Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:0128 - Security Advisory
Issued:
2013-01-08
Updated:
2013-01-08

RHSA-2013:0128 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: conga security, bug fix, and enhancement update

Type/Severity

Security Advisory: Low

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated conga packages that fix one security issue, multiple bugs, and add
two enhancements are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The Conga project is a management system for remote workstations. It
consists of luci, which is a secure web-based front end, and ricci, which
is a secure daemon that dispatches incoming messages to underlying
management modules.

It was discovered that luci stored usernames and passwords in session
cookies. This issue prevented the session inactivity timeout feature from
working correctly, and allowed attackers able to get access to a session
cookie to obtain the victim's authentication credentials. (CVE-2012-3359)

Red Hat would like to thank George Hedfors of Cybercom Sweden East AB for
reporting this issue.

This update also fixes the following bugs:

  • Prior to this update, luci did not allow the fence_apc_snmp agent to be

configured. As a consequence, users could not configure or view an existing
configuration for fence_apc_snmp. This update adds a new screen that allows
fence_apc_snmp to be configured. (BZ#832181)

  • Prior to this update, luci did not allow the SSL operation of the

fence_ilo fence agent to be enabled or disabled. As a consequence, users
could not configure or view an existing configuration for the 'ssl'
attribute for fence_ilo. This update adds a checkbox to show whether the
SSL operation is enabled and allows users to edit that attribute.
(BZ#832183)

  • Prior to this update, luci did not allow the "identity_file" attribute of

the fence_ilo_mp fence agent to be viewed or edited. As a consequence,
users could not configure or view an existing configuration for the
"identity_file" attribute of the fence_ilo_mp fence agent. This update adds
a text input box to show the current state of the "identity_file" attribute
of fence_ilo_mp and allows users to edit that attribute. (BZ#832185)

  • Prior to this update, redundant files and directories remained on the

file system at /var/lib/luci/var/pts and /usr/lib{,64}/luci/zope/var/pts
when the luci package was uninstalled. This update removes these files
and directories when the luci package is uninstalled. (BZ#835649)

  • Prior to this update, the "restart-disable" recovery policy was not

displayed in the recovery policy list from which users could select when
they configure a recovery policy for a failover domain. As a consequence,
the "restart-disable" recovery policy could not be set with the luci GUI.
This update adds the "restart-disable" recovery option to the recovery
policy pulldown list. (BZ#839732)

  • Prior to this update, line breaks that were not anticipated in the "yum

list" output could cause package upgrade and/or installation to fail when
creating clusters or adding nodes to existing clusters. As a consequence,
creating clusters and adding cluster nodes to existing clusters could fail.
This update modifies the ricci daemon to be able to correctly handle line
breaks in the "yum list" output. (BZ#842865)

In addition, this update adds the following enhancements:

  • This update adds support for configuring the Intel iPDU fence agent to

the luci package. (BZ#741986)

  • This update adds support for viewing and changing the state of the new

'nfsrestart' attribute to the FS and Cluster FS resource agent
configuration screens. (BZ#822633)

All users of conga are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements. After installing this
update, the luci and ricci services will be restarted automatically.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux High Availability for x86_64 5 x86_64
  • Red Hat Enterprise Linux High Availability for x86_64 5 ppc
  • Red Hat Enterprise Linux High Availability for x86_64 5 ia64
  • Red Hat Enterprise Linux High Availability for x86_64 5 i386
  • Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5 x86_64
  • Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5 i386

Fixes

  • BZ - 607179 - CVE-2012-3359 conga: insecure handling of luci web interface sessions
  • BZ - 832181 - fence_apc_snmp is missing from luci
  • BZ - 832183 - Luci is missing configuration of ssl for fence_ilo
  • BZ - 832185 - Luci cannot configure the "identity_file" attribute for fence_ilo_mp
  • BZ - 835649 - luci uninstall will leave /var/lib/luci/var/pts and /usr/lib*/luci/zope/var/pts behind
  • BZ - 839732 - Conga Add a Service Screen is Missing Option for Restart-Disable Recovery Policy

CVEs

  • CVE-2012-3359

References

  • https://access.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux High Availability for x86_64 5

SRPM
conga-0.12.2-64.el5.src.rpm SHA-256: f501e37b643549dd704aeadfeb6daa2a95fffeca72d13445d0c34f6747602130
x86_64
conga-debuginfo-0.12.2-64.el5.x86_64.rpm SHA-256: 0ddf5e481e6e984be7fb07b05b18a02e8b83dda5fd5355f9f0d221a56ecefeeb
luci-0.12.2-64.el5.x86_64.rpm SHA-256: 19feb8c901462e3e128bc16259dea7ef76c4122281be88cc46de1883b0a37009
ricci-0.12.2-64.el5.x86_64.rpm SHA-256: 65b95a5b9ef1fddd314cdfab5ee0da427bffb118b4ccbe59ef5ebcadc2839840
ppc
conga-debuginfo-0.12.2-64.el5.ppc.rpm SHA-256: 9c66034508d1460a516888f5257a196767416a917d99861ff204457e235413bf
luci-0.12.2-64.el5.ppc.rpm SHA-256: a773ef7f0c07604ac45e6287c5d3f61eb3106b4df3705d5712cb58fe3fb6061a
ricci-0.12.2-64.el5.ppc.rpm SHA-256: 7cf8b4f2f8e4267f05b3111b036380c2f01f5ab420cd4197c009ccd88c81f553
ia64
conga-debuginfo-0.12.2-64.el5.ia64.rpm SHA-256: 3ca3c03d2338e50c4fc080dbae291c16abdc032b04e775d3eb378accb6b4bcfe
luci-0.12.2-64.el5.ia64.rpm SHA-256: e8d373c1becb51d42122647399904659e0be841d902c0700af7f7523553c609d
ricci-0.12.2-64.el5.ia64.rpm SHA-256: 75fe0bb39b10e5d2672bf2dc5d5885a3ff2bb0dccd78c3992d91b5703d258fc3
i386
conga-debuginfo-0.12.2-64.el5.i386.rpm SHA-256: b408ef9b3079bbcfa96365817b3159592fbf23fa5ad26ab81313d9c9f5272a30
luci-0.12.2-64.el5.i386.rpm SHA-256: d6dfc90fd76d3475b32cf96954cdf5c0b2f5b32574f9e42a0ab60eddbe0d364a
ricci-0.12.2-64.el5.i386.rpm SHA-256: cba41a3f1240f36d87bfeec82da70c6189d501f5b9ae390f1386313d34ee2ee7

Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5

SRPM
conga-0.12.2-64.el5.src.rpm SHA-256: f501e37b643549dd704aeadfeb6daa2a95fffeca72d13445d0c34f6747602130
x86_64
conga-debuginfo-0.12.2-64.el5.x86_64.rpm SHA-256: 0ddf5e481e6e984be7fb07b05b18a02e8b83dda5fd5355f9f0d221a56ecefeeb
luci-0.12.2-64.el5.x86_64.rpm SHA-256: 19feb8c901462e3e128bc16259dea7ef76c4122281be88cc46de1883b0a37009
ricci-0.12.2-64.el5.x86_64.rpm SHA-256: 65b95a5b9ef1fddd314cdfab5ee0da427bffb118b4ccbe59ef5ebcadc2839840
i386
conga-debuginfo-0.12.2-64.el5.i386.rpm SHA-256: b408ef9b3079bbcfa96365817b3159592fbf23fa5ad26ab81313d9c9f5272a30
luci-0.12.2-64.el5.i386.rpm SHA-256: d6dfc90fd76d3475b32cf96954cdf5c0b2f5b32574f9e42a0ab60eddbe0d364a
ricci-0.12.2-64.el5.i386.rpm SHA-256: cba41a3f1240f36d87bfeec82da70c6189d501f5b9ae390f1386313d34ee2ee7

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility