Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-4136 (GCVE-0-2007-4136)
Vulnerability from cvelistv5
Published
2007-11-14 00:00
Modified
2024-08-07 14:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:38.687Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "27611", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27611" }, { "name": "RHSA-2007:0640", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2007-0640.html" }, { "name": "oval:org.mitre.oval:def:9871", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871" }, { "name": "26393", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26393" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "name": "1018921", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018921" }, { "name": "rhel-congaricci-dos(38358)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38358" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "27611", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27611" }, { "name": "RHSA-2007:0640", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2007-0640.html" }, { "name": "oval:org.mitre.oval:def:9871", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871" }, { "name": "26393", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26393" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "name": "1018921", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018921" }, { "name": "rhel-congaricci-dos(38358)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38358" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-4136", "datePublished": "2007-11-14T00:00:00", "dateReserved": "2007-08-02T00:00:00", "dateUpdated": "2024-08-07T14:46:38.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-4136\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-11-14T00:46:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.\"},{\"lang\":\"es\",\"value\":\"El demonio ricci en Red Hat Conga versi\u00f3n 0.10.0, permite a atacantes remotos causar una denegaci\u00f3n de servicio (p\u00e9rdida de conexiones nuevas) mediante un env\u00edo de datos o intento de conexiones de manera repetitiva.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:conga:0.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F86EEB6B-0815-4D98-B082-6ADCECA6DCD6\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2007-0640.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/27611\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1018921\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/26393\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=336101\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/38358\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2007-0640.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/27611\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1018921\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/26393\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=336101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/38358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2007-4136
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2007-4136", "description": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.", "id": "GSD-2007-4136", "references": [ "https://access.redhat.com/errata/RHSA-2007:0983", "https://access.redhat.com/errata/RHSA-2007:0640", "https://linux.oracle.com/cve/CVE-2007-4136.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-4136" ], "details": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.", "id": "GSD-2007-4136", "modified": "2023-12-13T01:21:37.088378Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-4136", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rhn.redhat.com/errata/RHSA-2007-0640.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2007-0640.html" }, { "name": "http://secunia.com/advisories/27611", "refsource": "MISC", "url": "http://secunia.com/advisories/27611" }, { "name": "http://securitytracker.com/id?1018921", "refsource": "MISC", "url": "http://securitytracker.com/id?1018921" }, { "name": "http://www.securityfocus.com/bid/26393", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/26393" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38358", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38358" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=336101", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:conga:0.10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-4136" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=336101", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "name": "RHSA-2007:0640", "refsource": "REDHAT", "tags": [ "Patch" ], "url": "http://rhn.redhat.com/errata/RHSA-2007-0640.html" }, { "name": "1018921", "refsource": "SECTRACK", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1018921" }, { "name": "26393", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/26393" }, { "name": "27611", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27611" }, { "name": "rhel-congaricci-dos(38358)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38358" }, { "name": "oval:org.mitre.oval:def:9871", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-09-29T01:29Z", "publishedDate": "2007-11-14T00:46Z" } } }
rhsa-2007_0640
Vulnerability from csaf_redhat
Published
2007-11-07 09:00
Modified
2024-11-14 10:05
Summary
Red Hat Security Advisory: conga security, bug fix, and enhancement update
Notes
Topic
Updated conga packages that correct a security flaw and provide bug fixes
and add enhancements are now available.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The Conga package is a web-based administration tool for remote cluster and
storage management.
A flaw was found in ricci during a code audit. A remote attacker who is
able to connect to ricci could cause ricci to temporarily refuse additional
connections, a denial of service (CVE-2007-4136).
Fixes in this updated package include:
* The nodename is now set for manual fencing.
* The node log no longer displays in random order.
* A bug that prevented a node from responding when a cluster was deleted is
now fixed.
* A PAM configuration that incorrectly called the deprecated module
pam_stack was removed.
* A bug that prevented some quorum disk configurations from being accepted
is now fixed.
* Setting multicast addresses now works properly.
* rpm -V on luci no longer fails.
* The user interface rendering time for storage interface is now faster.
* An error message that incorrectly appeared when rebooting nodes during
cluster creation was removed.
* Cluster snaps configuration (an unsupported feature) has been removed
altogether to prevent user confusion.
* A user permission bug resulting from a luci code error is now fixed.
* luci and ricci init script return codes are now LSB-compliant.
* VG creation on cluster nodes now defaults to "clustered".
* An SELinux AVC bug that prevented users from setting up shared storage on
nodes is now fixed.
* An access error that occurred when attempting to access a cluster node
after its cluster was deleted is now fixed.
* IP addresses can now be used to create clusters.
* Attempting to configure a fence device no longer results in an
AttributeError.
* Attempting to create a new fence device to a valid cluster no longer
results in a KeyError.
* Several minor user interface validation errors have been fixed, such as
enforcing cluster name length and fence port, etc.
* A browser lock-up that could occur during storage configuration has been
fixed.
* Virtual service creation now works without error.
* The fence_xvm tag is no longer misspelled in the cluster.conf file.
* Luci failover forms are complete and working.
* Rebooting a fresh cluster install no longer generates an error message.
* A bug that prevented failed cluster services from being started is now
fixed.
* A bug that caused some cluster operations (e.g., node delete) to fail on
clusters with mixed-cased cluster names is now fixed.
* Global cluster resources can be reused when constructing cluster
services.
Enhancements in this updated package include:
* Users can now access Conga through Internet Explorer 6.
* Dead nodes can now be evicted from a cluster.
* Shared storage on new clusters is now enabled by default.
* The fence user-interface flow is now simpler.
* A port number is now shown in ricci error messages.
* The kmod-gfs-xen kernel module is now installed when creating a cluster.
* Cluster creation status is now shown visually.
* User names are now sorted for display.
* The fence_xvmd tag can now be added from the dom0 cluster nodes.
* The ampersand character (&) can now be used in fence names.
* All packaged files are now installed with proper owners and permissions.
* New cluster node members are now properly initialized.
* Storage operations can now be completed even if an LVM snapshot is present.
* Users are now informed via dialog when nodes are rebooted as part of a
cluster operation.
* Failover domains are now properly listed for virtual services and
traditional clustered services.
* Luci can now create and distribute keys for fence_xvmd.
All Conga users are advised to upgrade to this update, which applies these
fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated conga packages that correct a security flaw and provide bug fixes\nand add enhancements are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Conga package is a web-based administration tool for remote cluster and\nstorage management.\n\nA flaw was found in ricci during a code audit. A remote attacker who is\nable to connect to ricci could cause ricci to temporarily refuse additional\nconnections, a denial of service (CVE-2007-4136).\n\nFixes in this updated package include:\n\n* The nodename is now set for manual fencing.\n\n* The node log no longer displays in random order.\n\n* A bug that prevented a node from responding when a cluster was deleted is\nnow fixed.\n\n* A PAM configuration that incorrectly called the deprecated module\npam_stack was removed.\n\n* A bug that prevented some quorum disk configurations from being accepted\nis now fixed.\n\n* Setting multicast addresses now works properly.\n\n* rpm -V on luci no longer fails. \n\n* The user interface rendering time for storage interface is now faster.\n\n* An error message that incorrectly appeared when rebooting nodes during\ncluster creation was removed.\n\n* Cluster snaps configuration (an unsupported feature) has been removed\naltogether to prevent user confusion. \n\n* A user permission bug resulting from a luci code error is now fixed.\n\n* luci and ricci init script return codes are now LSB-compliant.\n\n* VG creation on cluster nodes now defaults to \"clustered\".\n\n* An SELinux AVC bug that prevented users from setting up shared storage on\nnodes is now fixed.\n\n* An access error that occurred when attempting to access a cluster node\nafter its cluster was deleted is now fixed.\n\n* IP addresses can now be used to create clusters. \n\n* Attempting to configure a fence device no longer results in an\nAttributeError.\n\n* Attempting to create a new fence device to a valid cluster no longer\nresults in a KeyError.\n\n* Several minor user interface validation errors have been fixed, such as\nenforcing cluster name length and fence port, etc.\n\n* A browser lock-up that could occur during storage configuration has been\nfixed.\n\n* Virtual service creation now works without error.\n\n* The fence_xvm tag is no longer misspelled in the cluster.conf file.\n\n* Luci failover forms are complete and working.\n* Rebooting a fresh cluster install no longer generates an error message.\n\n* A bug that prevented failed cluster services from being started is now\nfixed.\n\n* A bug that caused some cluster operations (e.g., node delete) to fail on\nclusters with mixed-cased cluster names is now fixed.\n\n* Global cluster resources can be reused when constructing cluster\nservices.\n\nEnhancements in this updated package include:\n\n* Users can now access Conga through Internet Explorer 6.\n\n* Dead nodes can now be evicted from a cluster.\n\n* Shared storage on new clusters is now enabled by default.\n\n* The fence user-interface flow is now simpler.\n\n* A port number is now shown in ricci error messages.\n\n* The kmod-gfs-xen kernel module is now installed when creating a cluster.\n\n* Cluster creation status is now shown visually.\n\n* User names are now sorted for display.\n\n* The fence_xvmd tag can now be added from the dom0 cluster nodes.\n\n* The ampersand character (\u0026) can now be used in fence names.\n\n* All packaged files are now installed with proper owners and permissions.\n\n* New cluster node members are now properly initialized.\n\n* Storage operations can now be completed even if an LVM snapshot is present.\n\n* Users are now informed via dialog when nodes are rebooted as part of a\ncluster operation.\n\n* Failover domains are now properly listed for virtual services and\ntraditional clustered services.\n\n* Luci can now create and distribute keys for fence_xvmd.\n\nAll Conga users are advised to upgrade to this update, which applies these\nfixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0640", "url": "https://access.redhat.com/errata/RHSA-2007:0640" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "212006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=212006" }, { "category": "external", "summary": "212022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=212022" }, { "category": "external", "summary": "213083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=213083" }, { "category": "external", "summary": "218964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=218964" }, { "category": "external", "summary": "221899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221899" }, { "category": "external", "summary": "222051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=222051" }, { "category": "external", "summary": "223162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223162" }, { "category": "external", "summary": "224011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224011" }, { "category": "external", "summary": "225164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225164" }, { "category": "external", "summary": "225206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225206" }, { "category": "external", "summary": "225588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225588" }, { "category": "external", "summary": "225747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225747" }, { "category": "external", "summary": "225782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225782" }, { "category": "external", "summary": "226700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=226700" }, { "category": "external", "summary": "227682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227682" }, { "category": "external", "summary": "227743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227743" }, { "category": "external", "summary": "227758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227758" }, { "category": "external", "summary": "227852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227852" }, { "category": "external", "summary": "229027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=229027" }, { "category": "external", "summary": "230447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230447" }, { "category": "external", "summary": "230452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230452" }, { "category": "external", "summary": "230454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230454" }, { "category": "external", "summary": "230457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230457" }, { "category": "external", "summary": "230461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230461" }, { "category": "external", "summary": "230469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230469" }, { "category": "external", "summary": "238655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238655" }, { "category": "external", "summary": "238726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238726" }, { "category": "external", "summary": "239327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239327" }, { "category": "external", "summary": "239388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239388" }, { "category": "external", "summary": "239389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239389" }, { "category": "external", "summary": "240034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240034" }, { "category": "external", "summary": "240361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240361" }, { "category": "external", "summary": "241415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241415" }, { "category": "external", "summary": "241418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241418" }, { "category": "external", "summary": "241706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241706" }, { "category": "external", "summary": "241727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241727" }, { "category": "external", "summary": "242668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242668" }, { "category": "external", "summary": "243701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=243701" }, { "category": "external", "summary": "244146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244146" }, { "category": "external", "summary": "244878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244878" }, { "category": "external", "summary": "245202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245202" }, { "category": "external", "summary": "248317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248317" }, { "category": "external", "summary": "249066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249066" }, { "category": "external", "summary": "249086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249086" }, { "category": "external", "summary": "249091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249091" }, { "category": "external", "summary": "249291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249291" }, { "category": "external", "summary": "249641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249641" }, { "category": "external", "summary": "249868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249868" }, { "category": "external", "summary": "250443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250443" }, { "category": "external", "summary": "250834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250834" }, { "category": "external", "summary": "253914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253914" }, { "category": "external", "summary": "253994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253994" }, { "category": "external", "summary": "254038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=254038" }, { "category": "external", "summary": "336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0640.json" } ], "title": "Red Hat Security Advisory: conga security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-14T10:05:31+00:00", "generator": { "date": "2024-11-14T10:05:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2007:0640", "initial_release_date": "2007-11-07T09:00:00+00:00", "revision_history": [ { "date": "2007-11-07T09:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-11-08T09:19:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:05:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Clustering (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:5" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product_id": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=ia64" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.ia64", "product": { "name": "ricci-0:0.10.0-6.el5.ia64", "product_id": "ricci-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=ia64" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.ia64", "product": { "name": "luci-0:0.10.0-6.el5.ia64", "product_id": "luci-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product_id": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=ppc" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.ppc", "product": { "name": "ricci-0:0.10.0-6.el5.ppc", "product_id": "ricci-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=ppc" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.ppc", "product": { "name": "luci-0:0.10.0-6.el5.ppc", "product_id": "luci-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product_id": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.x86_64", "product": { "name": "ricci-0:0.10.0-6.el5.x86_64", "product_id": "ricci-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.x86_64", "product": { "name": "luci-0:0.10.0-6.el5.x86_64", "product_id": "luci-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.i386", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.i386", "product_id": "conga-debuginfo-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=i386" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.i386", "product": { "name": "ricci-0:0.10.0-6.el5.i386", "product_id": "ricci-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=i386" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.i386", "product": { "name": "luci-0:0.10.0-6.el5.i386", "product_id": "luci-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "conga-0:0.10.0-6.el5.src", "product": { "name": "conga-0:0.10.0-6.el5.src", "product_id": "conga-0:0.10.0-6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga@0.10.0-6.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.10.0-6.el5.src as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-0:0.10.0-6.el5.src" }, "product_reference": "conga-0:0.10.0-6.el5.src", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.i386" }, "product_reference": "luci-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.ia64" }, "product_reference": "luci-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.ppc" }, "product_reference": "luci-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64" }, "product_reference": "luci-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.i386" }, "product_reference": "ricci-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64" }, "product_reference": "ricci-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc" }, "product_reference": "ricci-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" }, "product_reference": "ricci-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4136", "discovery_date": "2007-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "336101" } ], "notes": [ { "category": "description", "text": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "ricci is vulnerable to a connect DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4136" }, { "category": "external", "summary": "RHBZ#336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136" } ], "release_date": "2007-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-11-07T09:00:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0640" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ricci is vulnerable to a connect DoS attack" } ] }
RHSA-2007:0983
Vulnerability from csaf_redhat
Published
2007-11-21 21:51
Modified
2025-09-26 03:06
Summary
Red Hat Security Advisory: conga security, bug fix, and enhancement update
Notes
Topic
<Updated 29th November 2007>
Packages have been updated to include PowerPC and xenU packages.
Updated conga packages that fix a security flaw, several bugs, and add
enhancements are now available for Red Hat Cluster Suite.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The Conga package is a web-based administration tool for remote cluster and
storage management.
A flaw was found in ricci during a code audit. A remote attacker who is
able to connect to ricci could cause ricci to temporarily refuse additional
connections, resulting in a denial of service. (CVE-2007-4136)
Additionally, these updated packages fix the following bugs:
* entering an invalid password when creating a new cluster with the luci
web application caused a "UnboundLocalError" error.
* conga did not set the the "nodename" attribute for instances of manual
fencing, resulting in manual fencing being non-functional.
* conga did not provide a way to remove a dead node from a cluster.
Attempting to remove a dead node from a cluster resulted in an error,
reporting that that the node name cannot be reached.
* during cluster formation Conga reboots the cluster nodes. During reboot
errors about not being able to communicate with nodes are displayed. These
errors can safely be ignored, and have been removed in these updated
packages.
* when building a new cluster on Red Hat Enterprise Linux 4, Conga did not
generate node ID attributes for clusternode tags. The node ID attributes
are needed by programs such as qdisk.
* during Quorum Partition Configuration, a "TypeError" error occurred if
you did not configure heuristics.
* when passing arguments to fence_scsi, Conga used the "nodename" attribute
instead of the "node" attribute, resulting in an invalid XML file being
passed to fence_scsi. The "nodename" attribute is now supported.
* conga did not handle the restart operation correctly. In certain
situations this resulted in nodes not being started, stopped, and restarted
correctly. These issues were caused by clusters starting while others were
still in the process of stopping. This has been resolved in these updated
packages.
* probing storage using luci and the Mozilla Firefox 2 web browser on
Microsoft Windows XP appeared to never finish, when in fact it had. After
probing, clicking the node name in the storage list correctly showed the
storage for that node.
As well, these updated packages add the following enhancements:
* the Conga web interface now supports the Microsoft Internet Explorer web
browser, versions 6.0 and later.
* in previous packages, Conga required a minimum score to be configured
even when heuristics were not being used. A minimum score is no longer
required.
All Conga users are advised to upgrade to these updated packages, which
fix this vulnerability, resolve these issues, and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "\u003cUpdated 29th November 2007\u003e\nPackages have been updated to include PowerPC and xenU packages.\n\nUpdated conga packages that fix a security flaw, several bugs, and add\nenhancements are now available for Red Hat Cluster Suite.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Conga package is a web-based administration tool for remote cluster and\nstorage management.\n\nA flaw was found in ricci during a code audit. A remote attacker who is\nable to connect to ricci could cause ricci to temporarily refuse additional\nconnections, resulting in a denial of service. (CVE-2007-4136)\n\nAdditionally, these updated packages fix the following bugs:\n\n* entering an invalid password when creating a new cluster with the luci\nweb application caused a \"UnboundLocalError\" error.\n\n* conga did not set the the \"nodename\" attribute for instances of manual\nfencing, resulting in manual fencing being non-functional.\n\n* conga did not provide a way to remove a dead node from a cluster.\nAttempting to remove a dead node from a cluster resulted in an error,\nreporting that that the node name cannot be reached.\n\n* during cluster formation Conga reboots the cluster nodes. During reboot\nerrors about not being able to communicate with nodes are displayed. These\nerrors can safely be ignored, and have been removed in these updated\npackages.\n\n* when building a new cluster on Red Hat Enterprise Linux 4, Conga did not\ngenerate node ID attributes for clusternode tags. The node ID attributes\nare needed by programs such as qdisk.\n\n* during Quorum Partition Configuration, a \"TypeError\" error occurred if\nyou did not configure heuristics.\n\n* when passing arguments to fence_scsi, Conga used the \"nodename\" attribute\ninstead of the \"node\" attribute, resulting in an invalid XML file being\npassed to fence_scsi. The \"nodename\" attribute is now supported.\n\n* conga did not handle the restart operation correctly. In certain\nsituations this resulted in nodes not being started, stopped, and restarted\ncorrectly. These issues were caused by clusters starting while others were\nstill in the process of stopping. This has been resolved in these updated\npackages.\n\n* probing storage using luci and the Mozilla Firefox 2 web browser on\nMicrosoft Windows XP appeared to never finish, when in fact it had. After\nprobing, clicking the node name in the storage list correctly showed the\nstorage for that node.\n\nAs well, these updated packages add the following enhancements:\n\n* the Conga web interface now supports the Microsoft Internet Explorer web\nbrowser, versions 6.0 and later.\n\n* in previous packages, Conga required a minimum score to be configured\neven when heuristics were not being used. A minimum score is no longer\nrequired.\n\nAll Conga users are advised to upgrade to these updated packages, which\nfix this vulnerability, resolve these issues, and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0983", "url": "https://access.redhat.com/errata/RHSA-2007:0983" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "227723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227723" }, { "category": "external", "summary": "238656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238656" }, { "category": "external", "summary": "238727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238727" }, { "category": "external", "summary": "241414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241414" }, { "category": "external", "summary": "245200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245200" }, { "category": "external", "summary": "253901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253901" }, { "category": "external", "summary": "253905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253905" }, { "category": "external", "summary": "253906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253906" }, { "category": "external", "summary": "286951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=286951" }, { "category": "external", "summary": "325501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=325501" }, { "category": "external", "summary": "336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "external", "summary": "340101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=340101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0983.json" } ], "title": "Red Hat Security Advisory: conga security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-09-26T03:06:57+00:00", "generator": { "date": "2025-09-26T03:06:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2007:0983", "initial_release_date": "2007-11-21T21:51:00+00:00", "revision_history": [ { "date": "2007-11-21T21:51:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-11-29T12:36:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:06:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Cluster Suite 4AS", "product": { "name": "Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:4" } } }, { "category": "product_name", "name": "Red Hat Cluster Suite 4ES", "product": { "name": "Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:4" } } }, { "category": "product_name", "name": "Red Hat Cluster Suite 4WS", "product": { "name": "Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:4" } } } ], "category": "product_family", "name": "Red Hat Cluster Suite" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.ia64", "product": { "name": "ricci-0:0.11.0-3.ia64", "product_id": "ricci-0:0.11.0-3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=ia64" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.ia64", "product": { "name": "conga-debuginfo-0:0.11.0-3.ia64", "product_id": "conga-debuginfo-0:0.11.0-3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=ia64" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.ia64", "product": { "name": "luci-0:0.11.0-3.ia64", "product_id": "luci-0:0.11.0-3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.x86_64", "product": { "name": "ricci-0:0.11.0-3.x86_64", "product_id": "ricci-0:0.11.0-3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=x86_64" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.x86_64", "product": { "name": "conga-debuginfo-0:0.11.0-3.x86_64", "product_id": "conga-debuginfo-0:0.11.0-3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=x86_64" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.x86_64", "product": { "name": "luci-0:0.11.0-3.x86_64", "product_id": "luci-0:0.11.0-3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.i386", "product": { "name": "ricci-0:0.11.0-3.i386", "product_id": "ricci-0:0.11.0-3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=i386" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.i386", "product": { "name": "conga-debuginfo-0:0.11.0-3.i386", "product_id": "conga-debuginfo-0:0.11.0-3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=i386" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.i386", "product": { "name": "luci-0:0.11.0-3.i386", "product_id": "luci-0:0.11.0-3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "conga-0:0.11.0-3.src", "product": { "name": "conga-0:0.11.0-3.src", "product_id": "conga-0:0.11.0-3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga@0.11.0-3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.ppc", "product": { "name": "ricci-0:0.11.0-3.ppc", "product_id": "ricci-0:0.11.0-3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=ppc" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.ppc", "product": { "name": "conga-debuginfo-0:0.11.0-3.ppc", "product_id": "conga-debuginfo-0:0.11.0-3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=ppc" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.ppc", "product": { "name": "luci-0:0.11.0-3.ppc", "product_id": "luci-0:0.11.0-3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.11.0-3.src as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-0:0.11.0-3.src" }, "product_reference": "conga-0:0.11.0-3.src", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386" }, "product_reference": "conga-debuginfo-0:0.11.0-3.i386", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ia64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ppc", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.x86_64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.i386" }, "product_reference": "luci-0:0.11.0-3.i386", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.ia64" }, "product_reference": "luci-0:0.11.0-3.ia64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.ppc" }, "product_reference": "luci-0:0.11.0-3.ppc", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.x86_64" }, "product_reference": "luci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.i386" }, "product_reference": "ricci-0:0.11.0-3.i386", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.ia64" }, "product_reference": "ricci-0:0.11.0-3.ia64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.ppc" }, "product_reference": "ricci-0:0.11.0-3.ppc", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.x86_64" }, "product_reference": "ricci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.11.0-3.src as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-0:0.11.0-3.src" }, "product_reference": "conga-0:0.11.0-3.src", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386" }, "product_reference": "conga-debuginfo-0:0.11.0-3.i386", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ia64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ppc", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.x86_64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.i386" }, "product_reference": "luci-0:0.11.0-3.i386", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.ia64" }, "product_reference": "luci-0:0.11.0-3.ia64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.ppc" }, "product_reference": "luci-0:0.11.0-3.ppc", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.x86_64" }, "product_reference": "luci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.i386" }, "product_reference": "ricci-0:0.11.0-3.i386", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.ia64" }, "product_reference": "ricci-0:0.11.0-3.ia64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.ppc" }, "product_reference": "ricci-0:0.11.0-3.ppc", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.x86_64" }, "product_reference": "ricci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.11.0-3.src as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-0:0.11.0-3.src" }, "product_reference": "conga-0:0.11.0-3.src", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386" }, "product_reference": "conga-debuginfo-0:0.11.0-3.i386", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ia64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ppc", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.x86_64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.i386" }, "product_reference": "luci-0:0.11.0-3.i386", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.ia64" }, "product_reference": "luci-0:0.11.0-3.ia64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.ppc" }, "product_reference": "luci-0:0.11.0-3.ppc", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.x86_64" }, "product_reference": "luci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.i386" }, "product_reference": "ricci-0:0.11.0-3.i386", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.ia64" }, "product_reference": "ricci-0:0.11.0-3.ia64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.ppc" }, "product_reference": "ricci-0:0.11.0-3.ppc", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.x86_64" }, "product_reference": "ricci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4WS-cluster" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4136", "discovery_date": "2007-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "336101" } ], "notes": [ { "category": "description", "text": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "ricci is vulnerable to a connect DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-cluster:conga-0:0.11.0-3.src", "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4AS-cluster:luci-0:0.11.0-3.i386", "4AS-cluster:luci-0:0.11.0-3.ia64", "4AS-cluster:luci-0:0.11.0-3.ppc", "4AS-cluster:luci-0:0.11.0-3.x86_64", "4AS-cluster:ricci-0:0.11.0-3.i386", "4AS-cluster:ricci-0:0.11.0-3.ia64", "4AS-cluster:ricci-0:0.11.0-3.ppc", "4AS-cluster:ricci-0:0.11.0-3.x86_64", "4ES-cluster:conga-0:0.11.0-3.src", "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4ES-cluster:luci-0:0.11.0-3.i386", "4ES-cluster:luci-0:0.11.0-3.ia64", "4ES-cluster:luci-0:0.11.0-3.ppc", "4ES-cluster:luci-0:0.11.0-3.x86_64", "4ES-cluster:ricci-0:0.11.0-3.i386", "4ES-cluster:ricci-0:0.11.0-3.ia64", "4ES-cluster:ricci-0:0.11.0-3.ppc", "4ES-cluster:ricci-0:0.11.0-3.x86_64", "4WS-cluster:conga-0:0.11.0-3.src", "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4WS-cluster:luci-0:0.11.0-3.i386", "4WS-cluster:luci-0:0.11.0-3.ia64", "4WS-cluster:luci-0:0.11.0-3.ppc", "4WS-cluster:luci-0:0.11.0-3.x86_64", "4WS-cluster:ricci-0:0.11.0-3.i386", "4WS-cluster:ricci-0:0.11.0-3.ia64", "4WS-cluster:ricci-0:0.11.0-3.ppc", "4WS-cluster:ricci-0:0.11.0-3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4136" }, { "category": "external", "summary": "RHBZ#336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136" } ], "release_date": "2007-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-11-21T21:51:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-cluster:conga-0:0.11.0-3.src", "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4AS-cluster:luci-0:0.11.0-3.i386", "4AS-cluster:luci-0:0.11.0-3.ia64", "4AS-cluster:luci-0:0.11.0-3.ppc", "4AS-cluster:luci-0:0.11.0-3.x86_64", "4AS-cluster:ricci-0:0.11.0-3.i386", "4AS-cluster:ricci-0:0.11.0-3.ia64", "4AS-cluster:ricci-0:0.11.0-3.ppc", "4AS-cluster:ricci-0:0.11.0-3.x86_64", "4ES-cluster:conga-0:0.11.0-3.src", "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4ES-cluster:luci-0:0.11.0-3.i386", "4ES-cluster:luci-0:0.11.0-3.ia64", "4ES-cluster:luci-0:0.11.0-3.ppc", "4ES-cluster:luci-0:0.11.0-3.x86_64", "4ES-cluster:ricci-0:0.11.0-3.i386", "4ES-cluster:ricci-0:0.11.0-3.ia64", "4ES-cluster:ricci-0:0.11.0-3.ppc", "4ES-cluster:ricci-0:0.11.0-3.x86_64", "4WS-cluster:conga-0:0.11.0-3.src", "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4WS-cluster:luci-0:0.11.0-3.i386", "4WS-cluster:luci-0:0.11.0-3.ia64", "4WS-cluster:luci-0:0.11.0-3.ppc", "4WS-cluster:luci-0:0.11.0-3.x86_64", "4WS-cluster:ricci-0:0.11.0-3.i386", "4WS-cluster:ricci-0:0.11.0-3.ia64", "4WS-cluster:ricci-0:0.11.0-3.ppc", "4WS-cluster:ricci-0:0.11.0-3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0983" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-cluster:conga-0:0.11.0-3.src", "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4AS-cluster:luci-0:0.11.0-3.i386", "4AS-cluster:luci-0:0.11.0-3.ia64", "4AS-cluster:luci-0:0.11.0-3.ppc", "4AS-cluster:luci-0:0.11.0-3.x86_64", "4AS-cluster:ricci-0:0.11.0-3.i386", "4AS-cluster:ricci-0:0.11.0-3.ia64", "4AS-cluster:ricci-0:0.11.0-3.ppc", "4AS-cluster:ricci-0:0.11.0-3.x86_64", "4ES-cluster:conga-0:0.11.0-3.src", "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4ES-cluster:luci-0:0.11.0-3.i386", "4ES-cluster:luci-0:0.11.0-3.ia64", "4ES-cluster:luci-0:0.11.0-3.ppc", "4ES-cluster:luci-0:0.11.0-3.x86_64", "4ES-cluster:ricci-0:0.11.0-3.i386", "4ES-cluster:ricci-0:0.11.0-3.ia64", "4ES-cluster:ricci-0:0.11.0-3.ppc", "4ES-cluster:ricci-0:0.11.0-3.x86_64", "4WS-cluster:conga-0:0.11.0-3.src", "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4WS-cluster:luci-0:0.11.0-3.i386", "4WS-cluster:luci-0:0.11.0-3.ia64", "4WS-cluster:luci-0:0.11.0-3.ppc", "4WS-cluster:luci-0:0.11.0-3.x86_64", "4WS-cluster:ricci-0:0.11.0-3.i386", "4WS-cluster:ricci-0:0.11.0-3.ia64", "4WS-cluster:ricci-0:0.11.0-3.ppc", "4WS-cluster:ricci-0:0.11.0-3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ricci is vulnerable to a connect DoS attack" } ] }
rhsa-2007:0640
Vulnerability from csaf_redhat
Published
2007-11-07 09:00
Modified
2025-09-26 03:06
Summary
Red Hat Security Advisory: conga security, bug fix, and enhancement update
Notes
Topic
Updated conga packages that correct a security flaw and provide bug fixes
and add enhancements are now available.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The Conga package is a web-based administration tool for remote cluster and
storage management.
A flaw was found in ricci during a code audit. A remote attacker who is
able to connect to ricci could cause ricci to temporarily refuse additional
connections, a denial of service (CVE-2007-4136).
Fixes in this updated package include:
* The nodename is now set for manual fencing.
* The node log no longer displays in random order.
* A bug that prevented a node from responding when a cluster was deleted is
now fixed.
* A PAM configuration that incorrectly called the deprecated module
pam_stack was removed.
* A bug that prevented some quorum disk configurations from being accepted
is now fixed.
* Setting multicast addresses now works properly.
* rpm -V on luci no longer fails.
* The user interface rendering time for storage interface is now faster.
* An error message that incorrectly appeared when rebooting nodes during
cluster creation was removed.
* Cluster snaps configuration (an unsupported feature) has been removed
altogether to prevent user confusion.
* A user permission bug resulting from a luci code error is now fixed.
* luci and ricci init script return codes are now LSB-compliant.
* VG creation on cluster nodes now defaults to "clustered".
* An SELinux AVC bug that prevented users from setting up shared storage on
nodes is now fixed.
* An access error that occurred when attempting to access a cluster node
after its cluster was deleted is now fixed.
* IP addresses can now be used to create clusters.
* Attempting to configure a fence device no longer results in an
AttributeError.
* Attempting to create a new fence device to a valid cluster no longer
results in a KeyError.
* Several minor user interface validation errors have been fixed, such as
enforcing cluster name length and fence port, etc.
* A browser lock-up that could occur during storage configuration has been
fixed.
* Virtual service creation now works without error.
* The fence_xvm tag is no longer misspelled in the cluster.conf file.
* Luci failover forms are complete and working.
* Rebooting a fresh cluster install no longer generates an error message.
* A bug that prevented failed cluster services from being started is now
fixed.
* A bug that caused some cluster operations (e.g., node delete) to fail on
clusters with mixed-cased cluster names is now fixed.
* Global cluster resources can be reused when constructing cluster
services.
Enhancements in this updated package include:
* Users can now access Conga through Internet Explorer 6.
* Dead nodes can now be evicted from a cluster.
* Shared storage on new clusters is now enabled by default.
* The fence user-interface flow is now simpler.
* A port number is now shown in ricci error messages.
* The kmod-gfs-xen kernel module is now installed when creating a cluster.
* Cluster creation status is now shown visually.
* User names are now sorted for display.
* The fence_xvmd tag can now be added from the dom0 cluster nodes.
* The ampersand character (&) can now be used in fence names.
* All packaged files are now installed with proper owners and permissions.
* New cluster node members are now properly initialized.
* Storage operations can now be completed even if an LVM snapshot is present.
* Users are now informed via dialog when nodes are rebooted as part of a
cluster operation.
* Failover domains are now properly listed for virtual services and
traditional clustered services.
* Luci can now create and distribute keys for fence_xvmd.
All Conga users are advised to upgrade to this update, which applies these
fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated conga packages that correct a security flaw and provide bug fixes\nand add enhancements are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Conga package is a web-based administration tool for remote cluster and\nstorage management.\n\nA flaw was found in ricci during a code audit. A remote attacker who is\nable to connect to ricci could cause ricci to temporarily refuse additional\nconnections, a denial of service (CVE-2007-4136).\n\nFixes in this updated package include:\n\n* The nodename is now set for manual fencing.\n\n* The node log no longer displays in random order.\n\n* A bug that prevented a node from responding when a cluster was deleted is\nnow fixed.\n\n* A PAM configuration that incorrectly called the deprecated module\npam_stack was removed.\n\n* A bug that prevented some quorum disk configurations from being accepted\nis now fixed.\n\n* Setting multicast addresses now works properly.\n\n* rpm -V on luci no longer fails. \n\n* The user interface rendering time for storage interface is now faster.\n\n* An error message that incorrectly appeared when rebooting nodes during\ncluster creation was removed.\n\n* Cluster snaps configuration (an unsupported feature) has been removed\naltogether to prevent user confusion. \n\n* A user permission bug resulting from a luci code error is now fixed.\n\n* luci and ricci init script return codes are now LSB-compliant.\n\n* VG creation on cluster nodes now defaults to \"clustered\".\n\n* An SELinux AVC bug that prevented users from setting up shared storage on\nnodes is now fixed.\n\n* An access error that occurred when attempting to access a cluster node\nafter its cluster was deleted is now fixed.\n\n* IP addresses can now be used to create clusters. \n\n* Attempting to configure a fence device no longer results in an\nAttributeError.\n\n* Attempting to create a new fence device to a valid cluster no longer\nresults in a KeyError.\n\n* Several minor user interface validation errors have been fixed, such as\nenforcing cluster name length and fence port, etc.\n\n* A browser lock-up that could occur during storage configuration has been\nfixed.\n\n* Virtual service creation now works without error.\n\n* The fence_xvm tag is no longer misspelled in the cluster.conf file.\n\n* Luci failover forms are complete and working.\n* Rebooting a fresh cluster install no longer generates an error message.\n\n* A bug that prevented failed cluster services from being started is now\nfixed.\n\n* A bug that caused some cluster operations (e.g., node delete) to fail on\nclusters with mixed-cased cluster names is now fixed.\n\n* Global cluster resources can be reused when constructing cluster\nservices.\n\nEnhancements in this updated package include:\n\n* Users can now access Conga through Internet Explorer 6.\n\n* Dead nodes can now be evicted from a cluster.\n\n* Shared storage on new clusters is now enabled by default.\n\n* The fence user-interface flow is now simpler.\n\n* A port number is now shown in ricci error messages.\n\n* The kmod-gfs-xen kernel module is now installed when creating a cluster.\n\n* Cluster creation status is now shown visually.\n\n* User names are now sorted for display.\n\n* The fence_xvmd tag can now be added from the dom0 cluster nodes.\n\n* The ampersand character (\u0026) can now be used in fence names.\n\n* All packaged files are now installed with proper owners and permissions.\n\n* New cluster node members are now properly initialized.\n\n* Storage operations can now be completed even if an LVM snapshot is present.\n\n* Users are now informed via dialog when nodes are rebooted as part of a\ncluster operation.\n\n* Failover domains are now properly listed for virtual services and\ntraditional clustered services.\n\n* Luci can now create and distribute keys for fence_xvmd.\n\nAll Conga users are advised to upgrade to this update, which applies these\nfixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0640", "url": "https://access.redhat.com/errata/RHSA-2007:0640" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "212006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=212006" }, { "category": "external", "summary": "212022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=212022" }, { "category": "external", "summary": "213083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=213083" }, { "category": "external", "summary": "218964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=218964" }, { "category": "external", "summary": "221899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221899" }, { "category": "external", "summary": "222051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=222051" }, { "category": "external", "summary": "223162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223162" }, { "category": "external", "summary": "224011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224011" }, { "category": "external", "summary": "225164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225164" }, { "category": "external", "summary": "225206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225206" }, { "category": "external", "summary": "225588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225588" }, { "category": "external", "summary": "225747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225747" }, { "category": "external", "summary": "225782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225782" }, { "category": "external", "summary": "226700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=226700" }, { "category": "external", "summary": "227682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227682" }, { "category": "external", "summary": "227743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227743" }, { "category": "external", "summary": "227758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227758" }, { "category": "external", "summary": "227852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227852" }, { "category": "external", "summary": "229027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=229027" }, { "category": "external", "summary": "230447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230447" }, { "category": "external", "summary": "230452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230452" }, { "category": "external", "summary": "230454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230454" }, { "category": "external", "summary": "230457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230457" }, { "category": "external", "summary": "230461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230461" }, { "category": "external", "summary": "230469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230469" }, { "category": "external", "summary": "238655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238655" }, { "category": "external", "summary": "238726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238726" }, { "category": "external", "summary": "239327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239327" }, { "category": "external", "summary": "239388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239388" }, { "category": "external", "summary": "239389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239389" }, { "category": "external", "summary": "240034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240034" }, { "category": "external", "summary": "240361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240361" }, { "category": "external", "summary": "241415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241415" }, { "category": "external", "summary": "241418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241418" }, { "category": "external", "summary": "241706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241706" }, { "category": "external", "summary": "241727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241727" }, { "category": "external", "summary": "242668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242668" }, { "category": "external", "summary": "243701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=243701" }, { "category": "external", "summary": "244146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244146" }, { "category": "external", "summary": "244878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244878" }, { "category": "external", "summary": "245202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245202" }, { "category": "external", "summary": "248317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248317" }, { "category": "external", "summary": "249066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249066" }, { "category": "external", "summary": "249086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249086" }, { "category": "external", "summary": "249091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249091" }, { "category": "external", "summary": "249291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249291" }, { "category": "external", "summary": "249641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249641" }, { "category": "external", "summary": "249868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249868" }, { "category": "external", "summary": "250443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250443" }, { "category": "external", "summary": "250834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250834" }, { "category": "external", "summary": "253914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253914" }, { "category": "external", "summary": "253994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253994" }, { "category": "external", "summary": "254038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=254038" }, { "category": "external", "summary": "336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0640.json" } ], "title": "Red Hat Security Advisory: conga security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-09-26T03:06:55+00:00", "generator": { "date": "2025-09-26T03:06:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2007:0640", "initial_release_date": "2007-11-07T09:00:00+00:00", "revision_history": [ { "date": "2007-11-07T09:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-11-08T09:19:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:06:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Clustering (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:5" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product_id": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=ia64" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.ia64", "product": { "name": "ricci-0:0.10.0-6.el5.ia64", "product_id": "ricci-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=ia64" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.ia64", "product": { "name": "luci-0:0.10.0-6.el5.ia64", "product_id": "luci-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product_id": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=ppc" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.ppc", "product": { "name": "ricci-0:0.10.0-6.el5.ppc", "product_id": "ricci-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=ppc" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.ppc", "product": { "name": "luci-0:0.10.0-6.el5.ppc", "product_id": "luci-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product_id": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.x86_64", "product": { "name": "ricci-0:0.10.0-6.el5.x86_64", "product_id": "ricci-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.x86_64", "product": { "name": "luci-0:0.10.0-6.el5.x86_64", "product_id": "luci-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.i386", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.i386", "product_id": "conga-debuginfo-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=i386" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.i386", "product": { "name": "ricci-0:0.10.0-6.el5.i386", "product_id": "ricci-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=i386" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.i386", "product": { "name": "luci-0:0.10.0-6.el5.i386", "product_id": "luci-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "conga-0:0.10.0-6.el5.src", "product": { "name": "conga-0:0.10.0-6.el5.src", "product_id": "conga-0:0.10.0-6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga@0.10.0-6.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.10.0-6.el5.src as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-0:0.10.0-6.el5.src" }, "product_reference": "conga-0:0.10.0-6.el5.src", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.i386" }, "product_reference": "luci-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.ia64" }, "product_reference": "luci-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.ppc" }, "product_reference": "luci-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64" }, "product_reference": "luci-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.i386" }, "product_reference": "ricci-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64" }, "product_reference": "ricci-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc" }, "product_reference": "ricci-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" }, "product_reference": "ricci-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4136", "discovery_date": "2007-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "336101" } ], "notes": [ { "category": "description", "text": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "ricci is vulnerable to a connect DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4136" }, { "category": "external", "summary": "RHBZ#336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136" } ], "release_date": "2007-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-11-07T09:00:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0640" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ricci is vulnerable to a connect DoS attack" } ] }
RHSA-2007:0640
Vulnerability from csaf_redhat
Published
2007-11-07 09:00
Modified
2025-09-26 03:06
Summary
Red Hat Security Advisory: conga security, bug fix, and enhancement update
Notes
Topic
Updated conga packages that correct a security flaw and provide bug fixes
and add enhancements are now available.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The Conga package is a web-based administration tool for remote cluster and
storage management.
A flaw was found in ricci during a code audit. A remote attacker who is
able to connect to ricci could cause ricci to temporarily refuse additional
connections, a denial of service (CVE-2007-4136).
Fixes in this updated package include:
* The nodename is now set for manual fencing.
* The node log no longer displays in random order.
* A bug that prevented a node from responding when a cluster was deleted is
now fixed.
* A PAM configuration that incorrectly called the deprecated module
pam_stack was removed.
* A bug that prevented some quorum disk configurations from being accepted
is now fixed.
* Setting multicast addresses now works properly.
* rpm -V on luci no longer fails.
* The user interface rendering time for storage interface is now faster.
* An error message that incorrectly appeared when rebooting nodes during
cluster creation was removed.
* Cluster snaps configuration (an unsupported feature) has been removed
altogether to prevent user confusion.
* A user permission bug resulting from a luci code error is now fixed.
* luci and ricci init script return codes are now LSB-compliant.
* VG creation on cluster nodes now defaults to "clustered".
* An SELinux AVC bug that prevented users from setting up shared storage on
nodes is now fixed.
* An access error that occurred when attempting to access a cluster node
after its cluster was deleted is now fixed.
* IP addresses can now be used to create clusters.
* Attempting to configure a fence device no longer results in an
AttributeError.
* Attempting to create a new fence device to a valid cluster no longer
results in a KeyError.
* Several minor user interface validation errors have been fixed, such as
enforcing cluster name length and fence port, etc.
* A browser lock-up that could occur during storage configuration has been
fixed.
* Virtual service creation now works without error.
* The fence_xvm tag is no longer misspelled in the cluster.conf file.
* Luci failover forms are complete and working.
* Rebooting a fresh cluster install no longer generates an error message.
* A bug that prevented failed cluster services from being started is now
fixed.
* A bug that caused some cluster operations (e.g., node delete) to fail on
clusters with mixed-cased cluster names is now fixed.
* Global cluster resources can be reused when constructing cluster
services.
Enhancements in this updated package include:
* Users can now access Conga through Internet Explorer 6.
* Dead nodes can now be evicted from a cluster.
* Shared storage on new clusters is now enabled by default.
* The fence user-interface flow is now simpler.
* A port number is now shown in ricci error messages.
* The kmod-gfs-xen kernel module is now installed when creating a cluster.
* Cluster creation status is now shown visually.
* User names are now sorted for display.
* The fence_xvmd tag can now be added from the dom0 cluster nodes.
* The ampersand character (&) can now be used in fence names.
* All packaged files are now installed with proper owners and permissions.
* New cluster node members are now properly initialized.
* Storage operations can now be completed even if an LVM snapshot is present.
* Users are now informed via dialog when nodes are rebooted as part of a
cluster operation.
* Failover domains are now properly listed for virtual services and
traditional clustered services.
* Luci can now create and distribute keys for fence_xvmd.
All Conga users are advised to upgrade to this update, which applies these
fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated conga packages that correct a security flaw and provide bug fixes\nand add enhancements are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Conga package is a web-based administration tool for remote cluster and\nstorage management.\n\nA flaw was found in ricci during a code audit. A remote attacker who is\nable to connect to ricci could cause ricci to temporarily refuse additional\nconnections, a denial of service (CVE-2007-4136).\n\nFixes in this updated package include:\n\n* The nodename is now set for manual fencing.\n\n* The node log no longer displays in random order.\n\n* A bug that prevented a node from responding when a cluster was deleted is\nnow fixed.\n\n* A PAM configuration that incorrectly called the deprecated module\npam_stack was removed.\n\n* A bug that prevented some quorum disk configurations from being accepted\nis now fixed.\n\n* Setting multicast addresses now works properly.\n\n* rpm -V on luci no longer fails. \n\n* The user interface rendering time for storage interface is now faster.\n\n* An error message that incorrectly appeared when rebooting nodes during\ncluster creation was removed.\n\n* Cluster snaps configuration (an unsupported feature) has been removed\naltogether to prevent user confusion. \n\n* A user permission bug resulting from a luci code error is now fixed.\n\n* luci and ricci init script return codes are now LSB-compliant.\n\n* VG creation on cluster nodes now defaults to \"clustered\".\n\n* An SELinux AVC bug that prevented users from setting up shared storage on\nnodes is now fixed.\n\n* An access error that occurred when attempting to access a cluster node\nafter its cluster was deleted is now fixed.\n\n* IP addresses can now be used to create clusters. \n\n* Attempting to configure a fence device no longer results in an\nAttributeError.\n\n* Attempting to create a new fence device to a valid cluster no longer\nresults in a KeyError.\n\n* Several minor user interface validation errors have been fixed, such as\nenforcing cluster name length and fence port, etc.\n\n* A browser lock-up that could occur during storage configuration has been\nfixed.\n\n* Virtual service creation now works without error.\n\n* The fence_xvm tag is no longer misspelled in the cluster.conf file.\n\n* Luci failover forms are complete and working.\n* Rebooting a fresh cluster install no longer generates an error message.\n\n* A bug that prevented failed cluster services from being started is now\nfixed.\n\n* A bug that caused some cluster operations (e.g., node delete) to fail on\nclusters with mixed-cased cluster names is now fixed.\n\n* Global cluster resources can be reused when constructing cluster\nservices.\n\nEnhancements in this updated package include:\n\n* Users can now access Conga through Internet Explorer 6.\n\n* Dead nodes can now be evicted from a cluster.\n\n* Shared storage on new clusters is now enabled by default.\n\n* The fence user-interface flow is now simpler.\n\n* A port number is now shown in ricci error messages.\n\n* The kmod-gfs-xen kernel module is now installed when creating a cluster.\n\n* Cluster creation status is now shown visually.\n\n* User names are now sorted for display.\n\n* The fence_xvmd tag can now be added from the dom0 cluster nodes.\n\n* The ampersand character (\u0026) can now be used in fence names.\n\n* All packaged files are now installed with proper owners and permissions.\n\n* New cluster node members are now properly initialized.\n\n* Storage operations can now be completed even if an LVM snapshot is present.\n\n* Users are now informed via dialog when nodes are rebooted as part of a\ncluster operation.\n\n* Failover domains are now properly listed for virtual services and\ntraditional clustered services.\n\n* Luci can now create and distribute keys for fence_xvmd.\n\nAll Conga users are advised to upgrade to this update, which applies these\nfixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0640", "url": "https://access.redhat.com/errata/RHSA-2007:0640" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "212006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=212006" }, { "category": "external", "summary": "212022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=212022" }, { "category": "external", "summary": "213083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=213083" }, { "category": "external", "summary": "218964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=218964" }, { "category": "external", "summary": "221899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221899" }, { "category": "external", "summary": "222051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=222051" }, { "category": "external", "summary": "223162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223162" }, { "category": "external", "summary": "224011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224011" }, { "category": "external", "summary": "225164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225164" }, { "category": "external", "summary": "225206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225206" }, { "category": "external", "summary": "225588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225588" }, { "category": "external", "summary": "225747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225747" }, { "category": "external", "summary": "225782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225782" }, { "category": "external", "summary": "226700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=226700" }, { "category": "external", "summary": "227682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227682" }, { "category": "external", "summary": "227743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227743" }, { "category": "external", "summary": "227758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227758" }, { "category": "external", "summary": "227852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227852" }, { "category": "external", "summary": "229027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=229027" }, { "category": "external", "summary": "230447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230447" }, { "category": "external", "summary": "230452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230452" }, { "category": "external", "summary": "230454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230454" }, { "category": "external", "summary": "230457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230457" }, { "category": "external", "summary": "230461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230461" }, { "category": "external", "summary": "230469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230469" }, { "category": "external", "summary": "238655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238655" }, { "category": "external", "summary": "238726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238726" }, { "category": "external", "summary": "239327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239327" }, { "category": "external", "summary": "239388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239388" }, { "category": "external", "summary": "239389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239389" }, { "category": "external", "summary": "240034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240034" }, { "category": "external", "summary": "240361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240361" }, { "category": "external", "summary": "241415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241415" }, { "category": "external", "summary": "241418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241418" }, { "category": "external", "summary": "241706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241706" }, { "category": "external", "summary": "241727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241727" }, { "category": "external", "summary": "242668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242668" }, { "category": "external", "summary": "243701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=243701" }, { "category": "external", "summary": "244146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244146" }, { "category": "external", "summary": "244878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244878" }, { "category": "external", "summary": "245202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245202" }, { "category": "external", "summary": "248317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248317" }, { "category": "external", "summary": "249066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249066" }, { "category": "external", "summary": "249086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249086" }, { "category": "external", "summary": "249091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249091" }, { "category": "external", "summary": "249291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249291" }, { "category": "external", "summary": "249641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249641" }, { "category": "external", "summary": "249868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249868" }, { "category": "external", "summary": "250443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250443" }, { "category": "external", "summary": "250834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250834" }, { "category": "external", "summary": "253914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253914" }, { "category": "external", "summary": "253994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253994" }, { "category": "external", "summary": "254038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=254038" }, { "category": "external", "summary": "336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0640.json" } ], "title": "Red Hat Security Advisory: conga security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-09-26T03:06:55+00:00", "generator": { "date": "2025-09-26T03:06:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2007:0640", "initial_release_date": "2007-11-07T09:00:00+00:00", "revision_history": [ { "date": "2007-11-07T09:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-11-08T09:19:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:06:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Clustering (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:5" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product_id": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=ia64" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.ia64", "product": { "name": "ricci-0:0.10.0-6.el5.ia64", "product_id": "ricci-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=ia64" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.ia64", "product": { "name": "luci-0:0.10.0-6.el5.ia64", "product_id": "luci-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product_id": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=ppc" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.ppc", "product": { "name": "ricci-0:0.10.0-6.el5.ppc", "product_id": "ricci-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=ppc" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.ppc", "product": { "name": "luci-0:0.10.0-6.el5.ppc", "product_id": "luci-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product_id": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.x86_64", "product": { "name": "ricci-0:0.10.0-6.el5.x86_64", "product_id": "ricci-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.x86_64", "product": { "name": "luci-0:0.10.0-6.el5.x86_64", "product_id": "luci-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.i386", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.i386", "product_id": "conga-debuginfo-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=i386" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.i386", "product": { "name": "ricci-0:0.10.0-6.el5.i386", "product_id": "ricci-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=i386" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.i386", "product": { "name": "luci-0:0.10.0-6.el5.i386", "product_id": "luci-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "conga-0:0.10.0-6.el5.src", "product": { "name": "conga-0:0.10.0-6.el5.src", "product_id": "conga-0:0.10.0-6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga@0.10.0-6.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.10.0-6.el5.src as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-0:0.10.0-6.el5.src" }, "product_reference": "conga-0:0.10.0-6.el5.src", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.i386" }, "product_reference": "luci-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.ia64" }, "product_reference": "luci-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.ppc" }, "product_reference": "luci-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64" }, "product_reference": "luci-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.i386" }, "product_reference": "ricci-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64" }, "product_reference": "ricci-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc" }, "product_reference": "ricci-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" }, "product_reference": "ricci-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4136", "discovery_date": "2007-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "336101" } ], "notes": [ { "category": "description", "text": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "ricci is vulnerable to a connect DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4136" }, { "category": "external", "summary": "RHBZ#336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136" } ], "release_date": "2007-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-11-07T09:00:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0640" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ricci is vulnerable to a connect DoS attack" } ] }
rhsa-2007_0983
Vulnerability from csaf_redhat
Published
2007-11-21 21:51
Modified
2024-11-14 10:05
Summary
Red Hat Security Advisory: conga security, bug fix, and enhancement update
Notes
Topic
<Updated 29th November 2007>
Packages have been updated to include PowerPC and xenU packages.
Updated conga packages that fix a security flaw, several bugs, and add
enhancements are now available for Red Hat Cluster Suite.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The Conga package is a web-based administration tool for remote cluster and
storage management.
A flaw was found in ricci during a code audit. A remote attacker who is
able to connect to ricci could cause ricci to temporarily refuse additional
connections, resulting in a denial of service. (CVE-2007-4136)
Additionally, these updated packages fix the following bugs:
* entering an invalid password when creating a new cluster with the luci
web application caused a "UnboundLocalError" error.
* conga did not set the the "nodename" attribute for instances of manual
fencing, resulting in manual fencing being non-functional.
* conga did not provide a way to remove a dead node from a cluster.
Attempting to remove a dead node from a cluster resulted in an error,
reporting that that the node name cannot be reached.
* during cluster formation Conga reboots the cluster nodes. During reboot
errors about not being able to communicate with nodes are displayed. These
errors can safely be ignored, and have been removed in these updated
packages.
* when building a new cluster on Red Hat Enterprise Linux 4, Conga did not
generate node ID attributes for clusternode tags. The node ID attributes
are needed by programs such as qdisk.
* during Quorum Partition Configuration, a "TypeError" error occurred if
you did not configure heuristics.
* when passing arguments to fence_scsi, Conga used the "nodename" attribute
instead of the "node" attribute, resulting in an invalid XML file being
passed to fence_scsi. The "nodename" attribute is now supported.
* conga did not handle the restart operation correctly. In certain
situations this resulted in nodes not being started, stopped, and restarted
correctly. These issues were caused by clusters starting while others were
still in the process of stopping. This has been resolved in these updated
packages.
* probing storage using luci and the Mozilla Firefox 2 web browser on
Microsoft Windows XP appeared to never finish, when in fact it had. After
probing, clicking the node name in the storage list correctly showed the
storage for that node.
As well, these updated packages add the following enhancements:
* the Conga web interface now supports the Microsoft Internet Explorer web
browser, versions 6.0 and later.
* in previous packages, Conga required a minimum score to be configured
even when heuristics were not being used. A minimum score is no longer
required.
All Conga users are advised to upgrade to these updated packages, which
fix this vulnerability, resolve these issues, and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "\u003cUpdated 29th November 2007\u003e\nPackages have been updated to include PowerPC and xenU packages.\n\nUpdated conga packages that fix a security flaw, several bugs, and add\nenhancements are now available for Red Hat Cluster Suite.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Conga package is a web-based administration tool for remote cluster and\nstorage management.\n\nA flaw was found in ricci during a code audit. A remote attacker who is\nable to connect to ricci could cause ricci to temporarily refuse additional\nconnections, resulting in a denial of service. (CVE-2007-4136)\n\nAdditionally, these updated packages fix the following bugs:\n\n* entering an invalid password when creating a new cluster with the luci\nweb application caused a \"UnboundLocalError\" error.\n\n* conga did not set the the \"nodename\" attribute for instances of manual\nfencing, resulting in manual fencing being non-functional.\n\n* conga did not provide a way to remove a dead node from a cluster.\nAttempting to remove a dead node from a cluster resulted in an error,\nreporting that that the node name cannot be reached.\n\n* during cluster formation Conga reboots the cluster nodes. During reboot\nerrors about not being able to communicate with nodes are displayed. These\nerrors can safely be ignored, and have been removed in these updated\npackages.\n\n* when building a new cluster on Red Hat Enterprise Linux 4, Conga did not\ngenerate node ID attributes for clusternode tags. The node ID attributes\nare needed by programs such as qdisk.\n\n* during Quorum Partition Configuration, a \"TypeError\" error occurred if\nyou did not configure heuristics.\n\n* when passing arguments to fence_scsi, Conga used the \"nodename\" attribute\ninstead of the \"node\" attribute, resulting in an invalid XML file being\npassed to fence_scsi. The \"nodename\" attribute is now supported.\n\n* conga did not handle the restart operation correctly. In certain\nsituations this resulted in nodes not being started, stopped, and restarted\ncorrectly. These issues were caused by clusters starting while others were\nstill in the process of stopping. This has been resolved in these updated\npackages.\n\n* probing storage using luci and the Mozilla Firefox 2 web browser on\nMicrosoft Windows XP appeared to never finish, when in fact it had. After\nprobing, clicking the node name in the storage list correctly showed the\nstorage for that node.\n\nAs well, these updated packages add the following enhancements:\n\n* the Conga web interface now supports the Microsoft Internet Explorer web\nbrowser, versions 6.0 and later.\n\n* in previous packages, Conga required a minimum score to be configured\neven when heuristics were not being used. A minimum score is no longer\nrequired.\n\nAll Conga users are advised to upgrade to these updated packages, which\nfix this vulnerability, resolve these issues, and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0983", "url": "https://access.redhat.com/errata/RHSA-2007:0983" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "227723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227723" }, { "category": "external", "summary": "238656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238656" }, { "category": "external", "summary": "238727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238727" }, { "category": "external", "summary": "241414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241414" }, { "category": "external", "summary": "245200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245200" }, { "category": "external", "summary": "253901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253901" }, { "category": "external", "summary": "253905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253905" }, { "category": "external", "summary": "253906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253906" }, { "category": "external", "summary": "286951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=286951" }, { "category": "external", "summary": "325501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=325501" }, { "category": "external", "summary": "336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "external", "summary": "340101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=340101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0983.json" } ], "title": "Red Hat Security Advisory: conga security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-14T10:05:44+00:00", "generator": { "date": "2024-11-14T10:05:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2007:0983", "initial_release_date": "2007-11-21T21:51:00+00:00", "revision_history": [ { "date": "2007-11-21T21:51:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-11-29T12:36:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:05:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Cluster Suite 4AS", "product": { "name": "Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:4" } } }, { "category": "product_name", "name": "Red Hat Cluster Suite 4ES", "product": { "name": "Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:4" } } }, { "category": "product_name", "name": "Red Hat Cluster Suite 4WS", "product": { "name": "Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:4" } } } ], "category": "product_family", "name": "Red Hat Cluster Suite" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.ia64", "product": { "name": "ricci-0:0.11.0-3.ia64", "product_id": "ricci-0:0.11.0-3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=ia64" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.ia64", "product": { "name": "conga-debuginfo-0:0.11.0-3.ia64", "product_id": "conga-debuginfo-0:0.11.0-3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=ia64" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.ia64", "product": { "name": "luci-0:0.11.0-3.ia64", "product_id": "luci-0:0.11.0-3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.x86_64", "product": { "name": "ricci-0:0.11.0-3.x86_64", "product_id": "ricci-0:0.11.0-3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=x86_64" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.x86_64", "product": { "name": "conga-debuginfo-0:0.11.0-3.x86_64", "product_id": "conga-debuginfo-0:0.11.0-3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=x86_64" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.x86_64", "product": { "name": "luci-0:0.11.0-3.x86_64", "product_id": "luci-0:0.11.0-3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.i386", "product": { "name": "ricci-0:0.11.0-3.i386", "product_id": "ricci-0:0.11.0-3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=i386" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.i386", "product": { "name": "conga-debuginfo-0:0.11.0-3.i386", "product_id": "conga-debuginfo-0:0.11.0-3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=i386" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.i386", "product": { "name": "luci-0:0.11.0-3.i386", "product_id": "luci-0:0.11.0-3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "conga-0:0.11.0-3.src", "product": { "name": "conga-0:0.11.0-3.src", "product_id": "conga-0:0.11.0-3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga@0.11.0-3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.ppc", "product": { "name": "ricci-0:0.11.0-3.ppc", "product_id": "ricci-0:0.11.0-3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=ppc" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.ppc", "product": { "name": "conga-debuginfo-0:0.11.0-3.ppc", "product_id": "conga-debuginfo-0:0.11.0-3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=ppc" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.ppc", "product": { "name": "luci-0:0.11.0-3.ppc", "product_id": "luci-0:0.11.0-3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.11.0-3.src as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-0:0.11.0-3.src" }, "product_reference": "conga-0:0.11.0-3.src", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386" }, "product_reference": "conga-debuginfo-0:0.11.0-3.i386", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ia64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ppc", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.x86_64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.i386" }, "product_reference": "luci-0:0.11.0-3.i386", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.ia64" }, "product_reference": "luci-0:0.11.0-3.ia64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.ppc" }, "product_reference": "luci-0:0.11.0-3.ppc", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.x86_64" }, "product_reference": "luci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.i386" }, "product_reference": "ricci-0:0.11.0-3.i386", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.ia64" }, "product_reference": "ricci-0:0.11.0-3.ia64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.ppc" }, "product_reference": "ricci-0:0.11.0-3.ppc", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.x86_64" }, "product_reference": "ricci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.11.0-3.src as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-0:0.11.0-3.src" }, "product_reference": "conga-0:0.11.0-3.src", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386" }, "product_reference": "conga-debuginfo-0:0.11.0-3.i386", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ia64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ppc", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.x86_64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.i386" }, "product_reference": "luci-0:0.11.0-3.i386", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.ia64" }, "product_reference": "luci-0:0.11.0-3.ia64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.ppc" }, "product_reference": "luci-0:0.11.0-3.ppc", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.x86_64" }, "product_reference": "luci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.i386" }, "product_reference": "ricci-0:0.11.0-3.i386", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.ia64" }, "product_reference": "ricci-0:0.11.0-3.ia64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.ppc" }, "product_reference": "ricci-0:0.11.0-3.ppc", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.x86_64" }, "product_reference": "ricci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.11.0-3.src as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-0:0.11.0-3.src" }, "product_reference": "conga-0:0.11.0-3.src", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386" }, "product_reference": "conga-debuginfo-0:0.11.0-3.i386", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ia64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ppc", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.x86_64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.i386" }, "product_reference": "luci-0:0.11.0-3.i386", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.ia64" }, "product_reference": "luci-0:0.11.0-3.ia64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.ppc" }, "product_reference": "luci-0:0.11.0-3.ppc", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.x86_64" }, "product_reference": "luci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.i386" }, "product_reference": "ricci-0:0.11.0-3.i386", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.ia64" }, "product_reference": "ricci-0:0.11.0-3.ia64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.ppc" }, "product_reference": "ricci-0:0.11.0-3.ppc", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.x86_64" }, "product_reference": "ricci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4WS-cluster" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4136", "discovery_date": "2007-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "336101" } ], "notes": [ { "category": "description", "text": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "ricci is vulnerable to a connect DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-cluster:conga-0:0.11.0-3.src", "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4AS-cluster:luci-0:0.11.0-3.i386", "4AS-cluster:luci-0:0.11.0-3.ia64", "4AS-cluster:luci-0:0.11.0-3.ppc", "4AS-cluster:luci-0:0.11.0-3.x86_64", "4AS-cluster:ricci-0:0.11.0-3.i386", "4AS-cluster:ricci-0:0.11.0-3.ia64", "4AS-cluster:ricci-0:0.11.0-3.ppc", "4AS-cluster:ricci-0:0.11.0-3.x86_64", "4ES-cluster:conga-0:0.11.0-3.src", "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4ES-cluster:luci-0:0.11.0-3.i386", "4ES-cluster:luci-0:0.11.0-3.ia64", "4ES-cluster:luci-0:0.11.0-3.ppc", "4ES-cluster:luci-0:0.11.0-3.x86_64", "4ES-cluster:ricci-0:0.11.0-3.i386", "4ES-cluster:ricci-0:0.11.0-3.ia64", "4ES-cluster:ricci-0:0.11.0-3.ppc", "4ES-cluster:ricci-0:0.11.0-3.x86_64", "4WS-cluster:conga-0:0.11.0-3.src", "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4WS-cluster:luci-0:0.11.0-3.i386", "4WS-cluster:luci-0:0.11.0-3.ia64", "4WS-cluster:luci-0:0.11.0-3.ppc", "4WS-cluster:luci-0:0.11.0-3.x86_64", "4WS-cluster:ricci-0:0.11.0-3.i386", "4WS-cluster:ricci-0:0.11.0-3.ia64", "4WS-cluster:ricci-0:0.11.0-3.ppc", "4WS-cluster:ricci-0:0.11.0-3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4136" }, { "category": "external", "summary": "RHBZ#336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136" } ], "release_date": "2007-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-11-21T21:51:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-cluster:conga-0:0.11.0-3.src", "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4AS-cluster:luci-0:0.11.0-3.i386", "4AS-cluster:luci-0:0.11.0-3.ia64", "4AS-cluster:luci-0:0.11.0-3.ppc", "4AS-cluster:luci-0:0.11.0-3.x86_64", "4AS-cluster:ricci-0:0.11.0-3.i386", "4AS-cluster:ricci-0:0.11.0-3.ia64", "4AS-cluster:ricci-0:0.11.0-3.ppc", "4AS-cluster:ricci-0:0.11.0-3.x86_64", "4ES-cluster:conga-0:0.11.0-3.src", "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4ES-cluster:luci-0:0.11.0-3.i386", "4ES-cluster:luci-0:0.11.0-3.ia64", "4ES-cluster:luci-0:0.11.0-3.ppc", "4ES-cluster:luci-0:0.11.0-3.x86_64", "4ES-cluster:ricci-0:0.11.0-3.i386", "4ES-cluster:ricci-0:0.11.0-3.ia64", "4ES-cluster:ricci-0:0.11.0-3.ppc", "4ES-cluster:ricci-0:0.11.0-3.x86_64", "4WS-cluster:conga-0:0.11.0-3.src", "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4WS-cluster:luci-0:0.11.0-3.i386", "4WS-cluster:luci-0:0.11.0-3.ia64", "4WS-cluster:luci-0:0.11.0-3.ppc", "4WS-cluster:luci-0:0.11.0-3.x86_64", "4WS-cluster:ricci-0:0.11.0-3.i386", "4WS-cluster:ricci-0:0.11.0-3.ia64", "4WS-cluster:ricci-0:0.11.0-3.ppc", "4WS-cluster:ricci-0:0.11.0-3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0983" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-cluster:conga-0:0.11.0-3.src", "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4AS-cluster:luci-0:0.11.0-3.i386", "4AS-cluster:luci-0:0.11.0-3.ia64", "4AS-cluster:luci-0:0.11.0-3.ppc", "4AS-cluster:luci-0:0.11.0-3.x86_64", "4AS-cluster:ricci-0:0.11.0-3.i386", "4AS-cluster:ricci-0:0.11.0-3.ia64", "4AS-cluster:ricci-0:0.11.0-3.ppc", "4AS-cluster:ricci-0:0.11.0-3.x86_64", "4ES-cluster:conga-0:0.11.0-3.src", "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4ES-cluster:luci-0:0.11.0-3.i386", "4ES-cluster:luci-0:0.11.0-3.ia64", "4ES-cluster:luci-0:0.11.0-3.ppc", "4ES-cluster:luci-0:0.11.0-3.x86_64", "4ES-cluster:ricci-0:0.11.0-3.i386", "4ES-cluster:ricci-0:0.11.0-3.ia64", "4ES-cluster:ricci-0:0.11.0-3.ppc", "4ES-cluster:ricci-0:0.11.0-3.x86_64", "4WS-cluster:conga-0:0.11.0-3.src", "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4WS-cluster:luci-0:0.11.0-3.i386", "4WS-cluster:luci-0:0.11.0-3.ia64", "4WS-cluster:luci-0:0.11.0-3.ppc", "4WS-cluster:luci-0:0.11.0-3.x86_64", "4WS-cluster:ricci-0:0.11.0-3.i386", "4WS-cluster:ricci-0:0.11.0-3.ia64", "4WS-cluster:ricci-0:0.11.0-3.ppc", "4WS-cluster:ricci-0:0.11.0-3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ricci is vulnerable to a connect DoS attack" } ] }
rhsa-2007:0983
Vulnerability from csaf_redhat
Published
2007-11-21 21:51
Modified
2025-09-26 03:06
Summary
Red Hat Security Advisory: conga security, bug fix, and enhancement update
Notes
Topic
<Updated 29th November 2007>
Packages have been updated to include PowerPC and xenU packages.
Updated conga packages that fix a security flaw, several bugs, and add
enhancements are now available for Red Hat Cluster Suite.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The Conga package is a web-based administration tool for remote cluster and
storage management.
A flaw was found in ricci during a code audit. A remote attacker who is
able to connect to ricci could cause ricci to temporarily refuse additional
connections, resulting in a denial of service. (CVE-2007-4136)
Additionally, these updated packages fix the following bugs:
* entering an invalid password when creating a new cluster with the luci
web application caused a "UnboundLocalError" error.
* conga did not set the the "nodename" attribute for instances of manual
fencing, resulting in manual fencing being non-functional.
* conga did not provide a way to remove a dead node from a cluster.
Attempting to remove a dead node from a cluster resulted in an error,
reporting that that the node name cannot be reached.
* during cluster formation Conga reboots the cluster nodes. During reboot
errors about not being able to communicate with nodes are displayed. These
errors can safely be ignored, and have been removed in these updated
packages.
* when building a new cluster on Red Hat Enterprise Linux 4, Conga did not
generate node ID attributes for clusternode tags. The node ID attributes
are needed by programs such as qdisk.
* during Quorum Partition Configuration, a "TypeError" error occurred if
you did not configure heuristics.
* when passing arguments to fence_scsi, Conga used the "nodename" attribute
instead of the "node" attribute, resulting in an invalid XML file being
passed to fence_scsi. The "nodename" attribute is now supported.
* conga did not handle the restart operation correctly. In certain
situations this resulted in nodes not being started, stopped, and restarted
correctly. These issues were caused by clusters starting while others were
still in the process of stopping. This has been resolved in these updated
packages.
* probing storage using luci and the Mozilla Firefox 2 web browser on
Microsoft Windows XP appeared to never finish, when in fact it had. After
probing, clicking the node name in the storage list correctly showed the
storage for that node.
As well, these updated packages add the following enhancements:
* the Conga web interface now supports the Microsoft Internet Explorer web
browser, versions 6.0 and later.
* in previous packages, Conga required a minimum score to be configured
even when heuristics were not being used. A minimum score is no longer
required.
All Conga users are advised to upgrade to these updated packages, which
fix this vulnerability, resolve these issues, and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "\u003cUpdated 29th November 2007\u003e\nPackages have been updated to include PowerPC and xenU packages.\n\nUpdated conga packages that fix a security flaw, several bugs, and add\nenhancements are now available for Red Hat Cluster Suite.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Conga package is a web-based administration tool for remote cluster and\nstorage management.\n\nA flaw was found in ricci during a code audit. A remote attacker who is\nable to connect to ricci could cause ricci to temporarily refuse additional\nconnections, resulting in a denial of service. (CVE-2007-4136)\n\nAdditionally, these updated packages fix the following bugs:\n\n* entering an invalid password when creating a new cluster with the luci\nweb application caused a \"UnboundLocalError\" error.\n\n* conga did not set the the \"nodename\" attribute for instances of manual\nfencing, resulting in manual fencing being non-functional.\n\n* conga did not provide a way to remove a dead node from a cluster.\nAttempting to remove a dead node from a cluster resulted in an error,\nreporting that that the node name cannot be reached.\n\n* during cluster formation Conga reboots the cluster nodes. During reboot\nerrors about not being able to communicate with nodes are displayed. These\nerrors can safely be ignored, and have been removed in these updated\npackages.\n\n* when building a new cluster on Red Hat Enterprise Linux 4, Conga did not\ngenerate node ID attributes for clusternode tags. The node ID attributes\nare needed by programs such as qdisk.\n\n* during Quorum Partition Configuration, a \"TypeError\" error occurred if\nyou did not configure heuristics.\n\n* when passing arguments to fence_scsi, Conga used the \"nodename\" attribute\ninstead of the \"node\" attribute, resulting in an invalid XML file being\npassed to fence_scsi. The \"nodename\" attribute is now supported.\n\n* conga did not handle the restart operation correctly. In certain\nsituations this resulted in nodes not being started, stopped, and restarted\ncorrectly. These issues were caused by clusters starting while others were\nstill in the process of stopping. This has been resolved in these updated\npackages.\n\n* probing storage using luci and the Mozilla Firefox 2 web browser on\nMicrosoft Windows XP appeared to never finish, when in fact it had. After\nprobing, clicking the node name in the storage list correctly showed the\nstorage for that node.\n\nAs well, these updated packages add the following enhancements:\n\n* the Conga web interface now supports the Microsoft Internet Explorer web\nbrowser, versions 6.0 and later.\n\n* in previous packages, Conga required a minimum score to be configured\neven when heuristics were not being used. A minimum score is no longer\nrequired.\n\nAll Conga users are advised to upgrade to these updated packages, which\nfix this vulnerability, resolve these issues, and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0983", "url": "https://access.redhat.com/errata/RHSA-2007:0983" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "227723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227723" }, { "category": "external", "summary": "238656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238656" }, { "category": "external", "summary": "238727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238727" }, { "category": "external", "summary": "241414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241414" }, { "category": "external", "summary": "245200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245200" }, { "category": "external", "summary": "253901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253901" }, { "category": "external", "summary": "253905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253905" }, { "category": "external", "summary": "253906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253906" }, { "category": "external", "summary": "286951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=286951" }, { "category": "external", "summary": "325501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=325501" }, { "category": "external", "summary": "336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "external", "summary": "340101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=340101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0983.json" } ], "title": "Red Hat Security Advisory: conga security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-09-26T03:06:57+00:00", "generator": { "date": "2025-09-26T03:06:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2007:0983", "initial_release_date": "2007-11-21T21:51:00+00:00", "revision_history": [ { "date": "2007-11-21T21:51:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-11-29T12:36:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:06:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Cluster Suite 4AS", "product": { "name": "Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:4" } } }, { "category": "product_name", "name": "Red Hat Cluster Suite 4ES", "product": { "name": "Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:4" } } }, { "category": "product_name", "name": "Red Hat Cluster Suite 4WS", "product": { "name": "Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:4" } } } ], "category": "product_family", "name": "Red Hat Cluster Suite" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.ia64", "product": { "name": "ricci-0:0.11.0-3.ia64", "product_id": "ricci-0:0.11.0-3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=ia64" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.ia64", "product": { "name": "conga-debuginfo-0:0.11.0-3.ia64", "product_id": "conga-debuginfo-0:0.11.0-3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=ia64" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.ia64", "product": { "name": "luci-0:0.11.0-3.ia64", "product_id": "luci-0:0.11.0-3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.x86_64", "product": { "name": "ricci-0:0.11.0-3.x86_64", "product_id": "ricci-0:0.11.0-3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=x86_64" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.x86_64", "product": { "name": "conga-debuginfo-0:0.11.0-3.x86_64", "product_id": "conga-debuginfo-0:0.11.0-3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=x86_64" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.x86_64", "product": { "name": "luci-0:0.11.0-3.x86_64", "product_id": "luci-0:0.11.0-3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.i386", "product": { "name": "ricci-0:0.11.0-3.i386", "product_id": "ricci-0:0.11.0-3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=i386" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.i386", "product": { "name": "conga-debuginfo-0:0.11.0-3.i386", "product_id": "conga-debuginfo-0:0.11.0-3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=i386" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.i386", "product": { "name": "luci-0:0.11.0-3.i386", "product_id": "luci-0:0.11.0-3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "conga-0:0.11.0-3.src", "product": { "name": "conga-0:0.11.0-3.src", "product_id": "conga-0:0.11.0-3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga@0.11.0-3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ricci-0:0.11.0-3.ppc", "product": { "name": "ricci-0:0.11.0-3.ppc", "product_id": "ricci-0:0.11.0-3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.11.0-3?arch=ppc" } } }, { "category": "product_version", "name": "conga-debuginfo-0:0.11.0-3.ppc", "product": { "name": "conga-debuginfo-0:0.11.0-3.ppc", "product_id": "conga-debuginfo-0:0.11.0-3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.11.0-3?arch=ppc" } } }, { "category": "product_version", "name": "luci-0:0.11.0-3.ppc", "product": { "name": "luci-0:0.11.0-3.ppc", "product_id": "luci-0:0.11.0-3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.11.0-3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.11.0-3.src as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-0:0.11.0-3.src" }, "product_reference": "conga-0:0.11.0-3.src", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386" }, "product_reference": "conga-debuginfo-0:0.11.0-3.i386", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ia64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ppc", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.x86_64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.i386" }, "product_reference": "luci-0:0.11.0-3.i386", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.ia64" }, "product_reference": "luci-0:0.11.0-3.ia64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.ppc" }, "product_reference": "luci-0:0.11.0-3.ppc", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:luci-0:0.11.0-3.x86_64" }, "product_reference": "luci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.i386" }, "product_reference": "ricci-0:0.11.0-3.i386", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.ia64" }, "product_reference": "ricci-0:0.11.0-3.ia64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.ppc" }, "product_reference": "ricci-0:0.11.0-3.ppc", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4AS", "product_id": "4AS-cluster:ricci-0:0.11.0-3.x86_64" }, "product_reference": "ricci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4AS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.11.0-3.src as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-0:0.11.0-3.src" }, "product_reference": "conga-0:0.11.0-3.src", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386" }, "product_reference": "conga-debuginfo-0:0.11.0-3.i386", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ia64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ppc", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.x86_64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.i386" }, "product_reference": "luci-0:0.11.0-3.i386", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.ia64" }, "product_reference": "luci-0:0.11.0-3.ia64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.ppc" }, "product_reference": "luci-0:0.11.0-3.ppc", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:luci-0:0.11.0-3.x86_64" }, "product_reference": "luci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.i386" }, "product_reference": "ricci-0:0.11.0-3.i386", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.ia64" }, "product_reference": "ricci-0:0.11.0-3.ia64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.ppc" }, "product_reference": "ricci-0:0.11.0-3.ppc", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4ES", "product_id": "4ES-cluster:ricci-0:0.11.0-3.x86_64" }, "product_reference": "ricci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4ES-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.11.0-3.src as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-0:0.11.0-3.src" }, "product_reference": "conga-0:0.11.0-3.src", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386" }, "product_reference": "conga-debuginfo-0:0.11.0-3.i386", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ia64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc" }, "product_reference": "conga-debuginfo-0:0.11.0-3.ppc", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64" }, "product_reference": "conga-debuginfo-0:0.11.0-3.x86_64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.i386" }, "product_reference": "luci-0:0.11.0-3.i386", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.ia64" }, "product_reference": "luci-0:0.11.0-3.ia64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.ppc" }, "product_reference": "luci-0:0.11.0-3.ppc", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:luci-0:0.11.0-3.x86_64" }, "product_reference": "luci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.i386 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.i386" }, "product_reference": "ricci-0:0.11.0-3.i386", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ia64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.ia64" }, "product_reference": "ricci-0:0.11.0-3.ia64", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.ppc as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.ppc" }, "product_reference": "ricci-0:0.11.0-3.ppc", "relates_to_product_reference": "4WS-cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.11.0-3.x86_64 as a component of Red Hat Cluster Suite 4WS", "product_id": "4WS-cluster:ricci-0:0.11.0-3.x86_64" }, "product_reference": "ricci-0:0.11.0-3.x86_64", "relates_to_product_reference": "4WS-cluster" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4136", "discovery_date": "2007-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "336101" } ], "notes": [ { "category": "description", "text": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "ricci is vulnerable to a connect DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-cluster:conga-0:0.11.0-3.src", "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4AS-cluster:luci-0:0.11.0-3.i386", "4AS-cluster:luci-0:0.11.0-3.ia64", "4AS-cluster:luci-0:0.11.0-3.ppc", "4AS-cluster:luci-0:0.11.0-3.x86_64", "4AS-cluster:ricci-0:0.11.0-3.i386", "4AS-cluster:ricci-0:0.11.0-3.ia64", "4AS-cluster:ricci-0:0.11.0-3.ppc", "4AS-cluster:ricci-0:0.11.0-3.x86_64", "4ES-cluster:conga-0:0.11.0-3.src", "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4ES-cluster:luci-0:0.11.0-3.i386", "4ES-cluster:luci-0:0.11.0-3.ia64", "4ES-cluster:luci-0:0.11.0-3.ppc", "4ES-cluster:luci-0:0.11.0-3.x86_64", "4ES-cluster:ricci-0:0.11.0-3.i386", "4ES-cluster:ricci-0:0.11.0-3.ia64", "4ES-cluster:ricci-0:0.11.0-3.ppc", "4ES-cluster:ricci-0:0.11.0-3.x86_64", "4WS-cluster:conga-0:0.11.0-3.src", "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4WS-cluster:luci-0:0.11.0-3.i386", "4WS-cluster:luci-0:0.11.0-3.ia64", "4WS-cluster:luci-0:0.11.0-3.ppc", "4WS-cluster:luci-0:0.11.0-3.x86_64", "4WS-cluster:ricci-0:0.11.0-3.i386", "4WS-cluster:ricci-0:0.11.0-3.ia64", "4WS-cluster:ricci-0:0.11.0-3.ppc", "4WS-cluster:ricci-0:0.11.0-3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4136" }, { "category": "external", "summary": "RHBZ#336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136" } ], "release_date": "2007-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-11-21T21:51:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-cluster:conga-0:0.11.0-3.src", "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4AS-cluster:luci-0:0.11.0-3.i386", "4AS-cluster:luci-0:0.11.0-3.ia64", "4AS-cluster:luci-0:0.11.0-3.ppc", "4AS-cluster:luci-0:0.11.0-3.x86_64", "4AS-cluster:ricci-0:0.11.0-3.i386", "4AS-cluster:ricci-0:0.11.0-3.ia64", "4AS-cluster:ricci-0:0.11.0-3.ppc", "4AS-cluster:ricci-0:0.11.0-3.x86_64", "4ES-cluster:conga-0:0.11.0-3.src", "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4ES-cluster:luci-0:0.11.0-3.i386", "4ES-cluster:luci-0:0.11.0-3.ia64", "4ES-cluster:luci-0:0.11.0-3.ppc", "4ES-cluster:luci-0:0.11.0-3.x86_64", "4ES-cluster:ricci-0:0.11.0-3.i386", "4ES-cluster:ricci-0:0.11.0-3.ia64", "4ES-cluster:ricci-0:0.11.0-3.ppc", "4ES-cluster:ricci-0:0.11.0-3.x86_64", "4WS-cluster:conga-0:0.11.0-3.src", "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4WS-cluster:luci-0:0.11.0-3.i386", "4WS-cluster:luci-0:0.11.0-3.ia64", "4WS-cluster:luci-0:0.11.0-3.ppc", "4WS-cluster:luci-0:0.11.0-3.x86_64", "4WS-cluster:ricci-0:0.11.0-3.i386", "4WS-cluster:ricci-0:0.11.0-3.ia64", "4WS-cluster:ricci-0:0.11.0-3.ppc", "4WS-cluster:ricci-0:0.11.0-3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0983" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-cluster:conga-0:0.11.0-3.src", "4AS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4AS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4AS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4AS-cluster:luci-0:0.11.0-3.i386", "4AS-cluster:luci-0:0.11.0-3.ia64", "4AS-cluster:luci-0:0.11.0-3.ppc", "4AS-cluster:luci-0:0.11.0-3.x86_64", "4AS-cluster:ricci-0:0.11.0-3.i386", "4AS-cluster:ricci-0:0.11.0-3.ia64", "4AS-cluster:ricci-0:0.11.0-3.ppc", "4AS-cluster:ricci-0:0.11.0-3.x86_64", "4ES-cluster:conga-0:0.11.0-3.src", "4ES-cluster:conga-debuginfo-0:0.11.0-3.i386", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4ES-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4ES-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4ES-cluster:luci-0:0.11.0-3.i386", "4ES-cluster:luci-0:0.11.0-3.ia64", "4ES-cluster:luci-0:0.11.0-3.ppc", "4ES-cluster:luci-0:0.11.0-3.x86_64", "4ES-cluster:ricci-0:0.11.0-3.i386", "4ES-cluster:ricci-0:0.11.0-3.ia64", "4ES-cluster:ricci-0:0.11.0-3.ppc", "4ES-cluster:ricci-0:0.11.0-3.x86_64", "4WS-cluster:conga-0:0.11.0-3.src", "4WS-cluster:conga-debuginfo-0:0.11.0-3.i386", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ia64", "4WS-cluster:conga-debuginfo-0:0.11.0-3.ppc", "4WS-cluster:conga-debuginfo-0:0.11.0-3.x86_64", "4WS-cluster:luci-0:0.11.0-3.i386", "4WS-cluster:luci-0:0.11.0-3.ia64", "4WS-cluster:luci-0:0.11.0-3.ppc", "4WS-cluster:luci-0:0.11.0-3.x86_64", "4WS-cluster:ricci-0:0.11.0-3.i386", "4WS-cluster:ricci-0:0.11.0-3.ia64", "4WS-cluster:ricci-0:0.11.0-3.ppc", "4WS-cluster:ricci-0:0.11.0-3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ricci is vulnerable to a connect DoS attack" } ] }
fkie_cve-2007-4136
Vulnerability from fkie_nvd
Published
2007-11-14 00:46
Modified
2025-04-09 00:30
Severity ?
Summary
The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:conga:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "F86EEB6B-0815-4D98-B082-6ADCECA6DCD6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections." }, { "lang": "es", "value": "El demonio ricci en Red Hat Conga versi\u00f3n 0.10.0, permite a atacantes remotos causar una denegaci\u00f3n de servicio (p\u00e9rdida de conexiones nuevas) mediante un env\u00edo de datos o intento de conexiones de manera repetitiva." } ], "id": "CVE-2007-4136", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-14T00:46:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://rhn.redhat.com/errata/RHSA-2007-0640.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27611" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1018921" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/26393" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38358" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://rhn.redhat.com/errata/RHSA-2007-0640.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1018921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-6v59-3wh4-8h9q
Vulnerability from github
Published
2022-05-01 18:20
Modified
2022-05-01 18:20
VLAI Severity ?
Details
The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.
{ "affected": [], "aliases": [ "CVE-2007-4136" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-11-14T00:46:00Z", "severity": "MODERATE" }, "details": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.", "id": "GHSA-6v59-3wh4-8h9q", "modified": "2022-05-01T18:20:39Z", "published": "2022-05-01T18:20:39Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38358" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9871" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2007-0640.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/27611" }, { "type": "WEB", "url": "http://securitytracker.com/id?1018921" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/26393" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…