{"id":"RHSA-2013:1284","summary":"Red Hat Security Advisory: ruby193-puppet security update","modified":"2026-01-29T10:55:26.802272Z","published":"2024-09-15T21:06:13Z","upstream":["CVE-2013-3567","CVE-2013-4761","CVE-2013-4956"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2013:1284"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"ARTICLE","url":"http://puppetlabs.com/security/cve/cve-2013-3567"},{"type":"ARTICLE","url":"http://puppetlabs.com/security/cve/cve-2013-4761"},{"type":"ARTICLE","url":"http://puppetlabs.com/security/cve/cve-2013-4956"},{"type":"ARTICLE","url":"https://access.redhat.com/support/offerings/techpreview/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=974649"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=996855"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=996856"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1284.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-3567"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-3567"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-3567"},{"type":"ARTICLE","url":"http://puppetlabs.com/security/cve/cve-2013-3567/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4761"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4761"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4761"},{"type":"ARTICLE","url":"http://puppetlabs.com/security/cve/cve-2013-4761/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4956"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4956"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4956"},{"type":"ARTICLE","url":"http://puppetlabs.com/security/cve/cve-2013-4956/"}],"affected":[{"package":{"name":"ruby193-puppet","ecosystem":"Red Hat:openstack:3::el6","purl":"pkg:rpm/redhat/ruby193-puppet"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.1.1-11.1.el6ost"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1284.json"}},{"package":{"name":"ruby193-puppet-server","ecosystem":"Red Hat:openstack:3::el6","purl":"pkg:rpm/redhat/ruby193-puppet-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.1.1-11.1.el6ost"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2013:1284.json"}}],"schema_version":"1.7.3"}