Vulnerability Database
Blog
FAQ
Docs
RHSA-2013:0564
See a problem?
Please try reporting it
to the source
first.
Source
https://access.redhat.com/errata/RHSA-2013:0564
Import Source
https://security.access.redhat.com/data/osv/RHSA-2013:0564.json
JSON Data
https://api.osv.dev/v1/vulns/RHSA-2013:0564
Published
2024-09-13T08:01:12Z
Modified
2025-04-04T00:57:30.910372Z
Upstream
CVE-2012-4462
Summary
Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.3 security update
Details
References
https://access.redhat.com/errata/RHSA-2013:0564
https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/RHSA-2013-0564.html
https://bugzilla.redhat.com/show_bug.cgi?id=486480
https://bugzilla.redhat.com/show_bug.cgi?id=635207
https://bugzilla.redhat.com/show_bug.cgi?id=703859
https://bugzilla.redhat.com/show_bug.cgi?id=732388
https://bugzilla.redhat.com/show_bug.cgi?id=733498
https://bugzilla.redhat.com/show_bug.cgi?id=733515
https://bugzilla.redhat.com/show_bug.cgi?id=733516
https://bugzilla.redhat.com/show_bug.cgi?id=739219
https://bugzilla.redhat.com/show_bug.cgi?id=740774
https://bugzilla.redhat.com/show_bug.cgi?id=746005
https://bugzilla.redhat.com/show_bug.cgi?id=748053
https://bugzilla.redhat.com/show_bug.cgi?id=749569
https://bugzilla.redhat.com/show_bug.cgi?id=750196
https://bugzilla.redhat.com/show_bug.cgi?id=750818
https://bugzilla.redhat.com/show_bug.cgi?id=751013
https://bugzilla.redhat.com/show_bug.cgi?id=752732
https://bugzilla.redhat.com/show_bug.cgi?id=753822
https://bugzilla.redhat.com/show_bug.cgi?id=755765
https://bugzilla.redhat.com/show_bug.cgi?id=756096
https://bugzilla.redhat.com/show_bug.cgi?id=756384
https://bugzilla.redhat.com/show_bug.cgi?id=760567
https://bugzilla.redhat.com/show_bug.cgi?id=766612
https://bugzilla.redhat.com/show_bug.cgi?id=768298
https://bugzilla.redhat.com/show_bug.cgi?id=768319
https://bugzilla.redhat.com/show_bug.cgi?id=768328
https://bugzilla.redhat.com/show_bug.cgi?id=772587
https://bugzilla.redhat.com/show_bug.cgi?id=773434
https://bugzilla.redhat.com/show_bug.cgi?id=782054
https://bugzilla.redhat.com/show_bug.cgi?id=782132
https://bugzilla.redhat.com/show_bug.cgi?id=782359
https://bugzilla.redhat.com/show_bug.cgi?id=782552
https://bugzilla.redhat.com/show_bug.cgi?id=782553
https://bugzilla.redhat.com/show_bug.cgi?id=782816
https://bugzilla.redhat.com/show_bug.cgi?id=783139
https://bugzilla.redhat.com/show_bug.cgi?id=783267
https://bugzilla.redhat.com/show_bug.cgi?id=785283
https://bugzilla.redhat.com/show_bug.cgi?id=785289
https://bugzilla.redhat.com/show_bug.cgi?id=786020
https://bugzilla.redhat.com/show_bug.cgi?id=786801
https://bugzilla.redhat.com/show_bug.cgi?id=786815
https://bugzilla.redhat.com/show_bug.cgi?id=786825
https://bugzilla.redhat.com/show_bug.cgi?id=787138
https://bugzilla.redhat.com/show_bug.cgi?id=788452
https://bugzilla.redhat.com/show_bug.cgi?id=789351
https://bugzilla.redhat.com/show_bug.cgi?id=796406
https://bugzilla.redhat.com/show_bug.cgi?id=796798
https://bugzilla.redhat.com/show_bug.cgi?id=799129
https://bugzilla.redhat.com/show_bug.cgi?id=799382
https://bugzilla.redhat.com/show_bug.cgi?id=799404
https://bugzilla.redhat.com/show_bug.cgi?id=800065
https://bugzilla.redhat.com/show_bug.cgi?id=800079
https://bugzilla.redhat.com/show_bug.cgi?id=800660
https://bugzilla.redhat.com/show_bug.cgi?id=801047
https://bugzilla.redhat.com/show_bug.cgi?id=801287
https://bugzilla.redhat.com/show_bug.cgi?id=801632
https://bugzilla.redhat.com/show_bug.cgi?id=802704
https://bugzilla.redhat.com/show_bug.cgi?id=802799
https://bugzilla.redhat.com/show_bug.cgi?id=802821
https://bugzilla.redhat.com/show_bug.cgi?id=803359
https://bugzilla.redhat.com/show_bug.cgi?id=803897
https://bugzilla.redhat.com/show_bug.cgi?id=805029
https://bugzilla.redhat.com/show_bug.cgi?id=805448
https://bugzilla.redhat.com/show_bug.cgi?id=805581
https://bugzilla.redhat.com/show_bug.cgi?id=807398
https://bugzilla.redhat.com/show_bug.cgi?id=807820
https://bugzilla.redhat.com/show_bug.cgi?id=807838
https://bugzilla.redhat.com/show_bug.cgi?id=809006
https://bugzilla.redhat.com/show_bug.cgi?id=809551
https://bugzilla.redhat.com/show_bug.cgi?id=809732
https://bugzilla.redhat.com/show_bug.cgi?id=810982
https://bugzilla.redhat.com/show_bug.cgi?id=813807
https://bugzilla.redhat.com/show_bug.cgi?id=814386
https://bugzilla.redhat.com/show_bug.cgi?id=815820
https://bugzilla.redhat.com/show_bug.cgi?id=820419
https://bugzilla.redhat.com/show_bug.cgi?id=828983
https://bugzilla.redhat.com/show_bug.cgi?id=831709
https://bugzilla.redhat.com/show_bug.cgi?id=831725
https://bugzilla.redhat.com/show_bug.cgi?id=831756
https://bugzilla.redhat.com/show_bug.cgi?id=833095
https://bugzilla.redhat.com/show_bug.cgi?id=833611
https://bugzilla.redhat.com/show_bug.cgi?id=840076
https://bugzilla.redhat.com/show_bug.cgi?id=845567
https://bugzilla.redhat.com/show_bug.cgi?id=846955
https://bugzilla.redhat.com/show_bug.cgi?id=848344
https://bugzilla.redhat.com/show_bug.cgi?id=850205
https://bugzilla.redhat.com/show_bug.cgi?id=850392
https://bugzilla.redhat.com/show_bug.cgi?id=850555
https://bugzilla.redhat.com/show_bug.cgi?id=850567
https://bugzilla.redhat.com/show_bug.cgi?id=850838
https://bugzilla.redhat.com/show_bug.cgi?id=851205
https://bugzilla.redhat.com/show_bug.cgi?id=851217
https://bugzilla.redhat.com/show_bug.cgi?id=851222
https://bugzilla.redhat.com/show_bug.cgi?id=855449
https://bugzilla.redhat.com/show_bug.cgi?id=856646
https://bugzilla.redhat.com/show_bug.cgi?id=860308
https://bugzilla.redhat.com/show_bug.cgi?id=860850
https://bugzilla.redhat.com/show_bug.cgi?id=862550
https://bugzilla.redhat.com/show_bug.cgi?id=864091
https://bugzilla.redhat.com/show_bug.cgi?id=864637
https://bugzilla.redhat.com/show_bug.cgi?id=867989
https://bugzilla.redhat.com/show_bug.cgi?id=871080
https://bugzilla.redhat.com/show_bug.cgi?id=881366
https://bugzilla.redhat.com/show_bug.cgi?id=885787
https://bugzilla.redhat.com/show_bug.cgi?id=886448
https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0564.json
https://access.redhat.com/security/cve/CVE-2012-4462
https://www.cve.org/CVERecord?id=CVE-2012-4462
https://nvd.nist.gov/vuln/detail/CVE-2012-4462
Affected packages
Red Hat:enterprise_mrg:2::el5
/
condor
Package
Name
condor
Purl
pkg:rpm/redhat/condor
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:7.8.8-0.4.1.el5
Red Hat:enterprise_mrg:2::el5
/
condor-aviary
Package
Name
condor-aviary
Purl
pkg:rpm/redhat/condor-aviary
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:7.8.8-0.4.1.el5
Red Hat:enterprise_mrg:2::el5
/
condor-classads
Package
Name
condor-classads
Purl
pkg:rpm/redhat/condor-classads
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:7.8.8-0.4.1.el5
Red Hat:enterprise_mrg:2::el5
/
condor-debuginfo
Package
Name
condor-debuginfo
Purl
pkg:rpm/redhat/condor-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:7.8.8-0.4.1.el5
Red Hat:enterprise_mrg:2::el5
/
condor-ec2-enhanced
Package
Name
condor-ec2-enhanced
Purl
pkg:rpm/redhat/condor-ec2-enhanced
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1.3.0-2.el5
Red Hat:enterprise_mrg:2::el5
/
condor-ec2-enhanced-hooks
Package
Name
condor-ec2-enhanced-hooks
Purl
pkg:rpm/redhat/condor-ec2-enhanced-hooks
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1.3.0-3.el5
Red Hat:enterprise_mrg:2::el5
/
condor-job-hooks
Package
Name
condor-job-hooks
Purl
pkg:rpm/redhat/condor-job-hooks
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1.5-6.el5
Red Hat:enterprise_mrg:2::el5
/
condor-kbdd
Package
Name
condor-kbdd
Purl
pkg:rpm/redhat/condor-kbdd
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:7.8.8-0.4.1.el5
Red Hat:enterprise_mrg:2::el5
/
condor-low-latency
Package
Name
condor-low-latency
Purl
pkg:rpm/redhat/condor-low-latency
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1.2-3.el5
Red Hat:enterprise_mrg:2::el5
/
condor-qmf
Package
Name
condor-qmf
Purl
pkg:rpm/redhat/condor-qmf
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:7.8.8-0.4.1.el5
Red Hat:enterprise_mrg:2::el5
/
condor-vm-gahp
Package
Name
condor-vm-gahp
Purl
pkg:rpm/redhat/condor-vm-gahp
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:7.8.8-0.4.1.el5
Red Hat:enterprise_mrg:2::el5
/
condor-wallaby
Package
Name
condor-wallaby
Purl
pkg:rpm/redhat/condor-wallaby
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:5.0.5-2.el5
Red Hat:enterprise_mrg:2::el5
/
condor-wallaby-base-db
Package
Name
condor-wallaby-base-db
Purl
pkg:rpm/redhat/condor-wallaby-base-db
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1.25-1.el5
Red Hat:enterprise_mrg:2::el5
/
condor-wallaby-client
Package
Name
condor-wallaby-client
Purl
pkg:rpm/redhat/condor-wallaby-client
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:5.0.5-2.el5
Red Hat:enterprise_mrg:2::el5
/
condor-wallaby-tools
Package
Name
condor-wallaby-tools
Purl
pkg:rpm/redhat/condor-wallaby-tools
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:5.0.5-2.el5
Red Hat:enterprise_mrg:2::el5
/
cumin
Package
Name
cumin
Purl
pkg:rpm/redhat/cumin
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:0.1.5675-1.el5
Red Hat:enterprise_mrg:2::el5
/
python-boto
Package
Name
python-boto
Purl
pkg:rpm/redhat/python-boto
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:2.3.0-1.1.el5
Red Hat:enterprise_mrg:2::el5
/
python-condorec2e
Package
Name
python-condorec2e
Purl
pkg:rpm/redhat/python-condorec2e
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1.3.0-3.el5
Red Hat:enterprise_mrg:2::el5
/
python-condorutils
Package
Name
python-condorutils
Purl
pkg:rpm/redhat/python-condorutils
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1.5-6.el5
Red Hat:enterprise_mrg:2::el5
/
python-wallaby
Package
Name
python-wallaby
Purl
pkg:rpm/redhat/python-wallaby
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:0.16.3-1.el5
Red Hat:enterprise_mrg:2::el5
/
python-wallabyclient
Package
Name
python-wallabyclient
Purl
pkg:rpm/redhat/python-wallabyclient
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:5.0.5-2.el5
Red Hat:enterprise_mrg:2::el5
/
ruby-condor-wallaby
Package
Name
ruby-condor-wallaby
Purl
pkg:rpm/redhat/ruby-condor-wallaby
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:5.0.5-2.el5
Red Hat:enterprise_mrg:2::el5
/
ruby-rhubarb
Package
Name
ruby-rhubarb
Purl
pkg:rpm/redhat/ruby-rhubarb
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:0.4.3-5.el5
Red Hat:enterprise_mrg:2::el5
/
ruby-spqr
Package
Name
ruby-spqr
Purl
pkg:rpm/redhat/ruby-spqr
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:0.3.6-3.el5
Red Hat:enterprise_mrg:2::el5
/
ruby-wallaby
Package
Name
ruby-wallaby
Purl
pkg:rpm/redhat/ruby-wallaby
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:0.16.3-1.el5
Red Hat:enterprise_mrg:2::el5
/
sesame
Package
Name
sesame
Purl
pkg:rpm/redhat/sesame
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1.0-7.el5
Red Hat:enterprise_mrg:2::el5
/
sesame-debuginfo
Package
Name
sesame-debuginfo
Purl
pkg:rpm/redhat/sesame-debuginfo
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:1.0-7.el5
Red Hat:enterprise_mrg:2::el5
/
spqr-gen
Package
Name
spqr-gen
Purl
pkg:rpm/redhat/spqr-gen
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:0.3.6-3.el5
Red Hat:enterprise_mrg:2::el5
/
wallaby
Package
Name
wallaby
Purl
pkg:rpm/redhat/wallaby
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:0.16.3-1.el5
Red Hat:enterprise_mrg:2::el5
/
wallaby-utils
Package
Name
wallaby-utils
Purl
pkg:rpm/redhat/wallaby-utils
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:0.16.3-1.el5
RHSA-2013:0564 - OSV