{"id":"RHSA-2012:1278","summary":"Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.2 security update","modified":"2026-03-11T06:37:33.315556Z","published":"2024-09-15T19:57:58Z","upstream":["CVE-2012-2680","CVE-2012-2681","CVE-2012-2683","CVE-2012-2684","CVE-2012-2685","CVE-2012-2734","CVE-2012-2735","CVE-2012-3459","CVE-2012-3491","CVE-2012-3492","CVE-2012-3493"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2012:1278"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/sec-Red_Hat_Enterprise_Linux_5.html#RHSA-2012-1278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=721110"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=748507"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=769573"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=794660"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=799838"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=806071"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=806079"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=807738"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=810519"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=812126"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=827558"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=829421"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=830243"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=830245"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=830248"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=832124"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=832151"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=846501"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=848212"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=848214"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=848218"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=848222"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=852321"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1278.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-2680"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-2680"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-2680"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-2681"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-2681"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-2681"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-2683"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-2683"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-2683"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-2684"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-2684"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-2684"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-2685"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-2685"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-2685"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-2734"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-2734"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-2734"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-2735"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-2735"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-2735"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-3459"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-3459"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3459"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-3491"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-3491"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3491"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-3492"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-3492"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3492"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-3493"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-3493"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3493"}],"affected":[{"package":{"name":"condor","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/condor"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.6.5-0.22.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"condor-aviary","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/condor-aviary"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.6.5-0.22.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"condor-classads","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/condor-classads"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.6.5-0.22.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"condor-debuginfo","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/condor-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.6.5-0.22.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"condor-kbdd","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/condor-kbdd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.6.5-0.22.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"condor-qmf","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/condor-qmf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.6.5-0.22.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"condor-vm-gahp","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/condor-vm-gahp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.6.5-0.22.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"condor-wallaby","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/condor-wallaby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.3-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"condor-wallaby-base-db","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/condor-wallaby-base-db"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.23-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"condor-wallaby-client","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/condor-wallaby-client"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.3-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"condor-wallaby-tools","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/condor-wallaby-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.3-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"cumin","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/cumin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.1.5444-3.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"python-wallaby","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/python-wallaby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.12.5-10.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"python-wallabyclient","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/python-wallabyclient"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.3-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"ruby-wallaby","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/ruby-wallaby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.12.5-10.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"sesame","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/sesame"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0-4.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"sesame-debuginfo","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/sesame-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0-4.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"wallaby","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/wallaby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.12.5-10.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}},{"package":{"name":"wallaby-utils","ecosystem":"Red Hat:enterprise_mrg:2::el5","purl":"pkg:rpm/redhat/wallaby-utils"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.12.5-10.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2012:1278.json"}}],"schema_version":"1.7.5"}