": "external",
"summary": "1217597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217597"
},
{
"category": "external",
"summary": "1217601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217601"
},
{
"category": "external",
"summary": "1217637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217637"
},
{
"category": "external",
"summary": "1217812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217812"
},
{
"category": "external",
"summary": "1217818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217818"
},
{
"category": "external",
"summary": "1218406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218406"
},
{
"category": "external",
"summary": "1218429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218429"
},
{
"category": "external",
"summary": "1218436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218436"
},
{
"category": "external",
"summary": "1218441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218441"
},
{
"category": "external",
"summary": "1218607",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218607"
},
{
"category": "external",
"summary": "1218786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218786"
},
{
"category": "external",
"summary": "1218944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218944"
},
{
"category": "external",
"summary": "1219019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219019"
},
{
"category": "external",
"summary": "1219098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219098"
},
{
"category": "external",
"summary": "1219171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219171"
},
{
"category": "external",
"summary": "1219329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219329"
},
{
"category": "external",
"summary": "1219439",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219439"
},
{
"category": "external",
"summary": "1219614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219614"
},
{
"category": "external",
"summary": "1219642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219642"
},
{
"category": "external",
"summary": "1220383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220383"
},
{
"category": "external",
"summary": "1220516",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220516"
},
{
"category": "external",
"summary": "1220882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220882"
},
{
"category": "external",
"summary": "1220901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220901"
},
{
"category": "external",
"summary": "1221299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221299"
},
{
"category": "external",
"summary": "1221324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221324"
},
{
"category": "external",
"summary": "1221366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221366"
},
{
"category": "external",
"summary": "1221479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221479"
},
{
"category": "external",
"summary": "1221510",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221510"
},
{
"category": "external",
"summary": "1221716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221716"
},
{
"category": "external",
"summary": "1222035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222035"
},
{
"category": "external",
"summary": "1222138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222138"
},
{
"category": "external",
"summary": "1222615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222615"
},
{
"category": "external",
"summary": "1222616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222616"
},
{
"category": "external",
"summary": "1223042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223042"
},
{
"category": "external",
"summary": "1223835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223835"
},
{
"category": "external",
"summary": "1223934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223934"
},
{
"category": "external",
"summary": "1225173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225173"
},
{
"category": "external",
"summary": "1225178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225178"
},
{
"category": "external",
"summary": "1225205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225205"
},
{
"category": "external",
"summary": "1225377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225377"
},
{
"category": "external",
"summary": "1225662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225662"
},
{
"category": "external",
"summary": "1226428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1226428"
},
{
"category": "external",
"summary": "1227441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227441"
},
{
"category": "external",
"summary": "1228407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhba-2015_1100.json"
}
],
"title": "Red Hat Bug Fix Advisory: CFME 5.4.0 bug fixes, and enhancement update",
"tracking": {
"current_release_date": "2025-01-02T09:55:41+00:00",
"generator": {
"date": "2025-01-02T09:55:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.4"
}
},
"id": "RHBA-2015:1100",
"initial_release_date": "2015-06-16T12:28:42+00:00",
"revision_history": [
{
"date": "2015-06-16T12:28:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-06-16T12:28:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-01-02T09:55:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CloudForms Management Engine 5.4",
"product": {
"name": "CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cloudforms_managementengine:5::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat CloudForms"
},
{
"branches": [
{
"category": "product_version",
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-desktop@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-debuginfo@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-devel@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product": {
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product_id": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma@0.5.3-7.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product": {
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product_id": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma-debuginfo@0.5.3-7.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-debuginfo@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-progs@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-devel@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prince-0:9.0r2-4.el6cf.x86_64",
"product": {
"name": "prince-0:9.0r2-4.el6cf.x86_64",
"product_id": "prince-0:9.0r2-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prince@9.0r2-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product_id": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk@4.0P1-3.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product": {
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product_id": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk-devel@4.0P1-3.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product": {
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product_id": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin-debuginfo@1.0.0-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product_id": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin@1.0.0-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw-debuginfo@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw-gui@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging@0.20.2-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging-debuginfo@0.20.2-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product": {
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product_id": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi-debuginfo@1.3.14-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wmi-0:1.3.14-1.el6cf.x86_64",
"product": {
"name": "wmi-0:1.3.14-1.el6cf.x86_64",
"product_id": "wmi-0:1.3.14-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi@1.3.14-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg-debuginfo@0.12.2-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg@0.12.2-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine-debuginfo@1.0.7-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine@1.0.7-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json-debuginfo@1.8.2-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json@1.8.2-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri-debuginfo@1.5.11-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri@1.5.11-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby@3.0.1-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby-debuginfo@3.0.1-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra-debuginfo@1.2.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra@1.2.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych-debuginfo@2.0.13-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych@2.0.13-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi@1.9.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi-debuginfo@1.9.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin-debuginfo@1.3.1-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin@1.3.1-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer@0.11.0-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer-debuginfo@0.11.0-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-lib@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-debuginfo@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.4.0.5-1.el6cf?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product_id": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools@9.2.3-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "sneakernet_ca-0:0.1-2.el6cf.src",
"product": {
"name": "sneakernet_ca-0:0.1-2.el6cf.src",
"product_id": "sneakernet_ca-0:0.1-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sneakernet_ca@0.1-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-0:0.5.3-7.el6cf.src",
"product": {
"name": "pyliblzma-0:0.5.3-7.el6cf.src",
"product_id": "pyliblzma-0:0.5.3-7.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma@0.5.3-7.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "libdnet-0:1.12-11.el6cf.src",
"product": {
"name": "libdnet-0:1.12-11.el6cf.src",
"product_id": "libdnet-0:1.12-11.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet@1.12-11.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "prince-0:9.0r2-4.el6cf.src",
"product": {
"name": "prince-0:9.0r2-4.el6cf.src",
"product_id": "prince-0:9.0r2-4.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prince@9.0r2-4.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product_id": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk@4.0P1-3.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product_id": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin@1.0.0-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "lshw-0:B.02.16-4.el6cf.src",
"product": {
"name": "lshw-0:B.02.16-4.el6cf.src",
"product_id": "lshw-0:B.02.16-4.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw@B.02.16-4.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product_id": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging@0.20.2-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "wmi-0:1.3.14-1.el6cf.src",
"product": {
"name": "wmi-0:1.3.14-1.el6cf.src",
"product_id": "wmi-0:1.3.14-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi@1.3.14-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product_id": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg@0.12.2-9.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product_id": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine@1.0.7-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product_id": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json@1.8.2-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product_id": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri@1.5.11-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product_id": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby@3.0.1-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product_id": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra@1.2.8-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product_id": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych@2.0.13-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product_id": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi@1.9.8-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product_id": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin@1.3.1-9.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product_id": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer@0.11.0-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.4.0.5-1.el6cf.src",
"product": {
"name": "cfme-0:5.4.0.5-1.el6cf.src",
"product_id": "cfme-0:5.4.0.5-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.4.0.5-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product_id": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.4.0.5-1.el6cf?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product": {
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product_id": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sneakernet_ca@0.1-2.el6cf?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.4.0.5-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src"
},
"product_reference": "cfme-0:5.4.0.5-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src"
},
"product_reference": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src"
},
"product_reference": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64"
},
"product_reference": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64"
},
"product_reference": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-0:1.12-11.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src"
},
"product_reference": "libdnet-0:1.12-11.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-0:B.02.16-4.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src"
},
"product_reference": "lshw-0:B.02.16-4.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src"
},
"product_reference": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64"
},
"product_reference": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64"
},
"product_reference": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src"
},
"product_reference": "open-vm-tools-0:9.2.3-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prince-0:9.0r2-4.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src"
},
"product_reference": "prince-0:9.0r2-4.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prince-0:9.0r2-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64"
},
"product_reference": "prince-0:9.0r2-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-0:0.5.3-7.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src"
},
"product_reference": "pyliblzma-0:0.5.3-7.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64"
},
"product_reference": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64"
},
"product_reference": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src"
},
"product_reference": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src"
},
"product_reference": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src"
},
"product_reference": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src"
},
"product_reference": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch"
},
"product_reference": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sneakernet_ca-0:0.1-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src"
},
"product_reference": "sneakernet_ca-0:0.1-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-0:1.3.14-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src"
},
"product_reference": "wmi-0:1.3.14-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-0:1.3.14-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64"
},
"product_reference": "wmi-0:1.3.14-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
},
"product_reference": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ruby on Rails project"
]
},
{
"names": [
"Aaron Neyer"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-4389",
"cwe": {
"id": "CWE-134",
"name": "Use of Externally-Controlled Format String"
},
"discovery_date": "2013-09-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1013913"
}
],
"notes": [
{
"category": "description",
"text": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-actionmailer: email address processing DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue did not affect the versions of rubygem-actionmailer as shipped with Red Hat Subscription Asset Manager 1 as they do not include support for sending email using user supplied addresses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4389"
},
{
"category": "external",
"summary": "RHBZ#1013913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1013913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389"
}
],
"release_date": "2013-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-actionmailer: email address processing DoS"
},
{
"cve": "CVE-2013-4492",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1039435"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-i18n: cross-site scripting flaw in exception handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4492"
},
{
"category": "external",
"summary": "RHBZ#1039435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4492"
}
],
"release_date": "2013-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-i18n: cross-site scripting flaw in exception handling"
},
{
"acknowledgments": [
{
"names": [
"Ruby on Rails project"
]
}
],
"cve": "CVE-2014-7819",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2014-10-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1161527"
}
],
"notes": [
{
"category": "description",
"text": "Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-sprockets: arbitrary file existence disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-7819"
},
{
"category": "external",
"summary": "RHBZ#1161527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161527"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-7819",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7819"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY",
"url": "https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY"
}
],
"release_date": "2014-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-sprockets: arbitrary file existence disclosure"
},
{
"cve": "CVE-2015-1820",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2015-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1205291"
}
],
"notes": [
{
"category": "description",
"text": "REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "With the release of Satellite 6.9 available, this bug is being closed as wontfix as all parts of our Ruby stack are running under the SCL now with rest-client.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-1820"
},
{
"category": "external",
"summary": "RHBZ#1205291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1820"
}
],
"release_date": "2015-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses"
},
{
"cve": "CVE-2015-3448",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2015-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1240982"
}
],
"notes": [
{
"category": "description",
"text": "REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-rest-client: unsanitized application logging",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-3448"
},
{
"category": "external",
"summary": "RHBZ#1240982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240982"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-3448",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3448"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3448",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3448"
}
],
"release_date": "2015-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "workaround",
"details": "The permissions on log files can be changed, e.g. using \"chmod o-rwx\" to prevent anyone but the user and group owner of the file from reading it. Additionally the group permissions can also be removed, e.g. \"chmod g-rwx\" if only the user owning the file should be able to see it.",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-rest-client: unsanitized application logging"
}
]
}
CERTA-2013-AVI-591
Vulnerability from certfr_avis
Une vulnérabilité a été corrigée dans Ruby on Rails. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Ruby On Rail versions antérieures à 3.2.15
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eRuby On Rail versions ant\u00e9rieures \u00e0 3.2.15\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4389"
}
],
"initial_release_date": "2013-10-17T00:00:00",
"last_revision_date": "2013-10-17T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-591",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eRuby on\nRails\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Ruby on Rails",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails du 16 octobre 2013",
"url": "http://weblog.rubyonrails.org/2013/10/16/Rails-3-2-15-has-been-released/"
}
]
}
gsd-2013-4389
Vulnerability from gsd
Modified
2013-10-16 00:00
Details
Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2013-4389",
"description": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"id": "GSD-2013-4389",
"references": [
"https://www.suse.com/security/cve/CVE-2013-4389.html",
"https://www.debian.org/security/2014/dsa-2887",
"https://www.debian.org/security/2014/dsa-2888",
"https://access.redhat.com/errata/RHBA-2015:1100"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "actionmailer",
"purl": "pkg:gem/actionmailer"
}
}
],
"aliases": [
"CVE-2013-4389",
"OSVDB-98629"
],
"details": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"id": "GSD-2013-4389",
"modified": "2013-10-16T00:00:00.000Z",
"published": "2013-10-16T00:00:00.000Z",
"references": [
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": 4.3,
"type": "CVSS_V2"
}
],
"summary": "CVE-2013-4389 rubygem-actionmailer: email address processing DoS"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4389",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-2887",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"name": "openSUSE-SU-2014:0009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "openSUSE-SU-2013:1931",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"name": "openSUSE-SU-2013:1928",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "DSA-2888",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2888"
}
]
}
},
"github.com/rubysec/ruby-advisory-db": {
"cve": "2013-4389",
"cvss_v2": 4.3,
"date": "2013-10-16",
"description": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"gem": "actionmailer",
"osvdb": 98629,
"patched_versions": [
"\u003e= 3.2.15"
],
"title": "CVE-2013-4389 rubygem-actionmailer: email address processing DoS",
"unaffected_versions": [
"~\u003e 2.3.2"
],
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389"
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=3.0.0 \u003c3.2.15",
"affected_versions": "All versions starting from 3.0.0 before 3.2.15",
"credit": "Aaron Neyer",
"cvss_v2": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"cwe_ids": [
"CWE-1035",
"CWE-134",
"CWE-937"
],
"date": "2019-08-08",
"description": "A carefully crafted email address in conjunction with the Action Mailer logger format string could take advantage of a bug in Ruby\u0027s sprintf implementation and possibly lead to a denial of service attack. Impacted Ruby code will look something like this: `\"some string #{user_input}\" % some_number` ",
"fixed_versions": [
"3.2.15"
],
"identifier": "CVE-2013-4389",
"identifiers": [
"CVE-2013-4389"
],
"not_impacted": "4.0.x, 2.3.x",
"package_slug": "gem/actionmailer",
"pubdate": "2013-10-16",
"solution": "Upgrade to 3.2.15.\r\n\r\nIf you aren\u0027t able to upgrade immediately, please check the source link to apply patches.",
"title": "Possible DoS Vulnerability",
"urls": [
"http://seclists.org/oss-sec/2013/q4/118"
],
"uuid": "491cb17f-01de-4133-add2-4c5ae76139dc"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.2.15",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4389"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-134"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"refsource": "MLIST",
"tags": [
"Broken Link",
"Exploit"
],
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "openSUSE-SU-2013:1928",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "openSUSE-SU-2013:1931",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"name": "openSUSE-SU-2014:0009",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"name": "DSA-2888",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2888"
},
{
"name": "DSA-2887",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2887"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-05-19T16:52Z",
"publishedDate": "2013-10-17T00:55Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…