Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-3741 (GCVE-0-2018-3741)
Vulnerability from cvelistv5
Published
2018-03-30 19:00
Modified
2024-08-05 04:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ()
Summary
There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Rails | rails-html-sanitizer |
Version: <= 1.0.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "rails-html-sanitizer", "vendor": "Rails", "versions": [ { "status": "affected", "version": "\u003c= 1.0.3" } ] } ], "datePublic": "2018-03-30T00:00:00", "descriptions": [ { "lang": "en", "value": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) (CWE-79)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-30T18:57:01", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2018-3741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "rails-html-sanitizer", "version": { "version_data": [ { "version_value": "\u003c= 1.0.3" } ] } } ] }, "vendor_name": "Rails" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) (CWE-79)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae", "refsource": "CONFIRM", "url": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2018-3741", "datePublished": "2018-03-30T19:00:00", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-08-05T04:50:30.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-3741\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2018-03-30T19:29:00.333\",\"lastModified\":\"2024-11-21T04:05:59.343\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.\"},{\"lang\":\"es\",\"value\":\"Es posible que haya una vulnerabilidad Cross-Site Scripting (XSS) en todas las versiones inferiores a la 1.0.4 de la gema rails-html-sanitizer para Ruby. La gema permite que los atributos que no est\u00e1n en una lista blanca est\u00e9n presentes en las salidas saneadas cuando la entrada incluye fragmentos HTML especialmente manipulados. Estos atributos pueden conducir a un ataque Cross-Site Scripting (XSS) en las aplicaciones objetivo. Este problema es similar a CVE-2018-8048 en Loofah. Todos los usuarios que ejecuten una distribuci\u00f3n afectada deben actualizarla o utilizar una de las alternativas inmediatamente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*\",\"versionEndIncluding\":\"1.0.3\",\"matchCriteriaId\":\"E221C207-396B-4686-AB55-18000F88663E\"}]}]}],\"references\":[{\"url\":\"https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae\",\"source\":\"support@hackerone.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
opensuse-su-2024:13137-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 on GA media
Notes
Title of the patch
ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 on GA media
Description of the patch
These are all security issues fixed in the ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13137
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13137", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13137-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13137-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
opensuse-su-2025:15125-1
Vulnerability from csaf_opensuse
Published
2025-05-17 00:00
Modified
2025-05-17 00:00
Summary
ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media
Notes
Title of the patch
ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media
Description of the patch
These are all security issues fixed in the ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15125
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15125", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15125-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:15125-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QQONV4QKIWHRILZMO26H7FGDPO7KJAF/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:15125-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QQONV4QKIWHRILZMO26H7FGDPO7KJAF/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23517 page", "url": "https://www.suse.com/security/cve/CVE-2022-23517/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23518 page", "url": "https://www.suse.com/security/cve/CVE-2022-23518/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23519 page", "url": "https://www.suse.com/security/cve/CVE-2022-23519/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23520 page", "url": "https://www.suse.com/security/cve/CVE-2022-23520/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media", "tracking": { "current_release_date": "2025-05-17T00:00:00Z", "generator": { "date": "2025-05-17T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15125-1", "initial_release_date": "2025-05-17T00:00:00Z", "revision_history": [ { "date": "2025-05-17T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-23517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23517" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain configurations of rails-html-sanitizer \u003c 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue has been patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23517", "url": "https://www.suse.com/security/cve/CVE-2022-23517" }, { "category": "external", "summary": "SUSE Bug 1206433 for CVE-2022-23517", "url": "https://bugzilla.suse.com/1206433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23517" }, { "cve": "CVE-2022-23518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23518" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions \u003e= 1.0.3, \u003c 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah \u003e= 2.1.0. This issue is patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23518", "url": "https://www.suse.com/security/cve/CVE-2022-23518" }, { "category": "external", "summary": "SUSE Bug 1206434 for CVE-2022-23518", "url": "https://bugzilla.suse.com/1206434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23518" }, { "cve": "CVE-2022-23519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23519" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags in either of the following ways: allow both \"math\" and \"style\" elements, or allow both \"svg\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. . This issue is fixed in version 1.4.4. All users overriding the allowed tags to include \"math\" or \"svg\" and \"style\" should either upgrade or use the following workaround immediately: Remove \"style\" from the overridden allowed tags, or remove \"math\" and \"svg\" from the overridden allowed tags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23519", "url": "https://www.suse.com/security/cve/CVE-2022-23519" }, { "category": "external", "summary": "SUSE Bug 1206435 for CVE-2022-23519", "url": "https://bugzilla.suse.com/1206435" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23519" }, { "cve": "CVE-2022-23520", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23520" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both \"select\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version 1.4.4. All users overriding the allowed tags to include both \"select\" and \"style\" should either upgrade or use this workaround: Remove either \"select\" or \"style\" from the overridden allowed tags. NOTE: Code is _not_ impacted if allowed tags are overridden using either the :tags option to the Action View helper method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23520", "url": "https://www.suse.com/security/cve/CVE-2022-23520" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-23520", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23520" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
opensuse-su-2024:11349-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 on GA media
Notes
Title of the patch
ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 on GA media
Description of the patch
These are all security issues fixed in the ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11349
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11349", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11349-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" } ], "title": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11349-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" } ] }
opensuse-su-2024:14175-1
Vulnerability from csaf_opensuse
Published
2024-07-12 00:00
Modified
2024-07-12 00:00
Summary
ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 on GA media
Notes
Title of the patch
ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 on GA media
Description of the patch
These are all security issues fixed in the ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-14175
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14175", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14175-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23517 page", "url": "https://www.suse.com/security/cve/CVE-2022-23517/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23518 page", "url": "https://www.suse.com/security/cve/CVE-2022-23518/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23519 page", "url": "https://www.suse.com/security/cve/CVE-2022-23519/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23520 page", "url": "https://www.suse.com/security/cve/CVE-2022-23520/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 on GA media", "tracking": { "current_release_date": "2024-07-12T00:00:00Z", "generator": { "date": "2024-07-12T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14175-1", "initial_release_date": "2024-07-12T00:00:00Z", "revision_history": [ { "date": "2024-07-12T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-23517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23517" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain configurations of rails-html-sanitizer \u003c 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue has been patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23517", "url": "https://www.suse.com/security/cve/CVE-2022-23517" }, { "category": "external", "summary": "SUSE Bug 1206433 for CVE-2022-23517", "url": "https://bugzilla.suse.com/1206433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23517" }, { "cve": "CVE-2022-23518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23518" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions \u003e= 1.0.3, \u003c 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah \u003e= 2.1.0. This issue is patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23518", "url": "https://www.suse.com/security/cve/CVE-2022-23518" }, { "category": "external", "summary": "SUSE Bug 1206434 for CVE-2022-23518", "url": "https://bugzilla.suse.com/1206434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23518" }, { "cve": "CVE-2022-23519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23519" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags in either of the following ways: allow both \"math\" and \"style\" elements, or allow both \"svg\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. . This issue is fixed in version 1.4.4. All users overriding the allowed tags to include \"math\" or \"svg\" and \"style\" should either upgrade or use the following workaround immediately: Remove \"style\" from the overridden allowed tags, or remove \"math\" and \"svg\" from the overridden allowed tags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23519", "url": "https://www.suse.com/security/cve/CVE-2022-23519" }, { "category": "external", "summary": "SUSE Bug 1206435 for CVE-2022-23519", "url": "https://bugzilla.suse.com/1206435" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23519" }, { "cve": "CVE-2022-23520", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23520" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both \"select\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version 1.4.4. All users overriding the allowed tags to include both \"select\" and \"style\" should either upgrade or use this workaround: Remove either \"select\" or \"style\" from the overridden allowed tags. NOTE: Code is _not_ impacted if allowed tags are overridden using either the :tags option to the Action View helper method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23520", "url": "https://www.suse.com/security/cve/CVE-2022-23520" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-23520", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23520" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
opensuse-su-2024:12145-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 on GA media
Notes
Title of the patch
ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 on GA media
Description of the patch
These are all security issues fixed in the ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-12145
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12145", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12145-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12145-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
rhsa-2019:0212
Vulnerability from csaf_redhat
Published
2019-02-07 23:01
Modified
2024-11-22 12:00
Summary
Red Hat Security Advisory: CloudForms 4.7 security, bug fix and enhancement update
Notes
Topic
An update is now available for CloudForms Management Engine 5.10.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.
Security Fix(es):
* rubygem-sinatra: XSS in the 400 Bad Request page (CVE-2018-11627)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
This update fixes various bugs and adds enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for CloudForms Management Engine 5.10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nSecurity Fix(es):\n\n* rubygem-sinatra: XSS in the 400 Bad Request page (CVE-2018-11627)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update fixes various bugs and adds enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0212", "url": "https://access.redhat.com/errata/RHSA-2019:0212" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.7/html/release_notes", "url": "https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.7/html/release_notes" }, { "category": "external", "summary": "1082155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1082155" }, { "category": "external", "summary": "1090627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1090627" }, { "category": "external", "summary": "1090957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1090957" }, { "category": "external", "summary": "1164306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164306" }, { "category": "external", "summary": "1212947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212947" }, { "category": "external", "summary": "1314871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314871" }, { "category": "external", "summary": "1318353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1318353" }, { "category": "external", "summary": "1326992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326992" }, { "category": "external", "summary": "1339398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1339398" }, { "category": "external", "summary": "1344589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344589" }, { "category": "external", "summary": "1353037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353037" }, { "category": "external", "summary": "1390456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390456" }, { "category": "external", "summary": "1391095", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391095" }, { "category": "external", "summary": "1392342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392342" }, { "category": "external", "summary": "1394217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1394217" }, { "category": "external", "summary": "1394263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1394263" }, { "category": "external", "summary": "1399378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399378" }, { "category": "external", "summary": "1417215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417215" }, { "category": "external", "summary": "1418080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418080" }, { "category": "external", "summary": "1426390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426390" }, { "category": "external", "summary": "1428003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428003" }, { "category": "external", "summary": "1428536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428536" }, { "category": "external", "summary": "1428584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428584" }, { "category": "external", "summary": "1428797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1428797" }, { "category": "external", "summary": "1434762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434762" }, { "category": "external", "summary": "1434918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434918" }, { "category": "external", "summary": "1435780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1435780" }, { "category": "external", "summary": "1441326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441326" }, { "category": "external", "summary": "1441353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441353" }, { "category": "external", "summary": "1442702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1442702" }, { "category": "external", "summary": "1444520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444520" }, { "category": "external", "summary": "1445932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445932" }, { "category": "external", "summary": "1448683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448683" }, { "category": "external", "summary": "1450008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450008" }, { "category": "external", "summary": "1451300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1451300" }, { "category": "external", "summary": "1460263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460263" }, { "category": "external", "summary": "1460992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460992" }, { "category": "external", "summary": "1463555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463555" }, { "category": "external", "summary": "1468252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468252" }, { "category": "external", "summary": "1468339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468339" }, { "category": "external", "summary": "1468795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468795" }, { "category": "external", "summary": "1469151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469151" }, { "category": "external", "summary": "1469372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469372" }, { "category": "external", "summary": "1470754", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470754" }, { "category": "external", "summary": "1471948", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471948" }, { "category": "external", "summary": "1472279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472279" }, { "category": "external", "summary": "1474511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474511" }, { "category": "external", "summary": "1475303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475303" }, { "category": "external", "summary": "1475891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475891" }, { "category": "external", "summary": "1476327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476327" }, { "category": "external", "summary": "1478889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478889" }, { "category": "external", "summary": "1481840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481840" }, { "category": "external", "summary": "1482905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482905" }, { "category": "external", "summary": "1486362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486362" }, { "category": "external", "summary": "1486658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486658" }, { "category": "external", "summary": "1486695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486695" }, { "category": "external", "summary": "1487142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487142" }, { "category": "external", "summary": "1487234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487234" }, { "category": "external", "summary": "1488579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488579" }, { "category": "external", "summary": "1490979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490979" }, { "category": "external", "summary": "1491387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491387" }, { "category": "external", "summary": "1491772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491772" }, { "category": "external", "summary": "1493788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493788" }, { "category": "external", "summary": "1494359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494359" }, { "category": "external", "summary": "1494589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494589" }, { "category": "external", "summary": "1495265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495265" }, { "category": "external", "summary": "1495630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495630" }, { "category": "external", "summary": "1495829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495829" }, { "category": "external", "summary": "1496838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496838" }, { "category": "external", "summary": "1497061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497061" }, { "category": "external", "summary": "1498951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498951" }, { "category": "external", "summary": "1499161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1499161" }, { "category": "external", "summary": "1500613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500613" }, { "category": "external", "summary": "1501031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501031" }, { "category": "external", "summary": "1501052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501052" }, { "category": "external", "summary": "1501098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501098" }, { "category": "external", "summary": "1501114", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501114" }, { "category": "external", "summary": "1501147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501147" }, { "category": "external", "summary": "1501996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501996" }, { "category": "external", "summary": "1502778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502778" }, { "category": "external", "summary": "1502857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502857" }, { "category": "external", "summary": "1503660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503660" }, { "category": "external", "summary": "1504209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504209" }, { "category": "external", "summary": "1505159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505159" }, { "category": "external", "summary": "1506634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506634" }, { "category": "external", "summary": "1506685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506685" }, { "category": "external", "summary": "1506987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506987" }, { "category": "external", "summary": "1507667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507667" }, { "category": "external", "summary": "1507812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507812" }, { "category": "external", "summary": "1507916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507916" }, { "category": "external", "summary": "1508490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508490" }, { "category": "external", "summary": "1509244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509244" }, { "category": "external", "summary": "1511126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511126" }, { "category": "external", "summary": "1511171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511171" }, { "category": "external", "summary": "1511214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511214" }, { "category": "external", "summary": "1511376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511376" }, { "category": "external", "summary": "1512399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512399" }, { "category": "external", "summary": "1512443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512443" }, { "category": "external", "summary": "1512480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512480" }, { "category": "external", "summary": "1513086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1513086" }, { "category": "external", "summary": "1513520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1513520" }, { "category": "external", "summary": "1513616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1513616" }, { "category": "external", "summary": "1516836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516836" }, { "category": "external", "summary": "1516895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516895" }, { "category": "external", "summary": "1518304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518304" }, { "category": "external", "summary": "1518630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518630" }, { "category": "external", "summary": "1518867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518867" }, { "category": "external", "summary": "1518926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518926" }, { "category": "external", "summary": "1519341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519341" }, { "category": "external", "summary": "1520930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520930" }, { "category": "external", "summary": "1523281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523281" }, { "category": "external", "summary": "1524309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524309" }, { "category": "external", "summary": "1525188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525188" }, { "category": "external", "summary": "1525237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525237" }, { "category": "external", "summary": "1525546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525546" }, { "category": "external", "summary": "1525883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525883" }, { "category": "external", "summary": "1525922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525922" }, { "category": "external", "summary": "1525926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525926" }, { "category": "external", "summary": "1525954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525954" }, { "category": "external", "summary": "1525973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525973" }, { "category": "external", "summary": "1526472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526472" }, { "category": "external", "summary": "1526495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526495" }, { "category": "external", "summary": "1526553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526553" }, { "category": "external", "summary": "1527681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1527681" }, { "category": "external", "summary": "1530259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530259" }, { "category": "external", "summary": "1530345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530345" }, { "category": "external", "summary": "1530948", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530948" }, { "category": "external", "summary": "1530952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530952" }, { "category": "external", "summary": "1530953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530953" }, { "category": "external", "summary": "1531117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531117" }, { "category": "external", "summary": "1531910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531910" }, { "category": "external", "summary": "1532201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532201" }, { "category": "external", "summary": "1532244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532244" }, { "category": "external", "summary": "1533063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533063" }, { "category": "external", "summary": "1533093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533093" }, { "category": "external", "summary": "1533284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533284" }, { "category": "external", "summary": "1533671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533671" }, { "category": "external", "summary": "1533728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533728" }, { "category": "external", "summary": "1535177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535177" }, { "category": "external", "summary": "1535179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535179" }, { "category": "external", "summary": "1535229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535229" }, { "category": "external", "summary": "1535237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535237" }, { "category": "external", "summary": "1535345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535345" }, { "category": "external", "summary": "1536144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536144" }, { "category": "external", "summary": "1536452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536452" }, { "category": "external", "summary": "1536524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536524" }, { "category": "external", "summary": "1536625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536625" }, { "category": "external", "summary": "1536711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536711" }, { "category": "external", "summary": "1537493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537493" }, { "category": "external", "summary": "1538058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538058" }, { "category": "external", "summary": "1538087", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538087" }, { "category": "external", "summary": "1538109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538109" }, { "category": "external", "summary": "1538825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538825" }, { "category": "external", "summary": "1539370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539370" }, { "category": "external", "summary": "1539379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539379" }, { "category": "external", "summary": "1540254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540254" }, { "category": "external", "summary": "1540283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540283" }, { "category": "external", "summary": "1540684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540684" }, { "category": "external", "summary": "1540692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540692" }, { "category": "external", "summary": "1540894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540894" }, { "category": "external", "summary": "1542907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542907" }, { "category": "external", "summary": "1543289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1543289" }, { "category": "external", "summary": "1544317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544317" }, { "category": "external", "summary": "1544344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544344" }, { "category": "external", "summary": "1544854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544854" }, { "category": "external", "summary": "1545147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545147" }, { "category": "external", "summary": "1545296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545296" }, { "category": "external", "summary": "1545322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545322" }, { "category": "external", "summary": "1545401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545401" }, { "category": "external", "summary": "1545520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545520" }, { "category": "external", "summary": "1545835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545835" }, { "category": "external", "summary": "1546864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546864" }, { "category": "external", "summary": "1547740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547740" }, { "category": "external", "summary": "1549076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549076" }, { "category": "external", "summary": "1549123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549123" }, { "category": "external", "summary": "1549658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549658" }, { "category": "external", "summary": "1550008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550008" }, { "category": "external", "summary": "1550493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550493" }, { "category": "external", "summary": "1550641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550641" }, { "category": "external", "summary": "1551273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551273" }, { "category": "external", "summary": "1552064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552064" }, { "category": "external", "summary": "1553157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553157" }, { "category": "external", "summary": "1553833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553833" }, { "category": "external", "summary": "1554809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554809" }, { "category": "external", "summary": "1557363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557363" }, { "category": "external", "summary": "1557968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557968" }, { "category": "external", "summary": "1558620", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558620" }, { "category": "external", "summary": "1559184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559184" }, { "category": "external", "summary": "1559422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559422" }, { "category": "external", "summary": "1559957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559957" }, { "category": "external", "summary": "1560479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560479" }, { "category": "external", "summary": "1560527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560527" }, { "category": "external", "summary": "1560530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560530" }, { "category": "external", "summary": "1560535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560535" }, { "category": "external", "summary": "1560679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560679" }, { "category": "external", "summary": "1560691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560691" }, { "category": "external", "summary": "1561160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561160" }, { "category": "external", "summary": "1561167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561167" }, { "category": "external", "summary": "1561180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561180" }, { "category": "external", "summary": "1561609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561609" }, { "category": "external", "summary": "1561627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561627" }, { "category": "external", "summary": "1561646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561646" }, { "category": "external", "summary": "1561698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561698" }, { "category": "external", "summary": "1561937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561937" }, { "category": "external", "summary": "1561959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561959" }, { "category": "external", "summary": "1562062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562062" }, { "category": "external", "summary": "1562828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562828" }, { "category": "external", "summary": "1562956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562956" }, { "category": "external", "summary": "1563311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563311" }, { "category": "external", "summary": "1563316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563316" }, { "category": "external", "summary": "1563867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563867" }, { "category": "external", "summary": "1564199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564199" }, { "category": "external", "summary": "1564495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564495" }, { "category": "external", "summary": "1565019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565019" }, { "category": "external", "summary": "1565208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565208" }, { "category": "external", "summary": "1565235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565235" }, { "category": "external", "summary": "1565266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565266" }, { "category": "external", "summary": "1565620", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565620" }, { "category": "external", "summary": "1565621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565621" }, { "category": "external", "summary": "1565628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565628" }, { "category": "external", "summary": "1565629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565629" }, { "category": "external", "summary": "1565631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565631" }, { "category": "external", "summary": "1565634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565634" }, { "category": "external", "summary": "1565635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565635" }, { "category": "external", "summary": "1565636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565636" }, { "category": "external", "summary": "1565637", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565637" }, { "category": "external", "summary": "1565640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565640" }, { "category": "external", "summary": "1565642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565642" }, { "category": "external", "summary": "1565763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565763" }, { "category": "external", "summary": "1565791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565791" }, { "category": "external", "summary": "1566615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566615" }, { "category": "external", "summary": "1568073", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568073" }, { "category": "external", "summary": "1568077", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568077" }, { "category": "external", "summary": "1568687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568687" }, { "category": "external", "summary": "1568805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568805" }, { "category": "external", "summary": "1569437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569437" }, { "category": "external", "summary": "1569452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569452" }, { "category": "external", "summary": "1570044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570044" }, { "category": "external", "summary": "1570121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570121" }, { "category": "external", "summary": "1570123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570123" }, { "category": "external", "summary": "1570128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570128" }, { "category": "external", "summary": "1570561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570561" }, { "category": "external", "summary": "1571223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571223" }, { "category": "external", "summary": "1571610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571610" }, { "category": "external", "summary": "1571614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571614" }, { "category": "external", "summary": "1572350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572350" }, { "category": "external", "summary": "1572376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572376" }, { "category": "external", "summary": "1572793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572793" }, { "category": "external", "summary": "1573566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573566" }, { "category": "external", "summary": "1573568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573568" }, { "category": "external", "summary": "1573570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573570" }, { "category": "external", "summary": "1573572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573572" }, { "category": "external", "summary": "1573574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573574" }, { "category": "external", "summary": "1573575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573575" }, { "category": "external", "summary": "1573576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573576" }, { "category": "external", "summary": "1573578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573578" }, { "category": "external", "summary": "1573580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573580" }, { "category": "external", "summary": "1573581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573581" }, { "category": "external", "summary": "1573591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573591" }, { "category": "external", "summary": "1573594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573594" }, { "category": "external", "summary": "1573596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573596" }, { "category": "external", "summary": "1573607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573607" }, { "category": "external", "summary": "1573614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573614" }, { "category": "external", "summary": "1573616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573616" }, { "category": "external", "summary": "1574029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574029" }, { "category": "external", "summary": "1574403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574403" }, { "category": "external", "summary": "1574444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574444" }, { "category": "external", "summary": "1574488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574488" }, { "category": "external", "summary": "1574638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574638" }, { "category": "external", "summary": "1574808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574808" }, { "category": "external", "summary": "1574809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574809" }, { "category": "external", "summary": "1574810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574810" }, { "category": "external", "summary": "1574813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574813" }, { "category": "external", "summary": "1574816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574816" }, { "category": "external", "summary": "1574817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574817" }, { "category": "external", "summary": "1574818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574818" }, { "category": "external", "summary": "1574820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574820" }, { "category": "external", "summary": "1574821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574821" }, { "category": "external", "summary": "1574828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574828" }, { "category": "external", "summary": "1574829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574829" }, { "category": "external", "summary": "1574830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574830" }, { "category": "external", "summary": "1575773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575773" }, { "category": "external", "summary": "1576457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576457" }, { "category": "external", "summary": "1576561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576561" }, { "category": "external", "summary": "1576922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576922" }, { "category": "external", "summary": "1576984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576984" }, { "category": "external", "summary": "1578792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578792" }, { "category": "external", "summary": "1579031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579031" }, { "category": "external", "summary": "1579753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579753" }, { "category": "external", "summary": "1579934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579934" }, { "category": "external", "summary": "1581288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581288" }, { "category": "external", "summary": "1581652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581652" }, { "category": "external", "summary": "1582212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1582212" }, { "category": "external", "summary": "1583017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583017" }, { "category": "external", "summary": "1583175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583175" }, { "category": "external", "summary": "1583754", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583754" }, { "category": "external", "summary": "1584172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584172" }, { "category": "external", "summary": "1585218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585218" }, { "category": "external", "summary": "1585569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585569" }, { "category": "external", "summary": "1585689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585689" }, { "category": "external", "summary": "1586176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1586176" }, { "category": "external", "summary": "1586186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1586186" }, { "category": "external", "summary": "1586187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1586187" }, { "category": "external", "summary": "1588072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588072" }, { "category": "external", "summary": "1588189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588189" }, { "category": "external", "summary": "1589009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589009" }, { "category": "external", "summary": "1589065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589065" }, { "category": "external", "summary": "1589261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589261" }, { "category": "external", "summary": "1589265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589265" }, { "category": "external", "summary": "1590288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590288" }, { "category": "external", "summary": "1590440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590440" }, { "category": "external", "summary": "1590441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590441" }, { "category": "external", "summary": "1590764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590764" }, { "category": "external", "summary": "1590840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590840" }, { "category": "external", "summary": "1590844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590844" }, { "category": "external", "summary": "1590975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590975" }, { "category": "external", "summary": "1592573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592573" }, { "category": "external", "summary": "1592891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592891" }, { "category": "external", "summary": "1592897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592897" }, { "category": "external", "summary": "1592898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592898" }, { "category": "external", "summary": "1592900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592900" }, { "category": "external", "summary": "1593663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593663" }, { "category": "external", "summary": "1593760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593760" }, { "category": "external", "summary": "1594196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594196" }, { "category": "external", "summary": "1594469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594469" }, { "category": "external", "summary": "1594757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594757" }, { "category": "external", "summary": "1595149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595149" }, { "category": "external", "summary": "1595583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595583" }, { "category": "external", "summary": "1596136", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596136" }, { "category": "external", "summary": "1596143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596143" }, { "category": "external", "summary": "1596172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596172" }, { "category": "external", "summary": "1596266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596266" }, { "category": "external", "summary": "1597802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597802" }, { "category": "external", "summary": "1597914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597914" }, { "category": "external", "summary": "1599798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599798" }, { "category": "external", "summary": "1599868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599868" }, { "category": "external", "summary": "1599997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599997" }, { "category": "external", "summary": "1600678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600678" }, { "category": "external", "summary": "1601523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601523" }, { "category": "external", "summary": "1601590", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601590" }, { "category": "external", "summary": "1602136", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602136" }, { "category": "external", "summary": "1602413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602413" }, { "category": "external", "summary": "1602848", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602848" }, { "category": "external", "summary": "1602883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602883" }, { "category": "external", "summary": "1605210", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1605210" }, { "category": "external", "summary": "1608554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1608554" }, { "category": "external", "summary": "1609564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609564" }, { "category": "external", "summary": "1609905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609905" }, { "category": "external", "summary": "1609924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609924" }, { "category": "external", "summary": "1610299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610299" }, { "category": "external", "summary": "1610768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610768" }, { "category": "external", "summary": "1610798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610798" }, { "category": "external", "summary": "1612002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612002" }, { "category": "external", "summary": "1613848", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1613848" }, { "category": "external", "summary": "1614006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614006" }, { "category": "external", "summary": "1614369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614369" }, { "category": "external", "summary": "1614918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614918" }, { "category": "external", "summary": "1615444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1615444" }, { "category": "external", "summary": "1615488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1615488" }, { "category": "external", "summary": "1616201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616201" }, { "category": "external", "summary": "1618743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618743" }, { "category": "external", "summary": "1618813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618813" }, { "category": "external", "summary": "1618844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618844" }, { "category": "external", "summary": "1619298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619298" }, { "category": "external", "summary": "1619678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619678" }, { "category": "external", "summary": "1619744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619744" }, { "category": "external", "summary": "1620161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620161" }, { "category": "external", "summary": "1620228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620228" }, { "category": "external", "summary": "1620287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620287" }, { "category": "external", "summary": "1621888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1621888" }, { "category": "external", "summary": "1623072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623072" }, { "category": "external", "summary": "1623094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623094" }, { "category": "external", "summary": "1623862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623862" }, { "category": "external", "summary": "1625320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625320" }, { "category": "external", "summary": "1626005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1626005" }, { "category": "external", "summary": "1627284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627284" }, { "category": "external", "summary": "1628726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1628726" }, { "category": "external", "summary": "1629900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629900" }, { "category": "external", "summary": "1629903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629903" }, { "category": "external", "summary": "1629905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629905" }, { "category": "external", "summary": "1630801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1630801" }, { "category": "external", "summary": "1632355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632355" }, { "category": "external", "summary": "1632844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632844" }, { "category": "external", "summary": "1633526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1633526" }, { "category": "external", "summary": "1634029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634029" }, { "category": "external", "summary": "1634673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634673" }, { "category": "external", "summary": "1635026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1635026" }, { "category": "external", "summary": "1636182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1636182" }, { "category": "external", "summary": "1636547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1636547" }, { "category": "external", "summary": "1637609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1637609" }, { "category": "external", "summary": "1638502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1638502" }, { "category": "external", "summary": "1638508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1638508" }, { "category": "external", "summary": "1638527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1638527" }, { "category": "external", "summary": "1638853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1638853" }, { "category": "external", "summary": "1640275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640275" }, { "category": "external", "summary": "1640279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640279" }, { "category": "external", "summary": "1640362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640362" }, { "category": "external", "summary": "1640594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640594" }, { "category": "external", "summary": "1640718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640718" }, { "category": "external", "summary": "1640779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640779" }, { "category": "external", "summary": "1642175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642175" }, { "category": "external", "summary": "1642464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642464" }, { "category": "external", "summary": "1642495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642495" }, { "category": "external", "summary": "1643148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643148" }, { "category": "external", "summary": "1643290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643290" }, { "category": "external", "summary": "1643610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643610" }, { "category": "external", "summary": "1644310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644310" }, { "category": "external", "summary": "1644351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644351" }, { "category": "external", "summary": "1644802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644802" }, { "category": "external", "summary": "1645168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645168" }, { "category": "external", "summary": "1645629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645629" }, { "category": "external", "summary": "1645714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645714" }, { "category": "external", "summary": "1646657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646657" }, { "category": "external", "summary": "1646905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646905" }, { "category": "external", "summary": "1647013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647013" }, { "category": "external", "summary": "1647234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647234" }, { "category": "external", "summary": "1649799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649799" }, { "category": "external", "summary": "1649806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649806" }, { "category": "external", "summary": "1651241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651241" }, { "category": "external", "summary": "1653169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653169" }, { "category": "external", "summary": "1653709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653709" }, { "category": "external", "summary": "1653796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1653796" }, { "category": "external", "summary": "1654385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1654385" }, { "category": "external", "summary": "1654828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1654828" }, { "category": "external", "summary": "1655012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655012" }, { "category": "external", "summary": "1655163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655163" }, { "category": "external", "summary": "1655174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655174" }, { "category": "external", "summary": "1656961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656961" }, { "category": "external", "summary": "1663031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663031" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0212.json" } ], "title": "Red Hat Security Advisory: CloudForms 4.7 security, bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-22T12:00:19+00:00", "generator": { "date": "2024-11-22T12:00:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0212", "initial_release_date": "2019-02-07T23:01:32+00:00", "revision_history": [ { "date": "2019-02-07T23:01:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-07T23:01:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T12:00:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms Management Engine 5.10", "product": { "name": "CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.10::el7" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "product": { "name": "bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "product_id": "bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bubblewrap-debuginfo@0.1.7-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "bubblewrap-0:0.1.7-1.el7.x86_64", "product": { "name": "bubblewrap-0:0.1.7-1.el7.x86_64", "product_id": "bubblewrap-0:0.1.7-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bubblewrap@0.1.7-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "dumb-init-0:1.2.0-1.el7cf.x86_64", "product": { "name": "dumb-init-0:1.2.0-1.el7cf.x86_64", "product_id": "dumb-init-0:1.2.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dumb-init@1.2.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "product": { "name": "dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "product_id": "dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dumb-init-debuginfo@1.2.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "product": { "name": "httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "product_id": "httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.2-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "product": { "name": "nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "product_id": "nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nginx-mod-http-xslt-filter@1.10.2-1.el7at?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "product": { "name": "nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "product_id": "nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nginx-mod-mail@1.10.2-1.el7at?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nginx-1:1.10.2-1.el7at.x86_64", "product": { "name": "nginx-1:1.10.2-1.el7at.x86_64", "product_id": "nginx-1:1.10.2-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nginx@1.10.2-1.el7at?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "product": { "name": "nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "product_id": "nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nginx-mod-http-image-filter@1.10.2-1.el7at?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "product": { "name": "nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "product_id": "nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nginx-mod-http-geoip@1.10.2-1.el7at?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "product": { "name": "nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "product_id": "nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nginx-debuginfo@1.10.2-1.el7at?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "product": { "name": "nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "product_id": "nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nginx-mod-stream@1.10.2-1.el7at?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "product": { "name": "nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "product_id": "nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nginx-mod-http-perl@1.10.2-1.el7at?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "prince-0:9.0r2-10.el7cf.x86_64", "product": { "name": "prince-0:9.0r2-10.el7cf.x86_64", "product_id": "prince-0:9.0r2-10.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prince@9.0r2-10.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "python2-crypto-0:2.6.1-16.el7at.x86_64", "product": { "name": "python2-crypto-0:2.6.1-16.el7at.x86_64", "product_id": "python2-crypto-0:2.6.1-16.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-crypto@2.6.1-16.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "product": { "name": "python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "product_id": "python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-crypto-debuginfo@2.6.1-16.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "product": { "name": "python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "product_id": "python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-meld3-debuginfo@0.6.10-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-meld3-0:0.6.10-1.el7.x86_64", "product": { "name": "python-meld3-0:0.6.10-1.el7.x86_64", "product_id": "python-meld3-0:0.6.10-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-meld3@0.6.10-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "product": { "name": "qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "product_id": "qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-debuginfo@0.19.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "product": { "name": "qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "product_id": "qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-c-devel@0.19.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "product": { "name": "qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "product_id": "qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-c@0.19.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "product": { "name": "qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "product_id": "qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-cpp-devel@0.19.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "product": { "name": "python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "product_id": "python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-proton@0.19.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "product": { "name": "qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "product_id": "qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-cpp@0.19.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "product": { "name": "rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "product_id": "rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-bcrypt-debuginfo@3.1.12-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "product": { "name": "rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "product_id": "rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-bcrypt@3.1.12-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "product": { "name": "rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "product_id": "rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-hamlit-debuginfo@2.8.8-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "product": { "name": "rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "product_id": "rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-hamlit@2.8.8-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "product": { "name": "rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "product_id": "rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-http_parser.rb-debuginfo@0.6.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "product": { "name": "rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "product_id": "rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-http_parser.rb@0.6.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_id": "rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-json-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_id": "rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-json@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_id": "rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "product": { "name": "rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "product_id": "rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-linux_block_device-debuginfo@0.2.1-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "product": { "name": "rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "product_id": "rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-linux_block_device@0.2.1-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "product": { "name": "rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "product_id": "rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-memory_buffer-debuginfo@0.1.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "product": { "name": "rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "product_id": "rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-memory_buffer@0.1.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "product": { "name": "rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "product_id": "rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nio4r-debuginfo@2.3.1-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "product": { "name": "rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "product_id": "rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nio4r@2.3.1-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "product": { "name": "rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "product_id": "rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nokogiri-doc@1.8.2-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "product": { "name": "rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "product_id": "rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nokogiri@1.8.2-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "product": { "name": "rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "product_id": "rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nokogiri-debuginfo@1.8.2-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "product": { "name": "rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "product_id": "rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ovirt-engine-sdk4-debuginfo@4.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "product": { "name": "rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "product_id": "rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ovirt-engine-sdk4@4.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "product": { "name": "rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "product_id": "rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@0.18.4-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-pg-0:0.18.4-2.el7cf.x86_64", "product": { "name": "rubygem-pg-0:0.18.4-2.el7cf.x86_64", "product_id": "rubygem-pg-0:0.18.4-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-pg@0.18.4-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-puma-0:3.7.1-1.el7cf.x86_64", "product": { "name": "rubygem-puma-0:3.7.1-1.el7cf.x86_64", "product_id": "rubygem-puma-0:3.7.1-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-puma@3.7.1-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "product": { "name": "rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "product_id": "rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-puma-debuginfo@3.7.1-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product": { "name": "rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product_id": "rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-qpid_proton@0.22.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product": { "name": "rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product_id": "rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-qpid_proton-debuginfo@0.22.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "product": { "name": "rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "product_id": "rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-unf_ext-debuginfo@0.0.7.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "product": { "name": "rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "product_id": "rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-unf_ext@0.0.7.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "product": { "name": "rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "product_id": "rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-websocket-driver@0.6.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "product": { "name": "rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "product_id": "rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-websocket-driver-debuginfo@0.6.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "wmi-0:1.3.14-7.el7cf.x86_64", "product": { "name": "wmi-0:1.3.14-7.el7cf.x86_64", "product_id": "wmi-0:1.3.14-7.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wmi@1.3.14-7.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "product": { "name": "wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "product_id": "wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wmi-debuginfo@1.3.14-7.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "product": { "name": "rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "product_id": "rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ffi@1.9.25-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "product": { "name": "rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "product_id": "rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ffi-debuginfo@1.9.25-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "product": { "name": "python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "product_id": "python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-psutil-debuginfo@5.4.3-2.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "python2-psutil-0:5.4.3-2.el7at.x86_64", "product": { "name": "python2-psutil-0:5.4.3-2.el7at.x86_64", "product_id": "python2-psutil-0:5.4.3-2.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-psutil@5.4.3-2.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "product": { "name": "rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "product_id": "rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-postgresql95-postgresql-pglogical@2.1.0-4.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "product": { "name": "rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "product_id": "rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-postgresql95-postgresql-pglogical-debuginfo@2.1.0-4.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "product": { "name": "rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "product_id": "rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rugged-debuginfo@0.27.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "product": { "name": "rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "product_id": "rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rugged@0.27.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "product": { "name": "postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "product_id": "postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-contrib@9.6.10-1PGDG.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "product": { "name": "postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "product_id": "postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-devel@9.6.10-1PGDG.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "product": { "name": "postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "product_id": "postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-libs@9.6.10-1PGDG.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "product": { "name": "postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "product_id": "postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-plpython@9.6.10-1PGDG.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "product": { "name": "postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "product_id": "postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96@9.6.10-1PGDG.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "product": { "name": "postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "product_id": "postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-test@9.6.10-1PGDG.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "product": { "name": "postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "product_id": "postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-pltcl@9.6.10-1PGDG.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "product": { "name": "postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "product_id": "postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-plperl@9.6.10-1PGDG.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "product": { "name": "postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "product_id": "postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-debuginfo@9.6.10-1PGDG.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "product": { "name": "postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "product_id": "postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-docs@9.6.10-1PGDG.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "product": { "name": "postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "product_id": "postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-server@9.6.10-1PGDG.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-percept-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-percept-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-percept-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-percept@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-asn1@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-erts-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-erts-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-erts-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-erts@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-reltool@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-cosTransactions@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-observer-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-observer-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-observer-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-observer@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-eunit@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-parsetools@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-runtime_tools@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-debugger@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-xmerl@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-eldap@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-hipe@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-inets-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-inets-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-inets-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-inets@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-typer-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-typer-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-typer-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-typer@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-et-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-et-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-et-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-et@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-dialyzer@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-cosEventDomain@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-debuginfo@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-mnesia@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-kernel@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-sasl@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-gs-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-gs-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-gs-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-gs@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-os_mon@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-megaco@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-cosTime@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-diameter@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-erl_docgen@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-compiler@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-stdlib@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-crypto@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-snmp@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-wx-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-wx-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-wx-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-wx@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-orber-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-orber-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-orber-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-orber@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-otp_mibs@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-cosFileTransfer@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-cosNotification@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-erl_interface@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-edoc@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-common_test@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-cosProperty@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-odbc@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-tools-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-tools-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-tools-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-tools@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-syntax_tools@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-cosEvent@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-ssh@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-jinterface@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-ssl@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-ic-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-ic-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-ic-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-ic@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "product": { "name": "erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "product_id": "erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-public_key@19.3.6.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "wxBase3-0:3.0.3-5.el7at.x86_64", "product": { "name": "wxBase3-0:3.0.3-5.el7at.x86_64", "product_id": "wxBase3-0:3.0.3-5.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wxBase3@3.0.3-5.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "product": { "name": "wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "product_id": "wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wxGTK3-devel@3.0.3-5.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "product": { "name": "wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "product_id": "wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wxGTK3-debuginfo@3.0.3-5.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "wxGTK3-0:3.0.3-5.el7at.x86_64", "product": { "name": "wxGTK3-0:3.0.3-5.el7at.x86_64", "product_id": "wxGTK3-0:3.0.3-5.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wxGTK3@3.0.3-5.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "product": { "name": "wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "product_id": "wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wxGTK3-gl@3.0.3-5.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "wxGTK3-media-0:3.0.3-5.el7at.x86_64", "product": { "name": "wxGTK3-media-0:3.0.3-5.el7at.x86_64", "product_id": "wxGTK3-media-0:3.0.3-5.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wxGTK3-media@3.0.3-5.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-libs-0:2.4.5-90.el7cf.x86_64", "product": { "name": "ruby-libs-0:2.4.5-90.el7cf.x86_64", "product_id": "ruby-libs-0:2.4.5-90.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-libs@2.4.5-90.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "product": { "name": "rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "product_id": "rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-did_you_mean@1.1.0-90.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-devel-0:2.4.5-90.el7cf.x86_64", "product": { "name": "ruby-devel-0:2.4.5-90.el7cf.x86_64", "product_id": "ruby-devel-0:2.4.5-90.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-devel@2.4.5-90.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "product": { "name": "ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "product_id": "ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-debuginfo@2.4.5-90.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "product": { "name": "rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "product_id": "rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-net-telnet@0.1.1-90.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "ruby-0:2.4.5-90.el7cf.x86_64", "product": { "name": "ruby-0:2.4.5-90.el7cf.x86_64", "product_id": "ruby-0:2.4.5-90.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby@2.4.5-90.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "product": { "name": "rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "product_id": "rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openssl@2.0.9-90.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "product": { "name": "rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "product_id": "rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-bigdecimal@1.3.2-90.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "product": { "name": "rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "product_id": "rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-io-console@0.4.6-90.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-psych-0:2.2.2-90.el7cf.x86_64", "product": { "name": "rubygem-psych-0:2.2.2-90.el7cf.x86_64", "product_id": "rubygem-psych-0:2.2.2-90.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-psych@2.2.2-90.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "product": { "name": "ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "product_id": "ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-venv-tower@3.3.3-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "product": { "name": "ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "product_id": "ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-ui@3.3.3-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "product": { "name": "ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "product_id": "ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-venv-ansible@3.3.3-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-server-0:3.3.3-1.el7at.x86_64", "product": { "name": "ansible-tower-server-0:3.3.3-1.el7at.x86_64", "product_id": "ansible-tower-server-0:3.3.3-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-server@3.3.3-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "product": { "name": "ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "product_id": "ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-setup@3.3.3-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-0:3.3.3-1.el7at.x86_64", "product": { "name": "ansible-tower-0:3.3.3-1.el7at.x86_64", "product_id": "ansible-tower-0:3.3.3-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower@3.3.3-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "google-config-0:2.0.0-2.el7cf.x86_64", "product": { "name": "google-config-0:2.0.0-2.el7cf.x86_64", "product_id": "google-config-0:2.0.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/google-config@2.0.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "product": { "name": "rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "product_id": "rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-sqlite3-debuginfo@1.3.13-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "product": { "name": "rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "product_id": "rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-sqlite3@1.3.13-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "product": { "name": "rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "product_id": "rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-postgresql95-repmgr-debuginfo@4.0.6-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "product": { "name": "rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "product_id": "rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-postgresql95-repmgr@4.0.6-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "dbus-api-service-0:1.0.1-5.el7cf.x86_64", "product": { "name": "dbus-api-service-0:1.0.1-5.el7cf.x86_64", "product_id": "dbus-api-service-0:1.0.1-5.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-5.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "product": { "name": "cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "product_id": "cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.10.0.33-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "product": { "name": "cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "product_id": "cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-common@5.10.0.33-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "product": { "name": "cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "product_id": "cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.10.0.33-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "product": { "name": "cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "product_id": "cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-tools@5.10.0.33-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "product": { "name": "cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "product_id": "cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset-debuginfo@5.10.0.33-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "product": { "name": "cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "product_id": "cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.10.0.33-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "product": { "name": "cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "product_id": "cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.10.0.33-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-0:5.10.0.33-1.el7cf.x86_64", "product": { "name": "cfme-0:5.10.0.33-1.el7cf.x86_64", "product_id": "cfme-0:5.10.0.33-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.10.0.33-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "product": { "name": "cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "product_id": "cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-debuginfo@5.10.0.33-1.el7cf?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bubblewrap-0:0.1.7-1.el7.src", "product": { "name": "bubblewrap-0:0.1.7-1.el7.src", "product_id": "bubblewrap-0:0.1.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bubblewrap@0.1.7-1.el7?arch=src" } } }, { "category": "product_version", "name": "dumb-init-0:1.2.0-1.el7cf.src", "product": { "name": "dumb-init-0:1.2.0-1.el7cf.src", "product_id": "dumb-init-0:1.2.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dumb-init@1.2.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "httpd-configmap-generator-0:0.2.2-2.el7cf.src", "product": { "name": "httpd-configmap-generator-0:0.2.2-2.el7cf.src", "product_id": "httpd-configmap-generator-0:0.2.2-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.2-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "nginx-1:1.10.2-1.el7at.src", "product": { "name": "nginx-1:1.10.2-1.el7at.src", "product_id": "nginx-1:1.10.2-1.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nginx@1.10.2-1.el7at?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "prince-0:9.0r2-10.el7cf.src", "product": { "name": "prince-0:9.0r2-10.el7cf.src", "product_id": "prince-0:9.0r2-10.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/prince@9.0r2-10.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-crypto-0:2.6.1-16.el7at.src", "product": { "name": "python-crypto-0:2.6.1-16.el7at.src", "product_id": "python-crypto-0:2.6.1-16.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-crypto@2.6.1-16.el7at?arch=src" } } }, { "category": "product_version", "name": "python-meld3-0:0.6.10-1.el7.src", "product": { "name": "python-meld3-0:0.6.10-1.el7.src", "product_id": "python-meld3-0:0.6.10-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-meld3@0.6.10-1.el7?arch=src" } } }, { "category": "product_version", "name": "qpid-proton-0:0.19.0-1.el7cf.src", "product": { "name": "qpid-proton-0:0.19.0-1.el7cf.src", "product_id": "qpid-proton-0:0.19.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton@0.19.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-bcrypt-0:3.1.12-1.el7cf.src", "product": { "name": "rubygem-bcrypt-0:3.1.12-1.el7cf.src", "product_id": "rubygem-bcrypt-0:3.1.12-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-bcrypt@3.1.12-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-hamlit-0:2.8.8-1.el7cf.src", "product": { "name": "rubygem-hamlit-0:2.8.8-1.el7cf.src", "product_id": "rubygem-hamlit-0:2.8.8-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-hamlit@2.8.8-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "product": { "name": "rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "product_id": "rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-http_parser.rb@0.6.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-json-0:2.1.0-1.el7cf.src", "product": { "name": "rubygem-json-0:2.1.0-1.el7cf.src", "product_id": "rubygem-json-0:2.1.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-json@2.1.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "product": { "name": "rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "product_id": "rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-linux_block_device@0.2.1-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "product": { "name": "rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "product_id": "rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-memory_buffer@0.1.0-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-nio4r-0:2.3.1-1.el7cf.src", "product": { "name": "rubygem-nio4r-0:2.3.1-1.el7cf.src", "product_id": "rubygem-nio4r-0:2.3.1-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nio4r@2.3.1-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-nokogiri-0:1.8.2-1.el7cf.src", "product": { "name": "rubygem-nokogiri-0:1.8.2-1.el7cf.src", "product_id": "rubygem-nokogiri-0:1.8.2-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nokogiri@1.8.2-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "product": { "name": "rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "product_id": "rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ovirt-engine-sdk4@4.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-pg-0:0.18.4-2.el7cf.src", "product": { "name": "rubygem-pg-0:0.18.4-2.el7cf.src", "product_id": "rubygem-pg-0:0.18.4-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-pg@0.18.4-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-puma-0:3.7.1-1.el7cf.src", "product": { "name": "rubygem-puma-0:3.7.1-1.el7cf.src", "product_id": "rubygem-puma-0:3.7.1-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-puma@3.7.1-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product": { "name": "rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product_id": "rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-qpid_proton@0.22.0-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "product": { "name": "rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "product_id": "rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-redhat_access_lib@1.1.4-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "product": { "name": "rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "product_id": "rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-unf_ext@0.0.7.5-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "product": { "name": "rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "product_id": "rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-websocket-driver@0.6.5-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "smem-0:1.4-1.el7cf.src", "product": { "name": "smem-0:1.4-1.el7cf.src", "product_id": "smem-0:1.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/smem@1.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "supervisor-0:3.1.4-1.el7.src", "product": { "name": "supervisor-0:3.1.4-1.el7.src", "product_id": "supervisor-0:3.1.4-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/supervisor@3.1.4-1.el7?arch=src" } } }, { "category": "product_version", "name": "wmi-0:1.3.14-7.el7cf.src", "product": { "name": "wmi-0:1.3.14-7.el7cf.src", "product_id": "wmi-0:1.3.14-7.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wmi@1.3.14-7.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-ffi-0:1.9.25-1.el7cf.src", "product": { "name": "rubygem-ffi-0:1.9.25-1.el7cf.src", "product_id": "rubygem-ffi-0:1.9.25-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ffi@1.9.25-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "product": { "name": "rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "product_id": "rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-redhat_access_cfme@2.0.3-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-daemon-0:2.1.2-7.el7at.src", "product": { "name": "python-daemon-0:2.1.2-7.el7at.src", "product_id": "python-daemon-0:2.1.2-7.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-daemon@2.1.2-7.el7at?arch=src" } } }, { "category": "product_version", "name": "python-lockfile-1:0.11.0-10.el7at.src", "product": { "name": "python-lockfile-1:0.11.0-10.el7at.src", "product_id": "python-lockfile-1:0.11.0-10.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-lockfile@0.11.0-10.el7at?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-pexpect-0:4.6-1.el7at.src", "product": { "name": "python-pexpect-0:4.6-1.el7at.src", "product_id": "python-pexpect-0:4.6-1.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pexpect@4.6-1.el7at?arch=src" } } }, { "category": "product_version", "name": "python-psutil-0:5.4.3-2.el7at.src", "product": { "name": "python-psutil-0:5.4.3-2.el7at.src", "product_id": "python-psutil-0:5.4.3-2.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-psutil@5.4.3-2.el7at?arch=src" } } }, { "category": "product_version", "name": "python-ptyprocess-0:0.5.2-3.el7at.src", "product": { "name": "python-ptyprocess-0:0.5.2-3.el7at.src", "product_id": "python-ptyprocess-0:0.5.2-3.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ptyprocess@0.5.2-3.el7at?arch=src" } } }, { "category": "product_version", "name": "rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "product": { "name": "rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "product_id": "rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-postgresql95-postgresql-pglogical@2.1.0-4.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-rugged-0:0.27.4-1.el7cf.src", "product": { "name": "rubygem-rugged-0:0.27.4-1.el7cf.src", "product_id": "rubygem-rugged-0:0.27.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rugged@0.27.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "product": { "name": "ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "product_id": "ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-roles@1.1.5-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "product": { "name": "ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "product_id": "ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-cluster-upgrade@1.1.8-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "product": { "name": "ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "product_id": "ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-disaster-recovery@1.1.2-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "product": { "name": "ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "product_id": "ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-image-template@1.1.8-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "product": { "name": "ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "product_id": "ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-infra@1.1.8-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "product": { "name": "ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "product_id": "ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-manageiq@1.1.12-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "product": { "name": "ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "product_id": "ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-v2v-conversion-host@1.6.3-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "product": { "name": "ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "product_id": "ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-vm-infra@1.1.10-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "product": { "name": "ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "product_id": "ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-engine-setup@1.1.5-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "product": { "name": "ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "product_id": "ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-repositories@1.1.2-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "product": { "name": "ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "product_id": "ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-shutdown-env@1.0.0-1.el7ev?arch=src" } } }, { "category": "product_version", "name": "python-colorama-0:0.3.7-2.el7ost.src", "product": { "name": "python-colorama-0:0.3.7-2.el7ost.src", "product_id": "python-colorama-0:0.3.7-2.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-colorama@0.3.7-2.el7ost?arch=src" } } }, { "category": "product_version", "name": "python-mock-0:2.0.0-1.el7ost.src", "product": { "name": "python-mock-0:2.0.0-1.el7ost.src", "product_id": "python-mock-0:2.0.0-1.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-mock@2.0.0-1.el7ost?arch=src" } } }, { "category": "product_version", "name": "python-funcsigs-0:1.0.2-1.el7ost.src", "product": { "name": "python-funcsigs-0:1.0.2-1.el7ost.src", "product_id": "python-funcsigs-0:1.0.2-1.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-funcsigs@1.0.2-1.el7ost?arch=src" } } }, { "category": "product_version", "name": "python-pbr-0:3.1.1-2.el7ost.src", "product": { "name": "python-pbr-0:3.1.1-2.el7ost.src", "product_id": "python-pbr-0:3.1.1-2.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pbr@3.1.1-2.el7ost?arch=src" } } }, { "category": "product_version", "name": "python-requests-0:2.14.2-1.el7ost.src", "product": { "name": "python-requests-0:2.14.2-1.el7ost.src", "product_id": "python-requests-0:2.14.2-1.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-requests@2.14.2-1.el7ost?arch=src" } } }, { "category": "product_version", "name": "python-urllib3-0:1.21.1-1.2.el7ost.src", "product": { "name": "python-urllib3-0:1.21.1-1.2.el7ost.src", "product_id": "python-urllib3-0:1.21.1-1.2.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-urllib3@1.21.1-1.2.el7ost?arch=src" } } }, { "category": "product_version", "name": "pyOpenSSL-0:17.3.0-4.el7ost.src", "product": { "name": "pyOpenSSL-0:17.3.0-4.el7ost.src", "product_id": "pyOpenSSL-0:17.3.0-4.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pyOpenSSL@17.3.0-4.el7ost?arch=src" } } }, { "category": "product_version", "name": "python-pysocks-0:1.5.6-3.el7ost.src", "product": { "name": "python-pysocks-0:1.5.6-3.el7ost.src", "product_id": "python-pysocks-0:1.5.6-3.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pysocks@1.5.6-3.el7ost?arch=src" } } }, { "category": "product_version", "name": "python-future-0:0.16.0-1.el7cf.src", "product": { "name": "python-future-0:0.16.0-1.el7cf.src", "product_id": "python-future-0:0.16.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-future@0.16.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-tabulate-0:0.8.2-1.el7cf.src", "product": { "name": "python-tabulate-0:0.8.2-1.el7cf.src", "product_id": "python-tabulate-0:0.8.2-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tabulate@0.8.2-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-requests-toolbelt-0:0.8.0-2.el7cf.src", "product": { "name": "python-requests-toolbelt-0:0.8.0-2.el7cf.src", "product_id": "python-requests-toolbelt-0:0.8.0-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-requests-toolbelt@0.8.0-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-pylxca-0:2.1.1-2.el7cf.src", "product": { "name": "python-pylxca-0:2.1.1-2.el7cf.src", "product_id": "python-pylxca-0:2.1.1-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pylxca@2.1.1-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-bambou-0:3.0.1-2.el7cf.src", "product": { "name": "python-bambou-0:3.0.1-2.el7cf.src", "product_id": "python-bambou-0:3.0.1-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-bambou@3.0.1-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-vspk-0:5.3.2-2.el7cf.src", "product": { "name": "python-vspk-0:5.3.2-2.el7cf.src", "product_id": "python-vspk-0:5.3.2-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-vspk@5.3.2-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "ansible-runner-0:1.1.2-2.el7ar.src", "product": { "name": "ansible-runner-0:1.1.2-2.el7ar.src", "product_id": "ansible-runner-0:1.1.2-2.el7ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@1.1.2-2.el7ar?arch=src" } } }, { "category": "product_version", "name": "postgresql96-0:9.6.10-1PGDG.el7at.src", "product": { "name": "postgresql96-0:9.6.10-1PGDG.el7at.src", "product_id": "postgresql96-0:9.6.10-1PGDG.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96@9.6.10-1PGDG.el7at?arch=src" } } }, { "category": "product_version", "name": "erlang-0:19.3.6.7-1.el7at.src", "product": { "name": "erlang-0:19.3.6.7-1.el7at.src", "product_id": "erlang-0:19.3.6.7-1.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang@19.3.6.7-1.el7at?arch=src" } } }, { "category": "product_version", "name": "rabbitmq-server-0:3.7.4-1.el7at.src", "product": { "name": "rabbitmq-server-0:3.7.4-1.el7at.src", "product_id": "rabbitmq-server-0:3.7.4-1.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rabbitmq-server@3.7.4-1.el7at?arch=src" } } }, { "category": "product_version", "name": "wxGTK3-0:3.0.3-5.el7at.src", "product": { "name": "wxGTK3-0:3.0.3-5.el7at.src", "product_id": "wxGTK3-0:3.0.3-5.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wxGTK3@3.0.3-5.el7at?arch=src" } } }, { "category": "product_version", "name": "ruby-0:2.4.5-90.el7cf.src", "product": { "name": "ruby-0:2.4.5-90.el7cf.src", "product_id": "ruby-0:2.4.5-90.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby@2.4.5-90.el7cf?arch=src" } } }, { "category": "product_version", "name": "ansible-tower-0:3.3.3-1.el7at.src", "product": { "name": "ansible-tower-0:3.3.3-1.el7at.src", "product_id": "ansible-tower-0:3.3.3-1.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower@3.3.3-1.el7at?arch=src" } } }, { "category": "product_version", "name": "google-compute-engine-0:2.0.0-2.el7cf.src", "product": { "name": "google-compute-engine-0:2.0.0-2.el7cf.src", "product_id": "google-compute-engine-0:2.0.0-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/google-compute-engine@2.0.0-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "google-config-0:2.0.0-2.el7cf.src", "product": { "name": "google-config-0:2.0.0-2.el7cf.src", "product_id": "google-config-0:2.0.0-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/google-config@2.0.0-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-sqlite3-0:1.3.13-2.el7cf.src", "product": { "name": "rubygem-sqlite3-0:1.3.13-2.el7cf.src", "product_id": "rubygem-sqlite3-0:1.3.13-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-sqlite3@1.3.13-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "product": { "name": "rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "product_id": "rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-postgresql95-repmgr@4.0.6-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "dbus-api-service-0:1.0.1-5.el7cf.src", "product": { "name": "dbus-api-service-0:1.0.1-5.el7cf.src", "product_id": "dbus-api-service-0:1.0.1-5.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-5.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.10.0.33-1.el7cf.src", "product": { "name": "cfme-appliance-0:5.10.0.33-1.el7cf.src", "product_id": "cfme-appliance-0:5.10.0.33-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.10.0.33-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.10.0.33-1.el7cf.src", "product": { "name": "cfme-gemset-0:5.10.0.33-1.el7cf.src", "product_id": "cfme-gemset-0:5.10.0.33-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.10.0.33-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "product": { "name": "cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "product_id": "cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.10.0.33-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-0:5.10.0.33-1.el7cf.src", "product": { "name": "cfme-0:5.10.0.33-1.el7cf.src", "product_id": "cfme-0:5.10.0.33-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.10.0.33-1.el7cf?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nginx-all-modules-1:1.10.2-1.el7at.noarch", "product": { "name": "nginx-all-modules-1:1.10.2-1.el7at.noarch", "product_id": "nginx-all-modules-1:1.10.2-1.el7at.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nginx-all-modules@1.10.2-1.el7at?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nginx-filesystem-1:1.10.2-1.el7at.noarch", "product": { "name": "nginx-filesystem-1:1.10.2-1.el7at.noarch", "product_id": "nginx-filesystem-1:1.10.2-1.el7at.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nginx-filesystem@1.10.2-1.el7at?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "product": { "name": "qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "product_id": "qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-cpp-docs@0.19.0-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "product": { "name": "qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "product_id": "qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-c-docs@0.19.0-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "product": { "name": "python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "product_id": "python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-qpid-proton-docs@0.19.0-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "product": { "name": "rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "product_id": "rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-bcrypt-doc@3.1.12-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "product": { "name": "rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "product_id": "rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-hamlit-doc@2.8.8-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "product": { "name": "rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "product_id": "rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-http_parser.rb-doc@0.6.0-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "product": { "name": "rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "product_id": "rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-linux_block_device-doc@0.2.1-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "product": { "name": "rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "product_id": "rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-memory_buffer-doc@0.1.0-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "product": { "name": "rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "product_id": "rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-nio4r-doc@2.3.1-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "product": { "name": "rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "product_id": "rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ovirt-engine-sdk4-doc@4.2.4-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "product": { "name": "rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "product_id": "rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-pg-doc@0.18.4-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "product": { "name": "rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "product_id": "rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-puma-doc@3.7.1-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product": { "name": "rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product_id": "rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-qpid_proton-doc@0.22.0-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "product": { "name": "rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "product_id": "rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-redhat_access_lib@1.1.4-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "product": { "name": "rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "product_id": "rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-unf_ext-doc@0.0.7.5-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "product": { "name": "rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "product_id": "rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-websocket-driver-doc@0.6.5-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "smem-0:1.4-1.el7cf.noarch", "product": { "name": "smem-0:1.4-1.el7cf.noarch", "product_id": "smem-0:1.4-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/smem@1.4-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "supervisor-0:3.1.4-1.el7.noarch", "product": { "name": "supervisor-0:3.1.4-1.el7.noarch", "product_id": "supervisor-0:3.1.4-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/supervisor@3.1.4-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "product": { "name": "rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "product_id": "rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ffi-doc@1.9.25-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "product": { "name": "rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "product_id": "rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-redhat_access_cfme@2.0.3-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "product": { "name": "rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "product_id": "rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-redhat_access_cfme-doc@2.0.3-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "python2-daemon-0:2.1.2-7.el7at.noarch", "product": { "name": "python2-daemon-0:2.1.2-7.el7at.noarch", "product_id": "python2-daemon-0:2.1.2-7.el7at.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-daemon@2.1.2-7.el7at?arch=noarch" } } }, { "category": "product_version", "name": "python2-lockfile-1:0.11.0-10.el7at.noarch", "product": { "name": "python2-lockfile-1:0.11.0-10.el7at.noarch", "product_id": "python2-lockfile-1:0.11.0-10.el7at.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-lockfile@0.11.0-10.el7at?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python2-pexpect-0:4.6-1.el7at.noarch", "product": { "name": "python2-pexpect-0:4.6-1.el7at.noarch", "product_id": "python2-pexpect-0:4.6-1.el7at.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-pexpect@4.6-1.el7at?arch=noarch" } } }, { "category": "product_version", "name": "python2-ptyprocess-0:0.5.2-3.el7at.noarch", "product": { "name": "python2-ptyprocess-0:0.5.2-3.el7at.noarch", "product_id": "python2-ptyprocess-0:0.5.2-3.el7at.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-ptyprocess@0.5.2-3.el7at?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "product": { "name": "rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "product_id": "rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rugged-doc@0.27.4-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "product": { "name": "ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "product_id": "ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-roles@1.1.5-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "product": { "name": "ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "product_id": "ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-cluster-upgrade@1.1.8-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "product": { "name": "ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "product_id": "ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-disaster-recovery@1.1.2-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "product": { "name": "ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "product_id": "ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-image-template@1.1.8-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "product": { "name": "ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "product_id": "ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-infra@1.1.8-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "product": { "name": "ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "product_id": "ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-manageiq@1.1.12-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "product": { "name": "ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "product_id": "ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-v2v-conversion-host@1.6.3-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "product": { "name": "ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "product_id": "ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-vm-infra@1.1.10-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "product": { "name": "ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "product_id": "ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-engine-setup@1.1.5-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "product": { "name": "ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "product_id": "ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-repositories@1.1.2-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "product": { "name": "ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "product_id": "ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-ansible-shutdown-env@1.0.0-1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "python-colorama-0:0.3.7-2.el7ost.noarch", "product": { "name": "python-colorama-0:0.3.7-2.el7ost.noarch", "product_id": "python-colorama-0:0.3.7-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-colorama@0.3.7-2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-mock-0:2.0.0-1.el7ost.noarch", "product": { "name": "python-mock-0:2.0.0-1.el7ost.noarch", "product_id": "python-mock-0:2.0.0-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-mock@2.0.0-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "product": { "name": "python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "product_id": "python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-funcsigs-doc@1.0.2-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-funcsigs-0:1.0.2-1.el7ost.noarch", "product": { "name": "python-funcsigs-0:1.0.2-1.el7ost.noarch", "product_id": "python-funcsigs-0:1.0.2-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-funcsigs@1.0.2-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python2-pbr-0:3.1.1-2.el7ost.noarch", "product": { "name": "python2-pbr-0:3.1.1-2.el7ost.noarch", "product_id": "python2-pbr-0:3.1.1-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-pbr@3.1.1-2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python2-requests-0:2.14.2-1.el7ost.noarch", "product": { "name": "python2-requests-0:2.14.2-1.el7ost.noarch", "product_id": "python2-requests-0:2.14.2-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-requests@2.14.2-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "product": { "name": "python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "product_id": "python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-urllib3@1.21.1-1.2.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "product": { "name": "python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "product_id": "python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-pyOpenSSL@17.3.0-4.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "product": { "name": "pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "product_id": "pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pyOpenSSL-doc@17.3.0-4.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-pysocks-0:1.5.6-3.el7ost.noarch", "product": { "name": "python-pysocks-0:1.5.6-3.el7ost.noarch", "product_id": "python-pysocks-0:1.5.6-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pysocks@1.5.6-3.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python2-future-0:0.16.0-1.el7cf.noarch", "product": { "name": "python2-future-0:0.16.0-1.el7cf.noarch", "product_id": "python2-future-0:0.16.0-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-future@0.16.0-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "python2-tabulate-0:0.8.2-1.el7cf.noarch", "product": { "name": "python2-tabulate-0:0.8.2-1.el7cf.noarch", "product_id": "python2-tabulate-0:0.8.2-1.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-tabulate@0.8.2-1.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "product": { "name": "python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "product_id": "python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-requests-toolbelt@0.8.0-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "python2-pylxca-0:2.1.1-2.el7cf.noarch", "product": { "name": "python2-pylxca-0:2.1.1-2.el7cf.noarch", "product_id": "python2-pylxca-0:2.1.1-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-pylxca@2.1.1-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "python2-bambou-0:3.0.1-2.el7cf.noarch", "product": { "name": "python2-bambou-0:3.0.1-2.el7cf.noarch", "product_id": "python2-bambou-0:3.0.1-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-bambou@3.0.1-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "python2-vspk-0:5.3.2-2.el7cf.noarch", "product": { "name": "python2-vspk-0:5.3.2-2.el7cf.noarch", "product_id": "python2-vspk-0:5.3.2-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-vspk@5.3.2-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "ansible-runner-0:1.1.2-2.el7ar.noarch", "product": { "name": "ansible-runner-0:1.1.2-2.el7ar.noarch", "product_id": "ansible-runner-0:1.1.2-2.el7ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@1.1.2-2.el7ar?arch=noarch" } } }, { "category": "product_version", "name": "erlang-doc-0:19.3.6.7-1.el7at.noarch", "product": { "name": "erlang-doc-0:19.3.6.7-1.el7at.noarch", "product_id": "erlang-doc-0:19.3.6.7-1.el7at.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/erlang-doc@19.3.6.7-1.el7at?arch=noarch" } } }, { "category": "product_version", "name": "rabbitmq-server-0:3.7.4-1.el7at.noarch", "product": { "name": "rabbitmq-server-0:3.7.4-1.el7at.noarch", "product_id": "rabbitmq-server-0:3.7.4-1.el7at.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rabbitmq-server@3.7.4-1.el7at?arch=noarch" } } }, { "category": "product_version", "name": "wxGTK3-docs-0:3.0.3-5.el7at.noarch", "product": { "name": "wxGTK3-docs-0:3.0.3-5.el7at.noarch", "product_id": "wxGTK3-docs-0:3.0.3-5.el7at.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/wxGTK3-docs@3.0.3-5.el7at?arch=noarch" } } }, { "category": "product_version", "name": "wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch", "product": { "name": "wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch", "product_id": "wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/wxGTK3-xmldocs@3.0.3-5.el7at?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-rake-0:12.0.0-90.el7cf.noarch", "product": { "name": "rubygem-rake-0:12.0.0-90.el7cf.noarch", "product_id": "rubygem-rake-0:12.0.0-90.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rake@12.0.0-90.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "ruby-irb-0:2.4.5-90.el7cf.noarch", "product": { "name": "ruby-irb-0:2.4.5-90.el7cf.noarch", "product_id": "ruby-irb-0:2.4.5-90.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-irb@2.4.5-90.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-minitest-0:5.10.1-90.el7cf.noarch", "product": { "name": "rubygem-minitest-0:5.10.1-90.el7cf.noarch", "product_id": "rubygem-minitest-0:5.10.1-90.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-minitest@5.10.1-90.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "ruby-doc-0:2.4.5-90.el7cf.noarch", "product": { "name": "ruby-doc-0:2.4.5-90.el7cf.noarch", "product_id": "ruby-doc-0:2.4.5-90.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ruby-doc@2.4.5-90.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygems-0:2.6.14.3-90.el7cf.noarch", "product": { "name": "rubygems-0:2.6.14.3-90.el7cf.noarch", "product_id": "rubygems-0:2.6.14.3-90.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygems@2.6.14.3-90.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "product": { "name": "rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "product_id": "rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-test-unit@3.2.3-90.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "product": { "name": "rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "product_id": "rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-xmlrpc@0.2.1-90.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "product": { "name": "rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "product_id": "rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rdoc@5.0.0-90.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "product": { "name": "rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "product_id": "rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygems-devel@2.6.14.3-90.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "product": { "name": "rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "product_id": "rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-power_assert@0.4.1-90.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "google-compute-engine-0:2.0.0-2.el7cf.noarch", "product": { "name": "google-compute-engine-0:2.0.0-2.el7cf.noarch", "product_id": "google-compute-engine-0:2.0.0-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/google-compute-engine@2.0.0-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "product": { "name": "rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "product_id": "rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-sqlite3-doc@1.3.13-2.el7cf?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:1.1.2-2.el7ar.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch" }, "product_reference": "ansible-runner-0:1.1.2-2.el7ar.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:1.1.2-2.el7ar.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src" }, "product_reference": "ansible-runner-0:1.1.2-2.el7ar.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-0:3.3.3-1.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src" }, "product_reference": "ansible-tower-0:3.3.3-1.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-0:3.3.3-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64" }, "product_reference": "ansible-tower-0:3.3.3-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-server-0:3.3.3-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64" }, "product_reference": "ansible-tower-server-0:3.3.3-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-setup-0:3.3.3-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64" }, "product_reference": "ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-ui-0:3.3.3-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64" }, "product_reference": "ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64" }, "product_reference": "ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64" }, "product_reference": "ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "bubblewrap-0:0.1.7-1.el7.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src" }, "product_reference": "bubblewrap-0:0.1.7-1.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "bubblewrap-0:0.1.7-1.el7.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64" }, "product_reference": "bubblewrap-0:0.1.7-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64" }, "product_reference": "bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.10.0.33-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src" }, "product_reference": "cfme-0:5.10.0.33-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.10.0.33-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64" }, "product_reference": "cfme-0:5.10.0.33-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src" }, "product_reference": "cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64" }, "product_reference": "cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.10.0.33-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src" }, "product_reference": "cfme-appliance-0:5.10.0.33-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.10.0.33-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64" }, "product_reference": "cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.10.0.33-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src" }, "product_reference": "cfme-gemset-0:5.10.0.33-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.10.0.33-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "dbus-api-service-0:1.0.1-5.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src" }, "product_reference": "dbus-api-service-0:1.0.1-5.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "dbus-api-service-0:1.0.1-5.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64" }, "product_reference": "dbus-api-service-0:1.0.1-5.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "dumb-init-0:1.2.0-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src" }, "product_reference": "dumb-init-0:1.2.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "dumb-init-0:1.2.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64" }, "product_reference": "dumb-init-0:1.2.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64" }, "product_reference": "dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-0:19.3.6.7-1.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src" }, "product_reference": "erlang-0:19.3.6.7-1.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-asn1-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-common_test-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-compiler-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-cosTime-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-crypto-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-debugger-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-diameter-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-doc-0:19.3.6.7-1.el7at.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch" }, "product_reference": "erlang-doc-0:19.3.6.7-1.el7at.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-edoc-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-eldap-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-erts-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-erts-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-et-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-et-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-eunit-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-gs-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-gs-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-hipe-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-ic-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-ic-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-inets-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-inets-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-jinterface-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-kernel-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-megaco-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-mnesia-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-observer-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-observer-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-odbc-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-orber-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-orber-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-os_mon-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-parsetools-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-percept-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-percept-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-public_key-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-reltool-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-sasl-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-snmp-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-ssh-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-ssl-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-stdlib-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-tools-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-tools-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-typer-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-typer-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-wx-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-wx-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "erlang-xmerl-0:19.3.6.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64" }, "product_reference": "erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "google-compute-engine-0:2.0.0-2.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch" }, "product_reference": "google-compute-engine-0:2.0.0-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "google-compute-engine-0:2.0.0-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src" }, "product_reference": "google-compute-engine-0:2.0.0-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "google-config-0:2.0.0-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src" }, "product_reference": "google-config-0:2.0.0-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "google-config-0:2.0.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64" }, "product_reference": "google-config-0:2.0.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-configmap-generator-0:0.2.2-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src" }, "product_reference": "httpd-configmap-generator-0:0.2.2-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64" }, "product_reference": "httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1:1.10.2-1.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src" }, "product_reference": "nginx-1:1.10.2-1.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1:1.10.2-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64" }, "product_reference": "nginx-1:1.10.2-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-all-modules-1:1.10.2-1.el7at.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch" }, "product_reference": "nginx-all-modules-1:1.10.2-1.el7at.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-debuginfo-1:1.10.2-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64" }, "product_reference": "nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-filesystem-1:1.10.2-1.el7at.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch" }, "product_reference": "nginx-filesystem-1:1.10.2-1.el7at.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64" }, "product_reference": "nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64" }, "product_reference": "nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64" }, "product_reference": "nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64" }, "product_reference": "nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-mod-mail-1:1.10.2-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64" }, "product_reference": "nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-mod-stream-1:1.10.2-1.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64" }, "product_reference": "nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch" }, "product_reference": "ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src" }, "product_reference": "ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch" }, "product_reference": "ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src" }, "product_reference": "ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch" }, "product_reference": "ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src" }, "product_reference": "ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch" }, "product_reference": "ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-image-template-0:1.1.8-1.el7ev.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src" }, "product_reference": "ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch" }, "product_reference": "ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-infra-0:1.1.8-1.el7ev.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src" }, "product_reference": "ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch" }, "product_reference": "ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src" }, "product_reference": "ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch" }, "product_reference": "ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-repositories-0:1.1.2-1.el7ev.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src" }, "product_reference": "ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch" }, "product_reference": "ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-roles-0:1.1.5-1.el7ev.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src" }, "product_reference": "ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch" }, "product_reference": "ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src" }, "product_reference": "ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch" }, "product_reference": "ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src" }, "product_reference": "ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch" }, "product_reference": "ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src" }, "product_reference": "ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-0:9.6.10-1PGDG.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src" }, "product_reference": "postgresql96-0:9.6.10-1PGDG.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-0:9.6.10-1PGDG.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64" }, "product_reference": "postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64" }, "product_reference": "postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64" }, "product_reference": "postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64" }, "product_reference": "postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64" }, "product_reference": "postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64" }, "product_reference": "postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64" }, "product_reference": "postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64" }, "product_reference": "postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64" }, "product_reference": "postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64" }, "product_reference": "postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64" }, "product_reference": "postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "prince-0:9.0r2-10.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src" }, "product_reference": "prince-0:9.0r2-10.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "prince-0:9.0r2-10.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64" }, "product_reference": "prince-0:9.0r2-10.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "pyOpenSSL-0:17.3.0-4.el7ost.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src" }, "product_reference": "pyOpenSSL-0:17.3.0-4.el7ost.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch" }, "product_reference": "pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-bambou-0:3.0.1-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src" }, "product_reference": "python-bambou-0:3.0.1-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-colorama-0:0.3.7-2.el7ost.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch" }, "product_reference": "python-colorama-0:0.3.7-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-colorama-0:0.3.7-2.el7ost.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src" }, "product_reference": "python-colorama-0:0.3.7-2.el7ost.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-crypto-0:2.6.1-16.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src" }, "product_reference": "python-crypto-0:2.6.1-16.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64" }, "product_reference": "python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-daemon-0:2.1.2-7.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src" }, "product_reference": "python-daemon-0:2.1.2-7.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-funcsigs-0:1.0.2-1.el7ost.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch" }, "product_reference": "python-funcsigs-0:1.0.2-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-funcsigs-0:1.0.2-1.el7ost.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src" }, "product_reference": "python-funcsigs-0:1.0.2-1.el7ost.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-funcsigs-doc-0:1.0.2-1.el7ost.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch" }, "product_reference": "python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-future-0:0.16.0-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src" }, "product_reference": "python-future-0:0.16.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-lockfile-1:0.11.0-10.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src" }, "product_reference": "python-lockfile-1:0.11.0-10.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-meld3-0:0.6.10-1.el7.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src" }, "product_reference": "python-meld3-0:0.6.10-1.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-meld3-0:0.6.10-1.el7.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64" }, "product_reference": "python-meld3-0:0.6.10-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-meld3-debuginfo-0:0.6.10-1.el7.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64" }, "product_reference": "python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-mock-0:2.0.0-1.el7ost.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch" }, "product_reference": "python-mock-0:2.0.0-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-mock-0:2.0.0-1.el7ost.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src" }, "product_reference": "python-mock-0:2.0.0-1.el7ost.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-pbr-0:3.1.1-2.el7ost.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src" }, "product_reference": "python-pbr-0:3.1.1-2.el7ost.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-pexpect-0:4.6-1.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src" }, "product_reference": "python-pexpect-0:4.6-1.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-psutil-0:5.4.3-2.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src" }, "product_reference": "python-psutil-0:5.4.3-2.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64" }, "product_reference": "python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-ptyprocess-0:0.5.2-3.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src" }, "product_reference": "python-ptyprocess-0:0.5.2-3.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-pylxca-0:2.1.1-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src" }, "product_reference": "python-pylxca-0:2.1.1-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-pysocks-0:1.5.6-3.el7ost.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch" }, "product_reference": "python-pysocks-0:1.5.6-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-pysocks-0:1.5.6-3.el7ost.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src" }, "product_reference": "python-pysocks-0:1.5.6-3.el7ost.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-proton-0:0.19.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64" }, "product_reference": "python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch" }, "product_reference": "python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-requests-0:2.14.2-1.el7ost.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src" }, "product_reference": "python-requests-0:2.14.2-1.el7ost.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-requests-toolbelt-0:0.8.0-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src" }, "product_reference": "python-requests-toolbelt-0:0.8.0-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-tabulate-0:0.8.2-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src" }, "product_reference": "python-tabulate-0:0.8.2-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-urllib3-0:1.21.1-1.2.el7ost.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src" }, "product_reference": "python-urllib3-0:1.21.1-1.2.el7ost.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python-vspk-0:5.3.2-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src" }, "product_reference": "python-vspk-0:5.3.2-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-bambou-0:3.0.1-2.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch" }, "product_reference": "python2-bambou-0:3.0.1-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-crypto-0:2.6.1-16.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64" }, "product_reference": "python2-crypto-0:2.6.1-16.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-daemon-0:2.1.2-7.el7at.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch" }, "product_reference": "python2-daemon-0:2.1.2-7.el7at.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-future-0:0.16.0-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch" }, "product_reference": "python2-future-0:0.16.0-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-lockfile-1:0.11.0-10.el7at.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch" }, "product_reference": "python2-lockfile-1:0.11.0-10.el7at.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-pbr-0:3.1.1-2.el7ost.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch" }, "product_reference": "python2-pbr-0:3.1.1-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-pexpect-0:4.6-1.el7at.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch" }, "product_reference": "python2-pexpect-0:4.6-1.el7at.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-psutil-0:5.4.3-2.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64" }, "product_reference": "python2-psutil-0:5.4.3-2.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-ptyprocess-0:0.5.2-3.el7at.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch" }, "product_reference": "python2-ptyprocess-0:0.5.2-3.el7at.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch" }, "product_reference": "python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-pylxca-0:2.1.1-2.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch" }, "product_reference": "python2-pylxca-0:2.1.1-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-requests-0:2.14.2-1.el7ost.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch" }, "product_reference": "python2-requests-0:2.14.2-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch" }, "product_reference": "python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-tabulate-0:0.8.2-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch" }, "product_reference": "python2-tabulate-0:0.8.2-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-urllib3-0:1.21.1-1.2.el7ost.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch" }, "product_reference": "python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "python2-vspk-0:5.3.2-2.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch" }, "product_reference": "python2-vspk-0:5.3.2-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-0:0.19.0-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src" }, "product_reference": "qpid-proton-0:0.19.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-c-0:0.19.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64" }, "product_reference": "qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64" }, "product_reference": "qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch" }, "product_reference": "qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64" }, "product_reference": "qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64" }, "product_reference": "qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch" }, "product_reference": "qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64" }, "product_reference": "qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rabbitmq-server-0:3.7.4-1.el7at.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch" }, "product_reference": "rabbitmq-server-0:3.7.4-1.el7at.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rabbitmq-server-0:3.7.4-1.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src" }, "product_reference": "rabbitmq-server-0:3.7.4-1.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src" }, "product_reference": "rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64" }, "product_reference": "rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64" }, "product_reference": "rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src" }, "product_reference": "rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64" }, "product_reference": "rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64" }, "product_reference": "rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-0:2.4.5-90.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src" }, "product_reference": "ruby-0:2.4.5-90.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-0:2.4.5-90.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64" }, "product_reference": "ruby-0:2.4.5-90.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-debuginfo-0:2.4.5-90.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64" }, "product_reference": "ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-devel-0:2.4.5-90.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64" }, "product_reference": "ruby-devel-0:2.4.5-90.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-doc-0:2.4.5-90.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch" }, "product_reference": "ruby-doc-0:2.4.5-90.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-irb-0:2.4.5-90.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch" }, "product_reference": "ruby-irb-0:2.4.5-90.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "ruby-libs-0:2.4.5-90.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64" }, "product_reference": "ruby-libs-0:2.4.5-90.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-bcrypt-0:3.1.12-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src" }, "product_reference": "rubygem-bcrypt-0:3.1.12-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64" }, "product_reference": "rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64" }, "product_reference": "rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch" }, "product_reference": "rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64" }, "product_reference": "rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64" }, "product_reference": "rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ffi-0:1.9.25-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src" }, "product_reference": "rubygem-ffi-0:1.9.25-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ffi-0:1.9.25-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64" }, "product_reference": "rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64" }, "product_reference": "rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch" }, "product_reference": "rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-hamlit-0:2.8.8-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src" }, "product_reference": "rubygem-hamlit-0:2.8.8-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-hamlit-0:2.8.8-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64" }, "product_reference": "rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64" }, "product_reference": "rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch" }, "product_reference": "rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-http_parser.rb-0:0.6.0-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src" }, "product_reference": "rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64" }, "product_reference": "rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64" }, "product_reference": "rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch" }, "product_reference": "rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-io-console-0:0.4.6-90.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64" }, "product_reference": "rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src" }, "product_reference": "rubygem-json-0:2.1.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rubygem-json-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-linux_block_device-0:0.2.1-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src" }, "product_reference": "rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64" }, "product_reference": "rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64" }, "product_reference": "rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch" }, "product_reference": "rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-memory_buffer-0:0.1.0-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src" }, "product_reference": "rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64" }, "product_reference": "rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64" }, "product_reference": "rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch" }, "product_reference": "rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-minitest-0:5.10.1-90.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch" }, "product_reference": "rubygem-minitest-0:5.10.1-90.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64" }, "product_reference": "rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nio4r-0:2.3.1-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src" }, "product_reference": "rubygem-nio4r-0:2.3.1-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nio4r-0:2.3.1-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64" }, "product_reference": "rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64" }, "product_reference": "rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch" }, "product_reference": "rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nokogiri-0:1.8.2-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src" }, "product_reference": "rubygem-nokogiri-0:1.8.2-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64" }, "product_reference": "rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64" }, "product_reference": "rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64" }, "product_reference": "rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openssl-0:2.0.9-90.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64" }, "product_reference": "rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src" }, "product_reference": "rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64" }, "product_reference": "rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64" }, "product_reference": "rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch" }, "product_reference": "rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-pg-0:0.18.4-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src" }, "product_reference": "rubygem-pg-0:0.18.4-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-pg-0:0.18.4-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64" }, "product_reference": "rubygem-pg-0:0.18.4-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64" }, "product_reference": "rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-pg-doc-0:0.18.4-2.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch" }, "product_reference": "rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-power_assert-0:0.4.1-90.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch" }, "product_reference": "rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-psych-0:2.2.2-90.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64" }, "product_reference": "rubygem-psych-0:2.2.2-90.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-puma-0:3.7.1-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src" }, "product_reference": "rubygem-puma-0:3.7.1-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-puma-0:3.7.1-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64" }, "product_reference": "rubygem-puma-0:3.7.1-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64" }, "product_reference": "rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-puma-doc-0:3.7.1-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch" }, "product_reference": "rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-qpid_proton-0:0.22.0-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src" }, "product_reference": "rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64" }, "product_reference": "rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64" }, "product_reference": "rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" }, "product_reference": "rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rake-0:12.0.0-90.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch" }, "product_reference": "rubygem-rake-0:12.0.0-90.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rdoc-0:5.0.0-90.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch" }, "product_reference": "rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch" }, "product_reference": "rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src" }, "product_reference": "rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch" }, "product_reference": "rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch" }, "product_reference": "rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src" }, "product_reference": "rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rugged-0:0.27.4-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src" }, "product_reference": "rubygem-rugged-0:0.27.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rugged-0:0.27.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64" }, "product_reference": "rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64" }, "product_reference": "rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch" }, "product_reference": "rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-sqlite3-0:1.3.13-2.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src" }, "product_reference": "rubygem-sqlite3-0:1.3.13-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64" }, "product_reference": "rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64" }, "product_reference": "rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch" }, "product_reference": "rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-test-unit-0:3.2.3-90.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch" }, "product_reference": "rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-unf_ext-0:0.0.7.5-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src" }, "product_reference": "rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64" }, "product_reference": "rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64" }, "product_reference": "rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch" }, "product_reference": "rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-websocket-driver-0:0.6.5-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src" }, "product_reference": "rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64" }, "product_reference": "rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64" }, "product_reference": "rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch" }, "product_reference": "rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch" }, "product_reference": "rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygems-0:2.6.14.3-90.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch" }, "product_reference": "rubygems-0:2.6.14.3-90.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "rubygems-devel-0:2.6.14.3-90.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch" }, "product_reference": "rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "smem-0:1.4-1.el7cf.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch" }, "product_reference": "smem-0:1.4-1.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "smem-0:1.4-1.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src" }, "product_reference": "smem-0:1.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "supervisor-0:3.1.4-1.el7.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch" }, "product_reference": "supervisor-0:3.1.4-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "supervisor-0:3.1.4-1.el7.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src" }, "product_reference": "supervisor-0:3.1.4-1.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wmi-0:1.3.14-7.el7cf.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src" }, "product_reference": "wmi-0:1.3.14-7.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wmi-0:1.3.14-7.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64" }, "product_reference": "wmi-0:1.3.14-7.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wmi-debuginfo-0:1.3.14-7.el7cf.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64" }, "product_reference": "wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wxBase3-0:3.0.3-5.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64" }, "product_reference": "wxBase3-0:3.0.3-5.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wxGTK3-0:3.0.3-5.el7at.src as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src" }, "product_reference": "wxGTK3-0:3.0.3-5.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wxGTK3-0:3.0.3-5.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64" }, "product_reference": "wxGTK3-0:3.0.3-5.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64" }, "product_reference": "wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wxGTK3-devel-0:3.0.3-5.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64" }, "product_reference": "wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wxGTK3-docs-0:3.0.3-5.el7at.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch" }, "product_reference": "wxGTK3-docs-0:3.0.3-5.el7at.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wxGTK3-gl-0:3.0.3-5.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64" }, "product_reference": "wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wxGTK3-media-0:3.0.3-5.el7at.x86_64 as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64" }, "product_reference": "wxGTK3-media-0:3.0.3-5.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.10" }, { "category": "default_component_of", "full_product_name": { "name": "wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch as a component of CloudForms Management Engine 5.10", "product_id": "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" }, "product_reference": "wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-6685", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1178970" } ], "notes": [ { "category": "description", "text": "Nokogiri before 1.5.4 is vulnerable to XXE attacks", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-nokogiri: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ruby193-rubygem-nokogiri as shipped with Red Hat Satellite 6 and Red Hat OpenStack 6. Red Hat Product Security has rated this issue as having moderate security impact. A future update may address this issue.\n\nRed Hat Product Security has rated this issue as having no security impact for rubygem-nokogiri as shipped with: Red Hat Enterprise MRG 2.5, Red Hat Subscription Asset Manager 1.3, Red Hat CloudForms Management Engine 5.3.0, Red Hat OpenShift Enterprise 2.2.0; for ruby193-rubygem-nokogiri as shipped with Red Hat Satellite 6, Red Hat Subscription Asset Manager 1.3, Red Hat CloudForms Management Engine 5.3.0, Red Hat OpenStack 4.0, Red Hat OpenStack Foreman, Red Hat OpenStack 6, Red Hat OpenShift Enterprise 2.2.0; and for mingw-rubygem-nokogiri as shipped with Red Hat CloudForms Management Engine 5.3.0. This issue is not currently planned to be addressed in future updates.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6685" }, { "category": "external", "summary": "RHBZ#1178970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6685", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6685" } ], "release_date": "2012-06-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-02-07T23:01:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nIf the postgresql service is running, it will be automatically restarted after installing this update. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0212" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-nokogiri: XML eXternal Entity (XXE) flaw" }, { "cve": "CVE-2018-3741", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568842" } ], "notes": [ { "category": "description", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rails-html-sanitizer: non-whitelisted attributes are present in sanitized output when input with specially-crafted HTML fragments leading to XSS vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of rubygem-rails-html-sanitizer as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having a security impact of Moderate. This vulnerability won\u0027t be fixed on CloudForms 4, because it uses libxml 2.9.1 and since the vulnerability requires a libxml \u003e= 2.9.2 in order to be exploitable. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "RHBZ#1568842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3741", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3741" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3741", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3741" } ], "release_date": "2018-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-02-07T23:01:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nIf the postgresql service is running, it will be automatically restarted after installing this update. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0212" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-rails-html-sanitizer: non-whitelisted attributes are present in sanitized output when input with specially-crafted HTML fragments leading to XSS vulnerability" }, { "cve": "CVE-2018-8048", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1559071" } ], "notes": [ { "category": "description", "text": "In the Loofah gem through 2.2.0 for Ruby, non-whitelisted HTML attributes may occur in sanitized output by republishing a crafted HTML fragment.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-loofah: XSS vulnerability due to unescaped comments within attributes by libxml2", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of rubygem-loofah as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having a security impact of Moderate. This vulnerability won\u0027t be fixed on CloudForms 4, because it uses libxml 2.9.1 and since the vulnerability requires a libxml \u003e= 2.9.2 in order to be exploitable. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8048" }, { "category": "external", "summary": "RHBZ#1559071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8048", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8048" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8048", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8048" } ], "release_date": "2018-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-02-07T23:01:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nIf the postgresql service is running, it will be automatically restarted after installing this update. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0212" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-loofah: XSS vulnerability due to unescaped comments within attributes by libxml2" }, { "cve": "CVE-2018-11627", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585218" } ], "notes": [ { "category": "description", "text": "Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-sinatra: XSS in the 400 Bad Request page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11627" }, { "category": "external", "summary": "RHBZ#1585218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585218" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11627", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11627" } ], "release_date": "2018-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-02-07T23:01:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nIf the postgresql service is running, it will be automatically restarted after installing this update. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0212" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.noarch", "7Server-RH7-CFME-5.10:ansible-runner-0:1.1.2-2.el7ar.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.src", "7Server-RH7-CFME-5.10:ansible-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-server-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-setup-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-ui-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-ansible-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ansible-tower-venv-tower-0:3.3.3-1.el7at.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.src", "7Server-RH7-CFME-5.10:bubblewrap-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:bubblewrap-debuginfo-0:0.1.7-1.el7.x86_64", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-amazon-smartstate-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-appliance-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-common-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-appliance-tools-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.src", "7Server-RH7-CFME-5.10:cfme-gemset-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:cfme-gemset-debuginfo-0:5.10.0.33-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.src", "7Server-RH7-CFME-5.10:dbus-api-service-0:1.0.1-5.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.src", "7Server-RH7-CFME-5.10:dumb-init-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:dumb-init-debuginfo-0:1.2.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.src", "7Server-RH7-CFME-5.10:erlang-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-asn1-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-common_test-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-compiler-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEvent-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosEventDomain-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosFileTransfer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosNotification-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosProperty-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTime-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-cosTransactions-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-crypto-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debugger-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-debuginfo-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-dialyzer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-diameter-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-doc-0:19.3.6.7-1.el7at.noarch", "7Server-RH7-CFME-5.10:erlang-edoc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eldap-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_docgen-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erl_interface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-erts-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-et-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-eunit-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-gs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-hipe-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ic-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-inets-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-jinterface-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-kernel-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-megaco-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-mnesia-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-observer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-odbc-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-orber-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-os_mon-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-otp_mibs-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-parsetools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-percept-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-public_key-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-reltool-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-runtime_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-sasl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-snmp-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssh-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-ssl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-stdlib-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-syntax_tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-tools-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-typer-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-wx-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:erlang-xmerl-0:19.3.6.7-1.el7at.x86_64", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:google-compute-engine-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.src", "7Server-RH7-CFME-5.10:google-config-0:2.0.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.src", "7Server-RH7-CFME-5.10:httpd-configmap-generator-0:0.2.2-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.src", "7Server-RH7-CFME-5.10:nginx-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-all-modules-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-debuginfo-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-filesystem-1:1.10.2-1.el7at.noarch", "7Server-RH7-CFME-5.10:nginx-mod-http-geoip-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-image-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-perl-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-http-xslt-filter-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-mail-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:nginx-mod-stream-1:1.10.2-1.el7at.x86_64", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-cluster-upgrade-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-disaster-recovery-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-engine-setup-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-image-template-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-infra-0:1.1.8-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-manageiq-0:1.1.12-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-repositories-0:1.1.2-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-roles-0:1.1.5-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-shutdown-env-0:1.0.0-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-v2v-conversion-host-0:1.6.3-1.el7ev.src", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.noarch", "7Server-RH7-CFME-5.10:ovirt-ansible-vm-infra-0:1.1.10-1.el7ev.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.src", "7Server-RH7-CFME-5.10:postgresql96-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-contrib-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-debuginfo-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-devel-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-docs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-libs-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plperl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-plpython-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-pltcl-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-server-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:postgresql96-test-0:9.6.10-1PGDG.el7at.x86_64", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.src", "7Server-RH7-CFME-5.10:prince-0:9.0r2-10.el7cf.x86_64", "7Server-RH7-CFME-5.10:pyOpenSSL-0:17.3.0-4.el7ost.src", "7Server-RH7-CFME-5.10:pyOpenSSL-doc-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python-bambou-0:3.0.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python-colorama-0:0.3.7-2.el7ost.src", "7Server-RH7-CFME-5.10:python-crypto-0:2.6.1-16.el7at.src", "7Server-RH7-CFME-5.10:python-crypto-debuginfo-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python-daemon-0:2.1.2-7.el7at.src", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-funcsigs-0:1.0.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-funcsigs-doc-0:1.0.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-future-0:0.16.0-1.el7cf.src", "7Server-RH7-CFME-5.10:python-lockfile-1:0.11.0-10.el7at.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.src", "7Server-RH7-CFME-5.10:python-meld3-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-meld3-debuginfo-0:0.6.10-1.el7.x86_64", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python-mock-0:2.0.0-1.el7ost.src", "7Server-RH7-CFME-5.10:python-pbr-0:3.1.1-2.el7ost.src", "7Server-RH7-CFME-5.10:python-pexpect-0:4.6-1.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-0:5.4.3-2.el7at.src", "7Server-RH7-CFME-5.10:python-psutil-debuginfo-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python-ptyprocess-0:0.5.2-3.el7at.src", "7Server-RH7-CFME-5.10:python-pylxca-0:2.1.1-2.el7cf.src", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.noarch", "7Server-RH7-CFME-5.10:python-pysocks-0:1.5.6-3.el7ost.src", "7Server-RH7-CFME-5.10:python-qpid-proton-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:python-qpid-proton-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python-requests-0:2.14.2-1.el7ost.src", "7Server-RH7-CFME-5.10:python-requests-toolbelt-0:0.8.0-2.el7cf.src", "7Server-RH7-CFME-5.10:python-tabulate-0:0.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:python-urllib3-0:1.21.1-1.2.el7ost.src", "7Server-RH7-CFME-5.10:python-vspk-0:5.3.2-2.el7cf.src", "7Server-RH7-CFME-5.10:python2-bambou-0:3.0.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-crypto-0:2.6.1-16.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-daemon-0:2.1.2-7.el7at.noarch", "7Server-RH7-CFME-5.10:python2-future-0:0.16.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-lockfile-1:0.11.0-10.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pbr-0:3.1.1-2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pexpect-0:4.6-1.el7at.noarch", "7Server-RH7-CFME-5.10:python2-psutil-0:5.4.3-2.el7at.x86_64", "7Server-RH7-CFME-5.10:python2-ptyprocess-0:0.5.2-3.el7at.noarch", "7Server-RH7-CFME-5.10:python2-pyOpenSSL-0:17.3.0-4.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-pylxca-0:2.1.1-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-requests-0:2.14.2-1.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-requests-toolbelt-0:0.8.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-tabulate-0:0.8.2-1.el7cf.noarch", "7Server-RH7-CFME-5.10:python2-urllib3-0:1.21.1-1.2.el7ost.noarch", "7Server-RH7-CFME-5.10:python2-vspk-0:5.3.2-2.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-0:0.19.0-1.el7cf.src", "7Server-RH7-CFME-5.10:qpid-proton-c-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-c-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-cpp-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-devel-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:qpid-proton-cpp-docs-0:0.19.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:qpid-proton-debuginfo-0:0.19.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.noarch", "7Server-RH7-CFME-5.10:rabbitmq-server-0:3.7.4-1.el7at.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-postgresql-pglogical-debuginfo-0:2.1.0-4.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.src", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rh-postgresql95-repmgr-debuginfo-0:4.0.6-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.src", "7Server-RH7-CFME-5.10:ruby-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-debuginfo-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-devel-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:ruby-doc-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-irb-0:2.4.5-90.el7cf.noarch", "7Server-RH7-CFME-5.10:ruby-libs-0:2.4.5-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-bcrypt-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-debuginfo-0:3.1.12-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-bcrypt-doc-0:3.1.12-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-bigdecimal-0:1.3.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-did_you_mean-0:1.1.0-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ffi-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-debuginfo-0:1.9.25-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ffi-doc-0:1.9.25-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-hamlit-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-debuginfo-0:2.8.8-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-hamlit-doc-0:2.8.8-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-debuginfo-0:0.6.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-http_parser.rb-doc-0:0.6.0-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-io-console-0:0.4.6-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-debuginfo-0:0.2.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-linux_block_device-doc-0:0.2.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-debuginfo-0:0.1.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-memory_buffer-doc-0:0.1.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-minitest-0:5.10.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-net-telnet-0:0.1.1-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nio4r-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-debuginfo-0:2.3.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nio4r-doc-0:2.3.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-nokogiri-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-debuginfo-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-nokogiri-doc-0:1.8.2-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-openssl-0:2.0.9-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-debuginfo-0:4.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-ovirt-engine-sdk4-doc-0:4.2.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-pg-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-debuginfo-0:0.18.4-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-pg-doc-0:0.18.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-power_assert-0:0.4.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-psych-0:2.2.2-90.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-puma-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-debuginfo-0:3.7.1-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-puma-doc-0:3.7.1-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rake-0:12.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-rdoc-0:5.0.0-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-0:2.0.3-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-redhat_access_cfme-doc-0:2.0.3-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-redhat_access_lib-0:1.1.4-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-rugged-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-debuginfo-0:0.27.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-rugged-doc-0:0.27.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-sqlite3-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-debuginfo-0:1.3.13-2.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-sqlite3-doc-0:1.3.13-2.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-test-unit-0:3.2.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-unf_ext-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-debuginfo-0:0.0.7.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-unf_ext-doc-0:0.0.7.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.src", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-debuginfo-0:0.6.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.10:rubygem-websocket-driver-doc-0:0.6.5-1.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygem-xmlrpc-0:0.2.1-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:rubygems-devel-0:2.6.14.3-90.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.noarch", "7Server-RH7-CFME-5.10:smem-0:1.4-1.el7cf.src", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.noarch", "7Server-RH7-CFME-5.10:supervisor-0:3.1.4-1.el7.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.src", "7Server-RH7-CFME-5.10:wmi-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wmi-debuginfo-0:1.3.14-7.el7cf.x86_64", "7Server-RH7-CFME-5.10:wxBase3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.src", "7Server-RH7-CFME-5.10:wxGTK3-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-debuginfo-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-devel-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-docs-0:3.0.3-5.el7at.noarch", "7Server-RH7-CFME-5.10:wxGTK3-gl-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-media-0:3.0.3-5.el7at.x86_64", "7Server-RH7-CFME-5.10:wxGTK3-xmldocs-0:3.0.3-5.el7at.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-sinatra: XSS in the 400 Bad Request page" } ] }
ghsa-px3r-jm9g-c8w8
Vulnerability from github
Published
2018-04-26 15:41
Modified
2023-03-01 18:54
Severity ?
VLAI Severity ?
Summary
rails-html-sanitizer Cross-site Scripting vulnerability
Details
There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.
{ "affected": [ { "package": { "ecosystem": "RubyGems", "name": "rails-html-sanitizer" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.0.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2018-3741" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:50:14Z", "nvd_published_at": "2018-03-30T19:29:00Z", "severity": "MODERATE" }, "details": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "id": "GHSA-px3r-jm9g-c8w8", "modified": "2023-03-01T18:54:07Z", "published": "2018-04-26T15:41:10Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3741" }, { "type": "WEB", "url": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae" }, { "type": "PACKAGE", "url": "https://github.com/rails/rails-html-sanitizer" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ], "summary": "rails-html-sanitizer Cross-site Scripting vulnerability" }
gsd-2018-3741
Vulnerability from gsd
Modified
2018-03-22 00:00
Details
There is a possible XSS vulnerability in rails-html-sanitizer. The gem allows
non-whitelisted attributes to be present in sanitized output when input with
specially-crafted HTML fragments, and these attributes can lead to an XSS attack
on target applications.
This issue is similar to CVE-2018-8048 in Loofah.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-3741", "description": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "id": "GSD-2018-3741", "references": [ "https://www.suse.com/security/cve/CVE-2018-3741.html", "https://access.redhat.com/errata/RHSA-2019:0212" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "affected": [ { "package": { "ecosystem": "RubyGems", "name": "rails-html-sanitizer", "purl": "pkg:gem/rails-html-sanitizer" } } ], "aliases": [ "CVE-2018-3741", "GHSA-px3r-jm9g-c8w8" ], "details": "There is a possible XSS vulnerability in rails-html-sanitizer. The gem allows\nnon-whitelisted attributes to be present in sanitized output when input with\nspecially-crafted HTML fragments, and these attributes can lead to an XSS attack\non target applications.\n\nThis issue is similar to CVE-2018-8048 in Loofah.\n", "id": "GSD-2018-3741", "modified": "2018-03-22T00:00:00.000Z", "published": "2018-03-22T00:00:00.000Z", "references": [ { "type": "WEB", "url": "https://groups.google.com/d/msg/rubyonrails-security/tP7W3kLc5u4/uDy2Br7xBgAJ" }, { "type": "WEB", "url": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae" } ], "related": [ "CVE-2018-8048" ], "schema_version": "1.4.0", "severity": [ { "score": 6.1, "type": "CVSS_V3" } ], "summary": "XSS vulnerability in rails-html-sanitizer" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2018-3741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "rails-html-sanitizer", "version": { "version_data": [ { "version_value": "\u003c= 1.0.3" } ] } } ] }, "vendor_name": "Rails" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) (CWE-79)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae", "refsource": "CONFIRM", "url": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae" } ] } }, "github.com/rubysec/ruby-advisory-db": { "cve": "2018-3741", "cvss_v3": 6.1, "date": "2018-03-22", "description": "There is a possible XSS vulnerability in rails-html-sanitizer. The gem allows\nnon-whitelisted attributes to be present in sanitized output when input with\nspecially-crafted HTML fragments, and these attributes can lead to an XSS attack\non target applications.\n\nThis issue is similar to CVE-2018-8048 in Loofah.\n", "gem": "rails-html-sanitizer", "ghsa": "px3r-jm9g-c8w8", "patched_versions": [ "\u003e= 1.0.4" ], "related": { "cve": [ "2018-8048" ], "url": [ "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae" ] }, "title": "XSS vulnerability in rails-html-sanitizer", "url": "https://groups.google.com/d/msg/rubyonrails-security/tP7W3kLc5u4/uDy2Br7xBgAJ" }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c1.0.4", "affected_versions": "All versions before 1.0.4", "credit": "Rafael Mendon\u00e7a Fran\u00e7a (rafaelfranca)", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "cwe_ids": [ "CWE-1035", "CWE-79", "CWE-937" ], "date": "2019-10-09", "description": "The gem allows attributes that are not specified in the allowlist to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah.", "fixed_versions": [ "1.0.4" ], "identifier": "CVE-2018-3741", "identifiers": [ "CVE-2018-3741" ], "package_slug": "gem/rails-html-sanitizer", "pubdate": "2018-03-30", "solution": "Upgrade to 1.0.4 or above", "title": "XSS vulnerability", "urls": [ "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae", "https://groups.google.com/d/msg/rubyonrails-security/tP7W3kLc5u4/uDy2Br7xBgAJ" ], "uuid": "b18e7b29-2091-41eb-ab6f-4706604b12f9" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*", "cpe_name": [], "versionEndIncluding": "1.0.3", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve-assignments@hackerone.com", "ID": "CVE-2018-3741" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } }, "lastModifiedDate": "2023-01-30T16:10Z", "publishedDate": "2018-03-30T19:29Z" } } }
fkie_cve-2018-3741
Vulnerability from fkie_nvd
Published
2018-03-30 19:29
Modified
2024-11-21 04:05
Severity ?
Summary
There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rubyonrails | html_sanitizer | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "E221C207-396B-4686-AB55-18000F88663E", "versionEndIncluding": "1.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately." }, { "lang": "es", "value": "Es posible que haya una vulnerabilidad Cross-Site Scripting (XSS) en todas las versiones inferiores a la 1.0.4 de la gema rails-html-sanitizer para Ruby. La gema permite que los atributos que no est\u00e1n en una lista blanca est\u00e9n presentes en las salidas saneadas cuando la entrada incluye fragmentos HTML especialmente manipulados. Estos atributos pueden conducir a un ataque Cross-Site Scripting (XSS) en las aplicaciones objetivo. Este problema es similar a CVE-2018-8048 en Loofah. Todos los usuarios que ejecuten una distribuci\u00f3n afectada deben actualizarla o utilizar una de las alternativas inmediatamente." } ], "id": "CVE-2018-3741", "lastModified": "2024-11-21T04:05:59.343", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-30T19:29:00.333", "references": [ { "source": "support@hackerone.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2019:2182-1
Vulnerability from csaf_suse
Published
2019-08-19 14:59
Modified
2019-08-19 14:59
Summary
Security update for rubygem-rails-html-sanitizer
Notes
Title of the patch
Security update for rubygem-rails-html-sanitizer
Description of the patch
This update for rubygem-rails-html-sanitizer fixes the following issues:
- CVE-2018-3741: Fixed a XSS vulnerability due to insufficient filtering in scrub_attribute (bsc#1086598).
Patchnames
SUSE-2019-2182,SUSE-OpenStack-Cloud-7-2019-2182,SUSE-OpenStack-Cloud-Crowbar-8-2019-2182,SUSE-OpenStack-Cloud-Crowbar-9-2019-2182,SUSE-Storage-4-2019-2182
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rubygem-rails-html-sanitizer", "title": "Title of the patch" }, { "category": "description", "text": "This update for rubygem-rails-html-sanitizer fixes the following issues:\n\n- CVE-2018-3741: Fixed a XSS vulnerability due to insufficient filtering in scrub_attribute (bsc#1086598).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2182,SUSE-OpenStack-Cloud-7-2019-2182,SUSE-OpenStack-Cloud-Crowbar-8-2019-2182,SUSE-OpenStack-Cloud-Crowbar-9-2019-2182,SUSE-Storage-4-2019-2182", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2182-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2182-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192182-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2182-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005828.html" }, { "category": "self", "summary": "SUSE Bug 1086598", "url": "https://bugzilla.suse.com/1086598" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" } ], "title": "Security update for rubygem-rails-html-sanitizer", "tracking": { "current_release_date": "2019-08-19T14:59:13Z", "generator": { "date": "2019-08-19T14:59:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2182-1", "initial_release_date": "2019-08-19T14:59:13Z", "revision_history": [ { "date": "2019-08-19T14:59:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.aarch64", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.aarch64", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.aarch64" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.aarch64", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.aarch64", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.i586", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.i586", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.i586" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.i586", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.i586", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.i586" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.i586", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.i586", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.ppc64le", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.ppc64le", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.ppc64le" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.ppc64le", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.ppc64le", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.ppc64le" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.ppc64le", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.ppc64le", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.s390", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.s390", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.s390" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.s390", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.s390", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390x", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390x", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390x" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.s390x", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.s390x", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.s390x" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.s390x", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.s390x", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.x86_64", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.x86_64", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-doc-1.0.3-8.8.1.x86_64" } }, { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.x86_64", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.x86_64", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-testsuite-1.0.3-8.8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64" }, "product_reference": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390x" }, "product_reference": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64" }, "product_reference": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64" }, "product_reference": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64" }, "product_reference": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64" }, "product_reference": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64" }, "product_reference": "ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64", "SUSE Enterprise Storage 4:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64", "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390x", "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64", "SUSE Enterprise Storage 4:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64", "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390x", "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64", "SUSE Enterprise Storage 4:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.aarch64", "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.s390x", "SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-19T14:59:13Z", "details": "moderate" } ], "title": "CVE-2018-3741" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…