Bug 444136 - Bring various components of Satellite Server 5.0 up to date
Bring various components of Satellite Server 5.0 up to date
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
Depends On: CVE-2007-4965 CVE-2007-6306 CVE-2005-3964 CVE-2005-0605 CVE-2004-0885 CVE-2006-7197 CVE-2007-2052 CVE-2005-2090 CVE-2007-0450 CVE-2006-3835 CVE-2005-3510 CVE-2007-1860 CVE-2005-4838 CVE-2007-2435 CVE-2007-1349 CVE-2007-1358 CVE-2007-2449 CVE-2007-2450 CVE-2007-3304 CVE-2006-5752 CVE-2007-3382 CVE-2007-3385 CVE-2007-2788 CVE-2007-2789 CVE-2007-1355 CVE-2007-4465 CVE-2007-0243 CVE-2007-5461 CVE-2007-5000 CVE-2007-6388 CVE-2006-1329 CVE-2008-0128 CVE-2006-0898 CVE-2006-1542 CVE-2006-4980 CVE-2006-0254 CVE-2005-1849 CVE-2005-2096 CVE-2006-4343 CVE-2006-3738 CVE-2006-2940 CVE-2006-2937 CVE-2006-4339 CVE-2005-2969
  Show dependency treegraph
Reported: 2008-04-25 07:42 EDT by Mark J. Cox
Modified: 2013-04-11 17:33 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2013-04-11 17:33:07 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Mark J. Cox 2008-04-25 07:42:51 EDT
Red Hat Network Satellite Server contains a number of components that since
release have been updated upstream to address security issues.  Red Hat Network
Satellite Server 5.0.2 contains updated versions and backported patches to these

Although the CVE name list is long, these issues are not vulnerabilities that
would affect users of the Red Hat Network Satellite product in the normal use of
the product.
Comment 4 Vincent Danen 2013-04-11 17:33:07 EDT
I'm going to close this bug.  Satellite 5.0.x is no longer supported; the oldest is 5.2.1, and all Satellite are reduced C/I.

Note You need to log in before you can comment on or make changes to this bug.