RHBA-2016:0583
Vulnerability from csaf_redhat - Published: 2016-04-04 01:06 - Updated: 2025-11-21 17:21Summary
Red Hat Bug Fix Advisory: Red Hat Enterprise Virtualization Manager 3.6.4
Severity
Low
Notes
Topic: Updated RFEs packages that fix several bugs and add various enhancements are now available.
Details: The Red Hat Enterprise Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.
The Manager is a JBoss Application Server application that provides several interfaces through which the virtual environment can be accessed and interacted with, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API).
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
The VersionMapper.fromKernelVersionString method in oVirt Engine allows remote authenticated users to cause a denial of service (process crash) for all VMs.
2.7 ()
Vendor Fix
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
https://access.redhat.com/errata/RHBA-2016:0583
References
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated RFEs packages that fix several bugs and add various enhancements are now available.",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Enterprise Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.\n \nThe Manager is a JBoss Application Server application that provides several interfaces through which the virtual environment can be accessed and interacted with, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2016:0583",
"url": "https://access.redhat.com/errata/RHBA-2016:0583"
},
{
"category": "external",
"summary": "1317258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317258"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhba-2016_0583.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat Enterprise Virtualization Manager 3.6.4",
"tracking": {
"current_release_date": "2025-11-21T17:21:25+00:00",
"generator": {
"date": "2025-11-21T17:21:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHBA-2016:0583",
"initial_release_date": "2016-04-04T01:06:51+00:00",
"revision_history": [
{
"date": "2016-04-04T01:06:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-04-04T01:06:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:21:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV-M 3.6",
"product": {
"name": "RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "rhevm-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-extensions-api-impl-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-extensions-api-impl-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-extensions-api-impl-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-extensions-api-impl@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-plugin-vmconsole-proxy-helper@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-userportal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-userportal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-userportal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-userportal-debuginfo@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-setup-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-lib-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-lib-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-lib-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-lib@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-dbscripts-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-dbscripts-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-dbscripts-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-dbscripts@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-vmconsole-proxy-helper@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-webadmin-portal-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-webadmin-portal-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-webadmin-portal-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-webadmin-portal@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-plugin-websocket-proxy-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-plugin-websocket-proxy-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-setup-plugin-websocket-proxy-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-plugin-websocket-proxy@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-restapi-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-restapi-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-restapi-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-restapi@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-extensions-api-impl-javadoc-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-extensions-api-impl-javadoc-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-extensions-api-impl-javadoc-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-extensions-api-impl-javadoc@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-websocket-proxy-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-websocket-proxy-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-websocket-proxy-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-websocket-proxy@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-plugin-ovirt-engine-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-plugin-ovirt-engine-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-setup-plugin-ovirt-engine-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-plugin-ovirt-engine@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-backend-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-backend-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-backend-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-backend@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-userportal-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-userportal-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-userportal-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-userportal@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-webadmin-portal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-webadmin-portal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-webadmin-portal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-webadmin-portal-debuginfo@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-plugin-ovirt-engine-common-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-plugin-ovirt-engine-common-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-setup-plugin-ovirt-engine-common-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-plugin-ovirt-engine-common@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-base-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-base-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-setup-base-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-base@3.6.4.1-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-tools-0:3.6.4.1-0.1.el6.noarch",
"product": {
"name": "rhevm-tools-0:3.6.4.1-0.1.el6.noarch",
"product_id": "rhevm-tools-0:3.6.4.1-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-tools@3.6.4.1-0.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "rhevm-0:3.6.4.1-0.1.el6.src",
"product": {
"name": "rhevm-0:3.6.4.1-0.1.el6.src",
"product_id": "rhevm-0:3.6.4.1-0.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm@3.6.4.1-0.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-0:3.6.4.1-0.1.el6.src as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-0:3.6.4.1-0.1.el6.src"
},
"product_reference": "rhevm-0:3.6.4.1-0.1.el6.src",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-backend-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-backend-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-backend-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-dbscripts-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-dbscripts-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-dbscripts-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-extensions-api-impl-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-extensions-api-impl-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-extensions-api-impl-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-extensions-api-impl-javadoc-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-extensions-api-impl-javadoc-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-extensions-api-impl-javadoc-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-lib-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-lib-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-lib-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-restapi-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-restapi-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-restapi-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-setup-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-base-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-setup-base-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-base-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-plugin-ovirt-engine-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-setup-plugin-ovirt-engine-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-plugin-ovirt-engine-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-plugin-ovirt-engine-common-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-setup-plugin-ovirt-engine-common-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-plugin-ovirt-engine-common-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-plugin-websocket-proxy-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-setup-plugin-websocket-proxy-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-plugin-websocket-proxy-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-tools-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-tools-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-tools-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-userportal-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-userportal-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-userportal-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-userportal-debuginfo-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-userportal-debuginfo-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-userportal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-webadmin-portal-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-webadmin-portal-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-webadmin-portal-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-webadmin-portal-debuginfo-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-webadmin-portal-debuginfo-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-webadmin-portal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-websocket-proxy-0:3.6.4.1-0.1.el6.noarch as a component of RHEV-M 3.6",
"product_id": "6Server-RHEV-S-3.6:rhevm-websocket-proxy-0:3.6.4.1-0.1.el6.noarch"
},
"product_reference": "rhevm-websocket-proxy-0:3.6.4.1-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3077",
"discovery_date": "2016-02-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1321972"
}
],
"notes": [
{
"category": "description",
"text": "The VersionMapper.fromKernelVersionString method in oVirt Engine allows remote authenticated users to cause a denial of service (process crash) for all VMs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovirt-engine: Crash of API when parsing unxepected version number",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-S-3.6:rhevm-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-0:3.6.4.1-0.1.el6.src",
"6Server-RHEV-S-3.6:rhevm-backend-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-dbscripts-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-extensions-api-impl-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-extensions-api-impl-javadoc-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-lib-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-restapi-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-base-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-ovirt-engine-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-ovirt-engine-common-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-websocket-proxy-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-tools-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-userportal-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-userportal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-webadmin-portal-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-webadmin-portal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-websocket-proxy-0:3.6.4.1-0.1.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-3077"
},
{
"category": "external",
"summary": "RHBZ#1321972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321972"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3077"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3077",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3077"
}
],
"release_date": "2016-02-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-04-04T01:06:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHEV-S-3.6:rhevm-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-0:3.6.4.1-0.1.el6.src",
"6Server-RHEV-S-3.6:rhevm-backend-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-dbscripts-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-extensions-api-impl-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-extensions-api-impl-javadoc-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-lib-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-restapi-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-base-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-ovirt-engine-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-ovirt-engine-common-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-websocket-proxy-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-tools-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-userportal-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-userportal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-webadmin-portal-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-webadmin-portal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-websocket-proxy-0:3.6.4.1-0.1.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2016:0583"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.7,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RHEV-S-3.6:rhevm-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-0:3.6.4.1-0.1.el6.src",
"6Server-RHEV-S-3.6:rhevm-backend-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-dbscripts-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-extensions-api-impl-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-extensions-api-impl-javadoc-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-lib-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-restapi-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-base-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-ovirt-engine-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-ovirt-engine-common-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-setup-plugin-websocket-proxy-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-tools-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-userportal-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-userportal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-vmconsole-proxy-helper-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-webadmin-portal-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-webadmin-portal-debuginfo-0:3.6.4.1-0.1.el6.noarch",
"6Server-RHEV-S-3.6:rhevm-websocket-proxy-0:3.6.4.1-0.1.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ovirt-engine: Crash of API when parsing unxepected version number"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…