rhsa-2007:0640
Vulnerability from csaf_redhat
Published
2007-11-07 09:00
Modified
2025-08-01 19:55
Summary
Red Hat Security Advisory: conga security, bug fix, and enhancement update
Notes
Topic
Updated conga packages that correct a security flaw and provide bug fixes
and add enhancements are now available.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The Conga package is a web-based administration tool for remote cluster and
storage management.
A flaw was found in ricci during a code audit. A remote attacker who is
able to connect to ricci could cause ricci to temporarily refuse additional
connections, a denial of service (CVE-2007-4136).
Fixes in this updated package include:
* The nodename is now set for manual fencing.
* The node log no longer displays in random order.
* A bug that prevented a node from responding when a cluster was deleted is
now fixed.
* A PAM configuration that incorrectly called the deprecated module
pam_stack was removed.
* A bug that prevented some quorum disk configurations from being accepted
is now fixed.
* Setting multicast addresses now works properly.
* rpm -V on luci no longer fails.
* The user interface rendering time for storage interface is now faster.
* An error message that incorrectly appeared when rebooting nodes during
cluster creation was removed.
* Cluster snaps configuration (an unsupported feature) has been removed
altogether to prevent user confusion.
* A user permission bug resulting from a luci code error is now fixed.
* luci and ricci init script return codes are now LSB-compliant.
* VG creation on cluster nodes now defaults to "clustered".
* An SELinux AVC bug that prevented users from setting up shared storage on
nodes is now fixed.
* An access error that occurred when attempting to access a cluster node
after its cluster was deleted is now fixed.
* IP addresses can now be used to create clusters.
* Attempting to configure a fence device no longer results in an
AttributeError.
* Attempting to create a new fence device to a valid cluster no longer
results in a KeyError.
* Several minor user interface validation errors have been fixed, such as
enforcing cluster name length and fence port, etc.
* A browser lock-up that could occur during storage configuration has been
fixed.
* Virtual service creation now works without error.
* The fence_xvm tag is no longer misspelled in the cluster.conf file.
* Luci failover forms are complete and working.
* Rebooting a fresh cluster install no longer generates an error message.
* A bug that prevented failed cluster services from being started is now
fixed.
* A bug that caused some cluster operations (e.g., node delete) to fail on
clusters with mixed-cased cluster names is now fixed.
* Global cluster resources can be reused when constructing cluster
services.
Enhancements in this updated package include:
* Users can now access Conga through Internet Explorer 6.
* Dead nodes can now be evicted from a cluster.
* Shared storage on new clusters is now enabled by default.
* The fence user-interface flow is now simpler.
* A port number is now shown in ricci error messages.
* The kmod-gfs-xen kernel module is now installed when creating a cluster.
* Cluster creation status is now shown visually.
* User names are now sorted for display.
* The fence_xvmd tag can now be added from the dom0 cluster nodes.
* The ampersand character (&) can now be used in fence names.
* All packaged files are now installed with proper owners and permissions.
* New cluster node members are now properly initialized.
* Storage operations can now be completed even if an LVM snapshot is present.
* Users are now informed via dialog when nodes are rebooted as part of a
cluster operation.
* Failover domains are now properly listed for virtual services and
traditional clustered services.
* Luci can now create and distribute keys for fence_xvmd.
All Conga users are advised to upgrade to this update, which applies these
fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated conga packages that correct a security flaw and provide bug fixes\nand add enhancements are now available.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Conga package is a web-based administration tool for remote cluster and\nstorage management.\n\nA flaw was found in ricci during a code audit. A remote attacker who is\nable to connect to ricci could cause ricci to temporarily refuse additional\nconnections, a denial of service (CVE-2007-4136).\n\nFixes in this updated package include:\n\n* The nodename is now set for manual fencing.\n\n* The node log no longer displays in random order.\n\n* A bug that prevented a node from responding when a cluster was deleted is\nnow fixed.\n\n* A PAM configuration that incorrectly called the deprecated module\npam_stack was removed.\n\n* A bug that prevented some quorum disk configurations from being accepted\nis now fixed.\n\n* Setting multicast addresses now works properly.\n\n* rpm -V on luci no longer fails. \n\n* The user interface rendering time for storage interface is now faster.\n\n* An error message that incorrectly appeared when rebooting nodes during\ncluster creation was removed.\n\n* Cluster snaps configuration (an unsupported feature) has been removed\naltogether to prevent user confusion. \n\n* A user permission bug resulting from a luci code error is now fixed.\n\n* luci and ricci init script return codes are now LSB-compliant.\n\n* VG creation on cluster nodes now defaults to \"clustered\".\n\n* An SELinux AVC bug that prevented users from setting up shared storage on\nnodes is now fixed.\n\n* An access error that occurred when attempting to access a cluster node\nafter its cluster was deleted is now fixed.\n\n* IP addresses can now be used to create clusters. \n\n* Attempting to configure a fence device no longer results in an\nAttributeError.\n\n* Attempting to create a new fence device to a valid cluster no longer\nresults in a KeyError.\n\n* Several minor user interface validation errors have been fixed, such as\nenforcing cluster name length and fence port, etc.\n\n* A browser lock-up that could occur during storage configuration has been\nfixed.\n\n* Virtual service creation now works without error.\n\n* The fence_xvm tag is no longer misspelled in the cluster.conf file.\n\n* Luci failover forms are complete and working.\n* Rebooting a fresh cluster install no longer generates an error message.\n\n* A bug that prevented failed cluster services from being started is now\nfixed.\n\n* A bug that caused some cluster operations (e.g., node delete) to fail on\nclusters with mixed-cased cluster names is now fixed.\n\n* Global cluster resources can be reused when constructing cluster\nservices.\n\nEnhancements in this updated package include:\n\n* Users can now access Conga through Internet Explorer 6.\n\n* Dead nodes can now be evicted from a cluster.\n\n* Shared storage on new clusters is now enabled by default.\n\n* The fence user-interface flow is now simpler.\n\n* A port number is now shown in ricci error messages.\n\n* The kmod-gfs-xen kernel module is now installed when creating a cluster.\n\n* Cluster creation status is now shown visually.\n\n* User names are now sorted for display.\n\n* The fence_xvmd tag can now be added from the dom0 cluster nodes.\n\n* The ampersand character (\u0026) can now be used in fence names.\n\n* All packaged files are now installed with proper owners and permissions.\n\n* New cluster node members are now properly initialized.\n\n* Storage operations can now be completed even if an LVM snapshot is present.\n\n* Users are now informed via dialog when nodes are rebooted as part of a\ncluster operation.\n\n* Failover domains are now properly listed for virtual services and\ntraditional clustered services.\n\n* Luci can now create and distribute keys for fence_xvmd.\n\nAll Conga users are advised to upgrade to this update, which applies these\nfixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0640", "url": "https://access.redhat.com/errata/RHSA-2007:0640" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "212006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=212006" }, { "category": "external", "summary": "212022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=212022" }, { "category": "external", "summary": "213083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=213083" }, { "category": "external", "summary": "218964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=218964" }, { "category": "external", "summary": "221899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=221899" }, { "category": "external", "summary": "222051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=222051" }, { "category": "external", "summary": "223162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223162" }, { "category": "external", "summary": "224011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224011" }, { "category": "external", "summary": "225164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225164" }, { "category": "external", "summary": "225206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225206" }, { "category": "external", "summary": "225588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225588" }, { "category": "external", "summary": "225747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225747" }, { "category": "external", "summary": "225782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=225782" }, { "category": "external", "summary": "226700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=226700" }, { "category": "external", "summary": "227682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227682" }, { "category": "external", "summary": "227743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227743" }, { "category": "external", "summary": "227758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227758" }, { "category": "external", "summary": "227852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=227852" }, { "category": "external", "summary": "229027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=229027" }, { "category": "external", "summary": "230447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230447" }, { "category": "external", "summary": "230452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230452" }, { "category": "external", "summary": "230454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230454" }, { "category": "external", "summary": "230457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230457" }, { "category": "external", "summary": "230461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230461" }, { "category": "external", "summary": "230469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=230469" }, { "category": "external", "summary": "238655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238655" }, { "category": "external", "summary": "238726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=238726" }, { "category": "external", "summary": "239327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239327" }, { "category": "external", "summary": "239388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239388" }, { "category": "external", "summary": "239389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=239389" }, { "category": "external", "summary": "240034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240034" }, { "category": "external", "summary": "240361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240361" }, { "category": "external", "summary": "241415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241415" }, { "category": "external", "summary": "241418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241418" }, { "category": "external", "summary": "241706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241706" }, { "category": "external", "summary": "241727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=241727" }, { "category": "external", "summary": "242668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242668" }, { "category": "external", "summary": "243701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=243701" }, { "category": "external", "summary": "244146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244146" }, { "category": "external", "summary": "244878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244878" }, { "category": "external", "summary": "245202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245202" }, { "category": "external", "summary": "248317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248317" }, { "category": "external", "summary": "249066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249066" }, { "category": "external", "summary": "249086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249086" }, { "category": "external", "summary": "249091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249091" }, { "category": "external", "summary": "249291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249291" }, { "category": "external", "summary": "249641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249641" }, { "category": "external", "summary": "249868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=249868" }, { "category": "external", "summary": "250443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250443" }, { "category": "external", "summary": "250834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250834" }, { "category": "external", "summary": "253914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253914" }, { "category": "external", "summary": "253994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253994" }, { "category": "external", "summary": "254038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=254038" }, { "category": "external", "summary": "336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0640.json" } ], "title": "Red Hat Security Advisory: conga security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-01T19:55:00+00:00", "generator": { "date": "2025-08-01T19:55:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2007:0640", "initial_release_date": "2007-11-07T09:00:00+00:00", "revision_history": [ { "date": "2007-11-07T09:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-11-08T09:19:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:55:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Clustering (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_cluster:5" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product_id": "conga-debuginfo-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=ia64" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.ia64", "product": { "name": "ricci-0:0.10.0-6.el5.ia64", "product_id": "ricci-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=ia64" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.ia64", "product": { "name": "luci-0:0.10.0-6.el5.ia64", "product_id": "luci-0:0.10.0-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product_id": "conga-debuginfo-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=ppc" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.ppc", "product": { "name": "ricci-0:0.10.0-6.el5.ppc", "product_id": "ricci-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=ppc" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.ppc", "product": { "name": "luci-0:0.10.0-6.el5.ppc", "product_id": "luci-0:0.10.0-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product_id": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.x86_64", "product": { "name": "ricci-0:0.10.0-6.el5.x86_64", "product_id": "ricci-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.x86_64", "product": { "name": "luci-0:0.10.0-6.el5.x86_64", "product_id": "luci-0:0.10.0-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "conga-debuginfo-0:0.10.0-6.el5.i386", "product": { "name": "conga-debuginfo-0:0.10.0-6.el5.i386", "product_id": "conga-debuginfo-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga-debuginfo@0.10.0-6.el5?arch=i386" } } }, { "category": "product_version", "name": "ricci-0:0.10.0-6.el5.i386", "product": { "name": "ricci-0:0.10.0-6.el5.i386", "product_id": "ricci-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ricci@0.10.0-6.el5?arch=i386" } } }, { "category": "product_version", "name": "luci-0:0.10.0-6.el5.i386", "product": { "name": "luci-0:0.10.0-6.el5.i386", "product_id": "luci-0:0.10.0-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/luci@0.10.0-6.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "conga-0:0.10.0-6.el5.src", "product": { "name": "conga-0:0.10.0-6.el5.src", "product_id": "conga-0:0.10.0-6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conga@0.10.0-6.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "conga-0:0.10.0-6.el5.src as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-0:0.10.0-6.el5.src" }, "product_reference": "conga-0:0.10.0-6.el5.src", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "conga-debuginfo-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64" }, "product_reference": "conga-debuginfo-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.i386" }, "product_reference": "luci-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.ia64" }, "product_reference": "luci-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.ppc" }, "product_reference": "luci-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "luci-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64" }, "product_reference": "luci-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.i386" }, "product_reference": "ricci-0:0.10.0-6.el5.i386", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64" }, "product_reference": "ricci-0:0.10.0-6.el5.ia64", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc" }, "product_reference": "ricci-0:0.10.0-6.el5.ppc", "relates_to_product_reference": "5Server-Cluster" }, { "category": "default_component_of", "full_product_name": { "name": "ricci-0:0.10.0-6.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)", "product_id": "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" }, "product_reference": "ricci-0:0.10.0-6.el5.x86_64", "relates_to_product_reference": "5Server-Cluster" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4136", "discovery_date": "2007-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "336101" } ], "notes": [ { "category": "description", "text": "The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "ricci is vulnerable to a connect DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4136" }, { "category": "external", "summary": "RHBZ#336101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=336101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4136" } ], "release_date": "2007-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-11-07T09:00:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0640" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Cluster:conga-0:0.10.0-6.el5.src", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.i386", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ia64", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.ppc", "5Server-Cluster:conga-debuginfo-0:0.10.0-6.el5.x86_64", "5Server-Cluster:luci-0:0.10.0-6.el5.i386", "5Server-Cluster:luci-0:0.10.0-6.el5.ia64", "5Server-Cluster:luci-0:0.10.0-6.el5.ppc", "5Server-Cluster:luci-0:0.10.0-6.el5.x86_64", "5Server-Cluster:ricci-0:0.10.0-6.el5.i386", "5Server-Cluster:ricci-0:0.10.0-6.el5.ia64", "5Server-Cluster:ricci-0:0.10.0-6.el5.ppc", "5Server-Cluster:ricci-0:0.10.0-6.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ricci is vulnerable to a connect DoS attack" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…