Action not permitted
Modal body text goes here.
CVE-2018-1080
Vulnerability from cvelistv5
Published
2018-07-02 18:00
Modified
2024-08-05 03:51
Severity ?
EPSS score ?
Summary
Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1979 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://pagure.io/freeipa/issue/7453 | Third Party Advisory | |
secalert@redhat.com | https://review.gerrithub.io/c/dogtagpki/pki/+/404435 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1979 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pagure.io/freeipa/issue/7453 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://review.gerrithub.io/c/dogtagpki/pki/+/404435 | Patch, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:51:48.562Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pagure.io/freeipa/issue/7453" }, { "name": "RHSA-2018:1979", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1979" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://review.gerrithub.io/c/dogtagpki/pki/+/404435" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pki-core", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "PKI 10.6.1" } ] } ], "datePublic": "2018-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-03T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pagure.io/freeipa/issue/7453" }, { "name": "RHSA-2018:1979", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1979" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://review.gerrithub.io/c/dogtagpki/pki/+/404435" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1080", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pki-core", "version": { "version_data": [ { "version_value": "PKI 10.6.1" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "https://pagure.io/freeipa/issue/7453", "refsource": "CONFIRM", "url": "https://pagure.io/freeipa/issue/7453" }, { "name": "RHSA-2018:1979", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1979" }, { "name": "https://review.gerrithub.io/c/dogtagpki/pki/+/404435", "refsource": "CONFIRM", "url": "https://review.gerrithub.io/c/dogtagpki/pki/+/404435" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-1080", "datePublished": "2018-07-02T18:00:00", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-08-05T03:51:48.562Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-1080\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-07-03T01:29:00.533\",\"lastModified\":\"2024-11-21T03:59:08.233\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences.\"},{\"lang\":\"es\",\"value\":\"Dogtag PKI, hasta la versi\u00f3n 10.6.1, tiene una vulnerabilidad en AAclAuthz.java que, bajo ciertas configuraciones, provoca que la aplicaci\u00f3n de listas de control de acceso permita que las reglas allow y deny se reviertan. Si un servidor est\u00e1 configurado para procesar las reglas allow antes que las deny (authz.evaluateOrder=allow,deny), las reglas allow denegar\u00e1n el acceso y las reglas deny lo permitir\u00e1n. Esto podr\u00eda desembocar en un escalado de privilegios o en otras consecuencias no planeadas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.6.1\",\"matchCriteriaId\":\"BF840646-E4B8-4837-92CD-9DA517B9AC02\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1979\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://pagure.io/freeipa/issue/7453\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://review.gerrithub.io/c/dogtagpki/pki/+/404435\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1979\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://pagure.io/freeipa/issue/7453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://review.gerrithub.io/c/dogtagpki/pki/+/404435\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2018_1979
Vulnerability from csaf_redhat
Published
2018-06-26 16:57
Modified
2024-11-22 11:50
Summary
Red Hat Security Advisory: pki-core security, bug fix, and enhancement update
Notes
Topic
An update for pki-core is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.
Security Fix(es):
* pki-core: Mishandled ACL configuration in AAclAuthz.java reverses rules that allow and deny access (CVE-2018-1080)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
This issue was discovered by Fraser Tweedale (Red Hat).
Bug Fix(es):
* Previously, when ECC keys were enrolled, Certificate Management over CMS (CMC) authentication failed with a "TokenException: Unable to insert certificate into temporary database" error. As a consequence, the enrollment failed. This update fixes the problem. As a result, the mentioned bug no longer occurs. (BZ#1550581)
* Previously, Certificate System used the same enrollment profiles for issuing RSA and ECC certificates. As a consequence, the key usage extension in issued certificates did not meet the Common Criteria standard. This update adds ECC-specific enrollment profiles where the key usage extension for TLS server and client certificates are different as described in RFC 6960. Additionally, the update changes existing profiles to issue only RSA certificates. As a result, the key usage extension in ECC certificates now meets the Common Criteria standard. (BZ#1554726)
* The Certificate System server rejects saving invalid access control lists (ACL). As a consequence, when saving an ACL with an empty expression, the server rejected the update and the pkiconsole utility displayed an StringIndexOutOfBoundsException error. With this update, the utility rejects empty ACL expressions. As a result, invalid ACLs cannot be saved and the error is no longer displayed. (BZ#1557883)
* Previously, due to a bug in the Certificate System installation procedure, installing a Key Recovery Authority (KRA) with ECC keys failed. To fix the problem, the installation process has been updated to handle both RSA and ECC subsystems automatically. As a result, installing subsystems with ECC keys no longer fail. (BZ#1581134)
* Previously, during verification, Certificate System encoded the ECC public key incorrectly in CMC Certificate Request Message Format (CRMF) requests. As a consequence, requesting an ECC certificate with Certificate Management over CMS (CMC) in CRMF failed. The problem has been fixed, and as a result, CMC CRMF requests using ECC keys work as expected. (BZ#1585945)
Enhancement(s):
* The pkispawn man page has been updated and now describes the --skip-configuration and --skip-installation parameters. (BZ#1551067)
* With this update, Certificate System adds the Subject Alternative Name (SAN) extension by default to server certificates and sets it to the Common Name (CN) of the certificate. (BZ#1581135)
* With this enhancement, users can create Certificate Request Message Format (CRMF) requests without the key archival option when using the CRMFPopClient utility. This feature increases flexibility because a Key Recovery Authority (KRA) certificate is no longer required. Previously, if the user did not pass the "-b transport_certificate_file" option to CRMFPopClient, the utility automatically used the KRA transport certificate stored in the transport.txt file. With this update, if "-b transport_certificate_file" is not specified, Certificate System creates a request without using key archival. (BZ#1588945)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for pki-core is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* pki-core: Mishandled ACL configuration in AAclAuthz.java reverses rules that allow and deny access (CVE-2018-1080)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis issue was discovered by Fraser Tweedale (Red Hat).\n\nBug Fix(es):\n\n* Previously, when ECC keys were enrolled, Certificate Management over CMS (CMC) authentication failed with a \"TokenException: Unable to insert certificate into temporary database\" error. As a consequence, the enrollment failed. This update fixes the problem. As a result, the mentioned bug no longer occurs. (BZ#1550581)\n\n* Previously, Certificate System used the same enrollment profiles for issuing RSA and ECC certificates. As a consequence, the key usage extension in issued certificates did not meet the Common Criteria standard. This update adds ECC-specific enrollment profiles where the key usage extension for TLS server and client certificates are different as described in RFC 6960. Additionally, the update changes existing profiles to issue only RSA certificates. As a result, the key usage extension in ECC certificates now meets the Common Criteria standard. (BZ#1554726)\n\n* The Certificate System server rejects saving invalid access control lists (ACL). As a consequence, when saving an ACL with an empty expression, the server rejected the update and the pkiconsole utility displayed an StringIndexOutOfBoundsException error. With this update, the utility rejects empty ACL expressions. As a result, invalid ACLs cannot be saved and the error is no longer displayed. (BZ#1557883)\n\n* Previously, due to a bug in the Certificate System installation procedure, installing a Key Recovery Authority (KRA) with ECC keys failed. To fix the problem, the installation process has been updated to handle both RSA and ECC subsystems automatically. As a result, installing subsystems with ECC keys no longer fail. (BZ#1581134)\n\n* Previously, during verification, Certificate System encoded the ECC public key incorrectly in CMC Certificate Request Message Format (CRMF) requests. As a consequence, requesting an ECC certificate with Certificate Management over CMS (CMC) in CRMF failed. The problem has been fixed, and as a result, CMC CRMF requests using ECC keys work as expected. (BZ#1585945)\n\nEnhancement(s):\n\n* The pkispawn man page has been updated and now describes the --skip-configuration and --skip-installation parameters. (BZ#1551067)\n\n* With this update, Certificate System adds the Subject Alternative Name (SAN) extension by default to server certificates and sets it to the Common Name (CN) of the certificate. (BZ#1581135)\n\n* With this enhancement, users can create Certificate Request Message Format (CRMF) requests without the key archival option when using the CRMFPopClient utility. This feature increases flexibility because a Key Recovery Authority (KRA) certificate is no longer required. Previously, if the user did not pass the \"-b transport_certificate_file\" option to CRMFPopClient, the utility automatically used the KRA transport certificate stored in the transport.txt file. With this update, if \"-b transport_certificate_file\" is not specified, Certificate System creates a request without using key archival. (BZ#1588945)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1979", "url": "https://access.redhat.com/errata/RHSA-2018:1979" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1550581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550581" }, { "category": "external", "summary": "1551067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551067" }, { "category": "external", "summary": "1552241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552241" }, { "category": "external", "summary": "1554726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554726" }, { "category": "external", "summary": "1554727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554727" }, { "category": "external", "summary": "1556657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1556657" }, { "category": "external", "summary": "1557880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557880" }, { "category": "external", "summary": "1557883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557883" }, { "category": "external", "summary": "1558919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558919" }, { "category": "external", "summary": "1571582", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571582" }, { "category": "external", "summary": "1572548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572548" }, { "category": "external", "summary": "1581134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581134" }, { "category": "external", "summary": "1581135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581135" }, { "category": "external", "summary": "1585945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585945" }, { "category": "external", "summary": "1587826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1587826" }, { "category": "external", "summary": "1588944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588944" }, { "category": "external", "summary": "1588945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588945" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1979.json" } ], "title": "Red Hat Security Advisory: pki-core security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T11:50:11+00:00", "generator": { "date": "2024-11-22T11:50:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1979", "initial_release_date": "2018-06-26T16:57:57+00:00", "revision_history": [ { "date": "2018-06-26T16:57:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-06-26T16:57:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:50:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "pki-kra-0:10.5.1-13.1.el7_5.noarch", "product": { "name": "pki-kra-0:10.5.1-13.1.el7_5.noarch", "product_id": "pki-kra-0:10.5.1-13.1.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-kra@10.5.1-13.1.el7_5?arch=noarch" } } }, { "category": "product_version", "name": "pki-server-0:10.5.1-13.1.el7_5.noarch", "product": { "name": "pki-server-0:10.5.1-13.1.el7_5.noarch", "product_id": "pki-server-0:10.5.1-13.1.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-server@10.5.1-13.1.el7_5?arch=noarch" } } }, { "category": "product_version", "name": "pki-base-java-0:10.5.1-13.1.el7_5.noarch", "product": { "name": "pki-base-java-0:10.5.1-13.1.el7_5.noarch", "product_id": "pki-base-java-0:10.5.1-13.1.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-base-java@10.5.1-13.1.el7_5?arch=noarch" } } }, { "category": "product_version", "name": "pki-ca-0:10.5.1-13.1.el7_5.noarch", "product": { "name": "pki-ca-0:10.5.1-13.1.el7_5.noarch", "product_id": "pki-ca-0:10.5.1-13.1.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-ca@10.5.1-13.1.el7_5?arch=noarch" } } }, { "category": "product_version", "name": "pki-base-0:10.5.1-13.1.el7_5.noarch", "product": { "name": "pki-base-0:10.5.1-13.1.el7_5.noarch", "product_id": "pki-base-0:10.5.1-13.1.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-base@10.5.1-13.1.el7_5?arch=noarch" } } }, { "category": "product_version", "name": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "product": { "name": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "product_id": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-javadoc@10.5.1-13.1.el7_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "product": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "product_id": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-symkey@10.5.1-13.1.el7_5?arch=x86_64" } } }, { "category": "product_version", "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "product": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "product_id": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-core-debuginfo@10.5.1-13.1.el7_5?arch=x86_64" } } }, { "category": "product_version", "name": "pki-tools-0:10.5.1-13.1.el7_5.x86_64", "product": { "name": "pki-tools-0:10.5.1-13.1.el7_5.x86_64", "product_id": "pki-tools-0:10.5.1-13.1.el7_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-tools@10.5.1-13.1.el7_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "pki-core-0:10.5.1-13.1.el7_5.src", "product": { "name": "pki-core-0:10.5.1-13.1.el7_5.src", "product_id": "pki-core-0:10.5.1-13.1.el7_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-core@10.5.1-13.1.el7_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "product": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "product_id": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-core-debuginfo@10.5.1-13.1.el7_5?arch=ppc64le" } } }, { "category": "product_version", "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "product": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "product_id": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-tools@10.5.1-13.1.el7_5?arch=ppc64le" } } }, { "category": "product_version", "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "product": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "product_id": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-symkey@10.5.1-13.1.el7_5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "pki-symkey-0:10.5.1-13.1.el7_5.s390x", "product": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.s390x", "product_id": "pki-symkey-0:10.5.1-13.1.el7_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-symkey@10.5.1-13.1.el7_5?arch=s390x" } } }, { "category": "product_version", "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "product": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "product_id": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-core-debuginfo@10.5.1-13.1.el7_5?arch=s390x" } } }, { "category": "product_version", "name": "pki-tools-0:10.5.1-13.1.el7_5.s390x", "product": { "name": "pki-tools-0:10.5.1-13.1.el7_5.s390x", "product_id": "pki-tools-0:10.5.1-13.1.el7_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-tools@10.5.1-13.1.el7_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "product": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "product_id": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-symkey@10.5.1-13.1.el7_5?arch=ppc64" } } }, { "category": "product_version", "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "product": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "product_id": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-core-debuginfo@10.5.1-13.1.el7_5?arch=ppc64" } } }, { "category": "product_version", "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64", "product": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64", "product_id": "pki-tools-0:10.5.1-13.1.el7_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-tools@10.5.1-13.1.el7_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "product": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "product_id": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-symkey@10.5.1-13.1.el7_5?arch=aarch64" } } }, { "category": "product_version", "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "product": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "product_id": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-core-debuginfo@10.5.1-13.1.el7_5?arch=aarch64" } } }, { "category": "product_version", "name": "pki-tools-0:10.5.1-13.1.el7_5.aarch64", "product": { "name": "pki-tools-0:10.5.1-13.1.el7_5.aarch64", "product_id": "pki-tools-0:10.5.1-13.1.el7_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pki-tools@10.5.1-13.1.el7_5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pki-base-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-java-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-java-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-ca-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-ca-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-0:10.5.1-13.1.el7_5.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src" }, "product_reference": "pki-core-0:10.5.1-13.1.el7_5.src", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-kra-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-kra-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-server-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-server-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-java-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-java-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-ca-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-ca-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-0:10.5.1-13.1.el7_5.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src" }, "product_reference": "pki-core-0:10.5.1-13.1.el7_5.src", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-kra-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-kra-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-server-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-server-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-java-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-java-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-ca-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-ca-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-0:10.5.1-13.1.el7_5.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src" }, "product_reference": "pki-core-0:10.5.1-13.1.el7_5.src", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-kra-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-kra-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-server-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-server-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-java-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-java-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-ca-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-ca-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-0:10.5.1-13.1.el7_5.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src" }, "product_reference": "pki-core-0:10.5.1-13.1.el7_5.src", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-kra-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-kra-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-server-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-server-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-java-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-java-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-ca-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-ca-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-0:10.5.1-13.1.el7_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src" }, "product_reference": "pki-core-0:10.5.1-13.1.el7_5.src", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-kra-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-kra-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-server-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-server-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-java-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-java-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-ca-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-ca-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-0:10.5.1-13.1.el7_5.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src" }, "product_reference": "pki-core-0:10.5.1-13.1.el7_5.src", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-kra-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-kra-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-server-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-server-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-java-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-java-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-ca-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-ca-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-0:10.5.1-13.1.el7_5.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src" }, "product_reference": "pki-core-0:10.5.1-13.1.el7_5.src", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-kra-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-kra-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-server-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-server-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-base-java-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-base-java-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-ca-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-ca-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-0:10.5.1-13.1.el7_5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src" }, "product_reference": "pki-core-0:10.5.1-13.1.el7_5.src", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-kra-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-kra-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-server-0:10.5.1-13.1.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch" }, "product_reference": "pki-server-0:10.5.1-13.1.el7_5.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.aarch64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pki-tools-0:10.5.1-13.1.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64" }, "product_reference": "pki-tools-0:10.5.1-13.1.el7_5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Fraser Tweedale" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1080", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2018-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1556657" } ], "notes": [ { "category": "description", "text": "Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences.", "title": "Vulnerability description" }, { "category": "summary", "text": "pki-core: Mishandled ACL configuration in AAclAuthz.java reverses rules that allow and deny access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of pkicore as shipped with Red Hat Certificate System 9. Red Hat Product Security has rated this issue as having security impact of Low. Please also note that all instances of \"authz.evaluateOrder\" are set to \"deny,allow\" by default. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Client-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7ComputeNode-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7ComputeNode-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-Alt-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-Alt-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-Alt-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-Alt-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1080" }, { "category": "external", "summary": "RHBZ#1556657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1556657" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1080", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1080" } ], "release_date": "2018-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-26T16:57:57+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Client-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7ComputeNode-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7ComputeNode-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-Alt-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-Alt-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-Alt-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-Alt-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1979" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Client-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Client-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Client-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Client-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7ComputeNode-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7ComputeNode-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7ComputeNode-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7ComputeNode-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7ComputeNode-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-Alt-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-Alt-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-Alt-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-Alt-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-Alt-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-Alt-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Server-optional-Alt-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Workstation-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Workstation-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Workstation-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-optional-7.5.Z:pki-base-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-base-java-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-ca-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-core-0:10.5.1-13.1.el7_5.src", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.s390x", "7Workstation-optional-7.5.Z:pki-core-debuginfo-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-optional-7.5.Z:pki-javadoc-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-kra-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-server-0:10.5.1-13.1.el7_5.noarch", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.s390x", "7Workstation-optional-7.5.Z:pki-symkey-0:10.5.1-13.1.el7_5.x86_64", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.aarch64", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.ppc64le", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.s390x", "7Workstation-optional-7.5.Z:pki-tools-0:10.5.1-13.1.el7_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pki-core: Mishandled ACL configuration in AAclAuthz.java reverses rules that allow and deny access" } ] }
gsd-2018-1080
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-1080", "description": "Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences.", "id": "GSD-2018-1080", "references": [ "https://access.redhat.com/errata/RHSA-2018:1979", "https://linux.oracle.com/cve/CVE-2018-1080.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-1080" ], "details": "Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences.", "id": "GSD-2018-1080", "modified": "2023-12-13T01:22:37.756291Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1080", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pki-core", "version": { "version_data": [ { "version_value": "PKI 10.6.1" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "https://pagure.io/freeipa/issue/7453", "refsource": "CONFIRM", "url": "https://pagure.io/freeipa/issue/7453" }, { "name": "RHSA-2018:1979", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1979" }, { "name": "https://review.gerrithub.io/c/dogtagpki/pki/+/404435", "refsource": "CONFIRM", "url": "https://review.gerrithub.io/c/dogtagpki/pki/+/404435" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.6.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1080" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://review.gerrithub.io/c/dogtagpki/pki/+/404435", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://review.gerrithub.io/c/dogtagpki/pki/+/404435" }, { "name": "https://pagure.io/freeipa/issue/7453", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://pagure.io/freeipa/issue/7453" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080" }, { "name": "RHSA-2018:1979", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1979" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-09T23:38Z", "publishedDate": "2018-07-03T01:29Z" } } }
ghsa-h277-5r6v-m3gv
Vulnerability from github
Published
2022-05-13 01:33
Modified
2022-05-13 01:33
Severity ?
Details
Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences.
{ "affected": [], "aliases": [ "CVE-2018-1080" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-07-03T01:29:00Z", "severity": "HIGH" }, "details": "Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences.", "id": "GHSA-h277-5r6v-m3gv", "modified": "2022-05-13T01:33:33Z", "published": "2022-05-13T01:33:33Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1080" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1979" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1080" }, { "type": "WEB", "url": "https://pagure.io/freeipa/issue/7453" }, { "type": "WEB", "url": "https://review.gerrithub.io/c/dogtagpki/pki/+/404435" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.