{"id":"RHSA-2014:0469","summary":"Red Hat Security Advisory: cfme security, bug fix, and enhancement update","modified":"2026-03-11T06:46:11.159773Z","published":"2024-09-15T21:31:56Z","upstream":["CVE-2013-6417","CVE-2014-0060","CVE-2014-0061","CVE-2014-0062","CVE-2014-0063","CVE-2014-0064","CVE-2014-0065","CVE-2014-0066","CVE-2014-0078","CVE-2014-0137","CVE-2014-2669"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2014:0469"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1082154"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/site/documentation/en-US/CloudForms/3.0/html/Management_Engine_5.2_Technical_Notes/index.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1036409"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1064556"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065219"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065220"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065222"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065226"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065230"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1076688"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065236"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0469.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-6417"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-6417"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-6417"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0060"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0060"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0060"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0061"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0061"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0061"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0062"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0062"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0062"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0063"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0063"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0063"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0064"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0064"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0064"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0065"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0065"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0065"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0066"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0066"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0066"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0078"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0078"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0078"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0137"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0137"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0137"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-2669"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-2669"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-2669"}],"affected":[{"package":{"name":"cfme","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/cfme"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.2.3.2-1.el6cf"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"cfme-appliance","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/cfme-appliance"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.2.3.2-1.el6cf"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"cfme-debuginfo","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/cfme-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.2.3.2-1.el6cf"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"cfme-lib","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/cfme-lib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.2.3.2-1.el6cf"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"mingw32-cfme-host","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/mingw32-cfme-host"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.2.3.2-1.el6cf"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql-contrib","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql-contrib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql-debuginfo","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql-devel","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql-docs","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql-docs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql-libs","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql-plperl","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql-plperl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql-plpython","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql-plpython"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql-pltcl","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql-pltcl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql-server","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql-test","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql-test"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"postgresql92-postgresql-upgrade","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/postgresql92-postgresql-upgrade"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.2.7-1.1.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"prince","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/prince"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:9.0r2-4.el6cf"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}},{"package":{"name":"ruby193-rubygem-actionpack","ecosystem":"Red Hat:cloudforms_managementengine:5::el6","purl":"pkg:rpm/redhat/ruby193-rubygem-actionpack"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:3.2.13-6.el6cf"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0469.json"}}],"schema_version":"1.7.5"}