{"id":"RHSA-2013:0636","summary":"Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update","modified":"2026-01-29T10:55:49.454204Z","published":"2024-09-13T08:01:48Z","upstream":["CVE-2012-4929","CVE-2012-6075","CVE-2013-0166","CVE-2013-0169","CVE-2013-1619"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2013:0636"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=857051"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=889301"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=907589"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=908052"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=908238"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=913267"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0636.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-4929"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-4929"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4929"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2012-6075"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2012-6075"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6075"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-0166"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-0166"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0166"},{"type":"ARTICLE","url":"http://www.openssl.org/news/secadv_20130205.txt"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-0169"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-0169"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0169"},{"type":"ARTICLE","url":"http://www.isg.rhul.ac.uk/tls/"},{"type":"ARTICLE","url":"https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-1619"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-1619"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1619"},{"type":"ARTICLE","url":"http://www.gnutls.org/security.html#GNUTLS-SA-2013-1"}],"affected":[{"package":{"name":"rhev-hypervisor6","ecosystem":"Red Hat:enterprise_linux:6::hypervisor","purl":"pkg:rpm/redhat/rhev-hypervisor6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.4-20130306.2.el6_4"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:0636.json"}}],"schema_version":"1.7.3"}