Bug 429834 - CVE-2008-0128 tomcat5 SSO cookie login information disclosure [rhn_satellite_4.2]
Summary: CVE-2008-0128 tomcat5 SSO cookie login information disclosure [rhn_satellite_...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Satellite 5
Classification: Red Hat
Component: Other
Version: 420
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Miroslav Suchý
QA Contact: Preethi Thomas
URL:
Whiteboard:
Depends On:
Blocks: 135141 CVE-2008-0128 439866
TreeView+ depends on / blocked
 
Reported: 2008-01-23 11:11 UTC by Marc Schoenefeld
Modified: 2008-06-30 18:28 UTC (History)
0 users

Fixed In Version: sat423
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-06-30 18:28:32 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Marc Schoenefeld 2008-01-23 11:11:59 UTC
rhn_satellite_4.2 tracking bug: see blocks bug list for full details of the security issue(s).

This bug is never intended to be made public, please put any public notes in the 'blocks' bugs.

For the security issues handling process overview see: http://intranet.corp.redhat.com/ic/intranet/SecurityZStreamFAQ

[bug automatically created by: add-tracking-bugs]

Comment 1 Miroslav Suchý 2008-04-16 11:59:50 UTC
Promoted tomcat5-5.0.30-0jpp_10rh.noarch.rpm from support-satellite-5.0-4AS-java
collection, where we fixed it.

Comment 2 Miroslav Suchý 2008-04-29 12:18:42 UTC
QA push for 4.2.3 complete: satellite-4.2.3-1 and proxy-4.2.3-1 are
now on webqa. Note that there is _no_ ISO planned for the 4.2.3
release.

Developers, please move your bugs ON_QA.

Comment 3 Preethi Thomas 2008-05-09 12:11:29 UTC
verified 
tomcat5-5.0.30-0jpp_10rh.noarch.rpm on both rhel3 & rhel4 satellites.

Comment 4 Steve Salevan 2008-06-24 20:22:35 UTC
Verified on Stage 423 RHEL3/4 satellites.  tomcat5-5.0.30-0jpp_10rh package is
available on both.  Moving to RELEASE_PENDING.

Comment 5 Preethi Thomas 2008-06-30 18:28:32 UTC
4.2.3 Satellite is now GA, bugs Closed for Current Release.


Note You need to log in before you can comment on or make changes to this bug.