Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-1104 (GCVE-0-2018-1104)
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1328 | Vendor Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1972 | Vendor Advisory | |
secalert@redhat.com | https://access.redhat.com/security/cve/cve-2018-1104 | Vendor Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1565862 | Issue Tracking, Vendor Advisory | |
secalert@redhat.com | https://www.ansible.com/security | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1328 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1972 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/cve-2018-1104 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1565862 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ansible.com/security | Vendor Advisory |
Vendor | Product | Version | ||
---|---|---|---|---|
Red Hat, Inc. | Ansible Tower |
Version: through version 3.2.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:51:48.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ansible.com/security" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "name": "RHSA-2018:1972", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1972" }, { "name": "RHSA-2018:1328", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2018-1104" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ansible Tower", "vendor": "Red Hat, Inc.", "versions": [ { "status": "affected", "version": "through version 3.2.3" } ] } ], "datePublic": "2018-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-26T09:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ansible.com/security" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "name": "RHSA-2018:1972", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1972" }, { "name": "RHSA-2018:1328", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2018-1104" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2018-04-27T00:00:00", "ID": "CVE-2018-1104", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ansible Tower", "version": { "version_data": [ { "version_value": "through version 3.2.3" } ] } } ] }, "vendor_name": "Red Hat, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ansible.com/security", "refsource": "CONFIRM", "url": "https://www.ansible.com/security" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "name": "RHSA-2018:1972", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1972" }, { "name": "RHSA-2018:1328", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "name": "https://access.redhat.com/security/cve/cve-2018-1104", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2018-1104" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-1104", "datePublished": "2018-05-02T19:00:00Z", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-09-16T19:09:02.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-1104\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-05-02T19:29:00.607\",\"lastModified\":\"2024-11-21T03:59:11.410\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.\"},{\"lang\":\"es\",\"value\":\"Ansible Tower hasta la versi\u00f3n 3.2.3 tiene una vulnerabilidad que permite que usuarios que solo tienen acceso para definir variables para una plantilla de trabajo ejecuten c\u00f3digo arbitrario en el servidor Tower.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.3\",\"matchCriteriaId\":\"C796B714-EA6E-4DFC-9467-9DC40110E053\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E1BA91-4695-4E64-A9D7-4A6CB6904D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F7263F-113D-4BAE-B8CB-86A61531A2AC\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1328\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1972\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2018-1104\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1565862\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://www.ansible.com/security\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1972\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2018-1104\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1565862\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://www.ansible.com/security\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ghsa-4839-8mxx-4xr9
Vulnerability from github
Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.
{ "affected": [], "aliases": [ "CVE-2018-1104" ], "database_specific": { "cwe_ids": [ "CWE-94" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-05-02T19:29:00Z", "severity": "HIGH" }, "details": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.", "id": "GHSA-4839-8mxx-4xr9", "modified": "2022-05-13T01:33:32Z", "published": "2022-05-13T01:33:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1972" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/cve-2018-1104" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "type": "WEB", "url": "https://www.ansible.com/security" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
rhsa-2018:1972
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for CloudForms Management Engine 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104. The CVE-2018-1101 issue was discovered by Graham Mainwaring (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1972", "url": "https://access.redhat.com/errata/RHSA-2018:1972" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1489507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489507" }, { "category": "external", "summary": "1496902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496902" }, { "category": "external", "summary": "1500951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500951" }, { "category": "external", "summary": "1511030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511030" }, { "category": "external", "summary": "1526156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526156" }, { "category": "external", "summary": "1531499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531499" }, { "category": "external", "summary": "1532272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532272" }, { "category": "external", "summary": "1533082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533082" }, { "category": "external", "summary": "1535369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535369" }, { "category": "external", "summary": "1536684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536684" }, { "category": "external", "summary": "1537132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537132" }, { "category": "external", "summary": "1540579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540579" }, { "category": "external", "summary": "1541341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541341" }, { "category": "external", "summary": "1541427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541427" }, { "category": "external", "summary": "1541700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541700" }, { "category": "external", "summary": "1544488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544488" }, { "category": "external", "summary": "1549626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549626" }, { "category": "external", "summary": "1549723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549723" }, { "category": "external", "summary": "1549833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549833" }, { "category": "external", "summary": "1550116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550116" }, { "category": "external", "summary": "1550276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550276" }, { "category": "external", "summary": "1550715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550715" }, { "category": "external", "summary": "1550729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550729" }, { "category": "external", "summary": "1550732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550732" }, { "category": "external", "summary": "1550737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550737" }, { "category": "external", "summary": "1551627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551627" }, { "category": "external", "summary": "1551693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551693" }, { "category": "external", "summary": "1551697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551697" }, { "category": "external", "summary": "1551699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551699" }, { "category": "external", "summary": "1552135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552135" }, { "category": "external", "summary": "1552233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552233" }, { "category": "external", "summary": "1552780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552780" }, { "category": "external", "summary": "1552891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552891" }, { "category": "external", "summary": "1552905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552905" }, { "category": "external", "summary": "1553225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553225" }, { "category": "external", "summary": "1553249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553249" }, { "category": "external", "summary": "1553308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553308" }, { "category": "external", "summary": "1553331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553331" }, { "category": "external", "summary": "1553337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553337" }, { "category": "external", "summary": "1553364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553364" }, { "category": "external", "summary": "1553465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553465" }, { "category": "external", "summary": "1553473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553473" }, { "category": "external", "summary": "1554533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554533" }, { "category": "external", "summary": "1554543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554543" }, { "category": "external", "summary": "1554900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554900" }, { "category": "external", "summary": "1555487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555487" }, { "category": "external", "summary": "1556814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1556814" }, { "category": "external", "summary": "1557025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557025" }, { "category": "external", "summary": "1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "1558032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558032" }, { "category": "external", "summary": "1558039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558039" }, { "category": "external", "summary": "1558047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558047" }, { "category": "external", "summary": "1558076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558076" }, { "category": "external", "summary": "1558595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558595" }, { "category": "external", "summary": "1558622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558622" }, { "category": "external", "summary": "1559551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559551" }, { "category": "external", "summary": "1559553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559553" }, { "category": "external", "summary": "1560097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560097" }, { "category": "external", "summary": "1560099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560099" }, { "category": "external", "summary": "1560693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560693" }, { "category": "external", "summary": "1561077", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561077" }, { "category": "external", "summary": "1562773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562773" }, { "category": "external", "summary": "1562775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562775" }, { "category": "external", "summary": "1562798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562798" }, { "category": "external", "summary": "1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "1563721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563721" }, { "category": "external", "summary": "1563741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563741" }, { "category": "external", "summary": "1564264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564264" }, { "category": "external", "summary": "1564454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564454" }, { "category": "external", "summary": "1565157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565157" }, { "category": "external", "summary": "1565162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565162" }, { "category": "external", "summary": "1565169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565169" }, { "category": "external", "summary": "1565248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565248" }, { "category": "external", "summary": "1565342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565342" }, { "category": "external", "summary": "1565358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565358" }, { "category": "external", "summary": "1565362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565362" }, { "category": "external", "summary": "1565364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565364" }, { "category": "external", "summary": "1565365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565365" }, { "category": "external", "summary": "1565366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565366" }, { "category": "external", "summary": "1565389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565389" }, { "category": "external", "summary": "1565403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565403" }, { "category": "external", "summary": "1565414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565414" }, { "category": "external", "summary": "1565678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565678" }, { "category": "external", "summary": "1565724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565724" }, { "category": "external", "summary": "1565760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565760" }, { "category": "external", "summary": "1565835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565835" }, { "category": "external", "summary": "1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "1566256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566256" }, { "category": "external", "summary": "1566528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566528" }, { "category": "external", "summary": "1566746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566746" }, { "category": "external", "summary": "1567983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567983" }, { "category": "external", "summary": "1568016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568016" }, { "category": "external", "summary": "1568042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568042" }, { "category": "external", "summary": "1568045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568045" }, { "category": "external", "summary": "1568084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568084" }, { "category": "external", "summary": "1568159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568159" }, { "category": "external", "summary": "1568168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568168" }, { "category": "external", "summary": "1568576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568576" }, { "category": "external", "summary": "1568603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568603" }, { "category": "external", "summary": "1569079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569079" }, { "category": "external", "summary": "1569100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569100" }, { "category": "external", "summary": "1569104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569104" }, { "category": "external", "summary": "1569118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569118" }, { "category": "external", "summary": "1569127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569127" }, { "category": "external", "summary": "1569171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569171" }, { "category": "external", "summary": "1569179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569179" }, { "category": "external", "summary": "1569230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569230" }, { "category": "external", "summary": "1569237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569237" }, { "category": "external", "summary": "1569241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569241" }, { "category": "external", "summary": "1570060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570060" }, { "category": "external", "summary": "1570951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570951" }, { "category": "external", "summary": "1570990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570990" }, { "category": "external", "summary": "1571311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571311" }, { "category": "external", "summary": "1572621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572621" }, { "category": "external", "summary": "1572719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572719" }, { "category": "external", "summary": "1573540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573540" }, { "category": "external", "summary": "1574155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574155" }, { "category": "external", "summary": "1574571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574571" }, { "category": "external", "summary": "1574615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574615" }, { "category": "external", "summary": "1576101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576101" }, { "category": "external", "summary": "1578575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578575" }, { "category": "external", "summary": "1578853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578853" }, { "category": "external", "summary": "1578866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578866" }, { "category": "external", "summary": "1581387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581387" }, { "category": "external", "summary": "1583711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583711" }, { "category": "external", "summary": "1583790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583790" }, { "category": "external", "summary": "1584187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584187" }, { "category": "external", "summary": "1584688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584688" }, { "category": "external", "summary": "1589834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589834" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1972.json" } ], "title": "Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-09-10T14:23:19+00:00", "generator": { "date": "2025-09-10T14:23:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2018:1972", "initial_release_date": "2018-06-25T14:17:26+00:00", "revision_history": [ { "date": "2018-06-25T14:17:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-06-25T14:17:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:23:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms Management Engine 5.8", "product": { "name": "CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "product": { "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "product_id": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-server@3.1.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "product": { "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "product_id": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-setup@3.1.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-debuginfo@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.8.4.5-1.el7cf?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.src", "product": { "name": "python-paramiko-0:2.1.1-4.el7.src", "product_id": "python-paramiko-0:2.1.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.src", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.src", "product_id": "ansible-0:2.4.4.0-1.el7ae.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src" } } }, { "category": "product_version", "name": "cfme-0:5.8.4.5-1.el7cf.src", "product": { "name": "cfme-0:5.8.4.5-1.el7cf.src", "product_id": "cfme-0:5.8.4.5-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "product": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "product": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_id": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64" }, "product_reference": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64" }, "product_reference": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src" }, "product_reference": "cfme-0:5.8.4.5-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src" }, "product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src" }, "product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Graham Mainwaring" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1101", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1563492" } ], "notes": [ { "category": "description", "text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1101" }, { "category": "external", "summary": "RHBZ#1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-25T14:17:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1972" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges" }, { "acknowledgments": [ { "names": [ "Simon Vikstr\u00f6m" ] } ], "cve": "CVE-2018-1104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1565862" } ], "notes": [ { "category": "description", "text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Remote code execution by users with access to define variables in job templates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1104" }, { "category": "external", "summary": "RHBZ#1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-25T14:17:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1972" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Remote code execution by users with access to define variables in job templates" }, { "cve": "CVE-2018-7750", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1557130" } ], "notes": [ { "category": "description", "text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-paramiko: Authentication bypass in transport.py", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7750" }, { "category": "external", "summary": "RHBZ#1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750" } ], "release_date": "2018-03-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-25T14:17:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1972" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-paramiko: Authentication bypass in transport.py" } ] }
RHSA-2018:1972
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for CloudForms Management Engine 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104. The CVE-2018-1101 issue was discovered by Graham Mainwaring (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1972", "url": "https://access.redhat.com/errata/RHSA-2018:1972" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1489507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489507" }, { "category": "external", "summary": "1496902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496902" }, { "category": "external", "summary": "1500951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500951" }, { "category": "external", "summary": "1511030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511030" }, { "category": "external", "summary": "1526156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526156" }, { "category": "external", "summary": "1531499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531499" }, { "category": "external", "summary": "1532272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532272" }, { "category": "external", "summary": "1533082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533082" }, { "category": "external", "summary": "1535369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535369" }, { "category": "external", "summary": "1536684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536684" }, { "category": "external", "summary": "1537132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537132" }, { "category": "external", "summary": "1540579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540579" }, { "category": "external", "summary": "1541341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541341" }, { "category": "external", "summary": "1541427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541427" }, { "category": "external", "summary": "1541700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541700" }, { "category": "external", "summary": "1544488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544488" }, { "category": "external", "summary": "1549626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549626" }, { "category": "external", "summary": "1549723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549723" }, { "category": "external", "summary": "1549833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549833" }, { "category": "external", "summary": "1550116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550116" }, { "category": "external", "summary": "1550276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550276" }, { "category": "external", "summary": "1550715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550715" }, { "category": "external", "summary": "1550729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550729" }, { "category": "external", "summary": "1550732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550732" }, { "category": "external", "summary": "1550737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550737" }, { "category": "external", "summary": "1551627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551627" }, { "category": "external", "summary": "1551693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551693" }, { "category": "external", "summary": "1551697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551697" }, { "category": "external", "summary": "1551699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551699" }, { "category": "external", "summary": "1552135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552135" }, { "category": "external", "summary": "1552233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552233" }, { "category": "external", "summary": "1552780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552780" }, { "category": "external", "summary": "1552891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552891" }, { "category": "external", "summary": "1552905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552905" }, { "category": "external", "summary": "1553225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553225" }, { "category": "external", "summary": "1553249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553249" }, { "category": "external", "summary": "1553308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553308" }, { "category": "external", "summary": "1553331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553331" }, { "category": "external", "summary": "1553337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553337" }, { "category": "external", "summary": "1553364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553364" }, { "category": "external", "summary": "1553465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553465" }, { "category": "external", "summary": "1553473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553473" }, { "category": "external", "summary": "1554533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554533" }, { "category": "external", "summary": "1554543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554543" }, { "category": "external", "summary": "1554900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554900" }, { "category": "external", "summary": "1555487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555487" }, { "category": "external", "summary": "1556814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1556814" }, { "category": "external", "summary": "1557025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557025" }, { "category": "external", "summary": "1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "1558032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558032" }, { "category": "external", "summary": "1558039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558039" }, { "category": "external", "summary": "1558047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558047" }, { "category": "external", "summary": "1558076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558076" }, { "category": "external", "summary": "1558595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558595" }, { "category": "external", "summary": "1558622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558622" }, { "category": "external", "summary": "1559551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559551" }, { "category": "external", "summary": "1559553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559553" }, { "category": "external", "summary": "1560097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560097" }, { "category": "external", "summary": "1560099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560099" }, { "category": "external", "summary": "1560693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560693" }, { "category": "external", "summary": "1561077", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561077" }, { "category": "external", "summary": "1562773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562773" }, { "category": "external", "summary": "1562775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562775" }, { "category": "external", "summary": "1562798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562798" }, { "category": "external", "summary": "1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "1563721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563721" }, { "category": "external", "summary": "1563741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563741" }, { "category": "external", "summary": "1564264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564264" }, { "category": "external", "summary": "1564454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564454" }, { "category": "external", "summary": "1565157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565157" }, { "category": "external", "summary": "1565162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565162" }, { "category": "external", "summary": "1565169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565169" }, { "category": "external", "summary": "1565248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565248" }, { "category": "external", "summary": "1565342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565342" }, { "category": "external", "summary": "1565358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565358" }, { "category": "external", "summary": "1565362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565362" }, { "category": "external", "summary": "1565364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565364" }, { "category": "external", "summary": "1565365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565365" }, { "category": "external", "summary": "1565366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565366" }, { "category": "external", "summary": "1565389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565389" }, { "category": "external", "summary": "1565403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565403" }, { "category": "external", "summary": "1565414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565414" }, { "category": "external", "summary": "1565678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565678" }, { "category": "external", "summary": "1565724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565724" }, { "category": "external", "summary": "1565760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565760" }, { "category": "external", "summary": "1565835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565835" }, { "category": "external", "summary": "1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "1566256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566256" }, { "category": "external", "summary": "1566528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566528" }, { "category": "external", "summary": "1566746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566746" }, { "category": "external", "summary": "1567983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567983" }, { "category": "external", "summary": "1568016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568016" }, { "category": "external", "summary": "1568042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568042" }, { "category": "external", "summary": "1568045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568045" }, { "category": "external", "summary": "1568084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568084" }, { "category": "external", "summary": "1568159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568159" }, { "category": "external", "summary": "1568168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568168" }, { "category": "external", "summary": "1568576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568576" }, { "category": "external", "summary": "1568603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568603" }, { "category": "external", "summary": "1569079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569079" }, { "category": "external", "summary": "1569100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569100" }, { "category": "external", "summary": "1569104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569104" }, { "category": "external", "summary": "1569118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569118" }, { "category": "external", "summary": "1569127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569127" }, { "category": "external", "summary": "1569171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569171" }, { "category": "external", "summary": "1569179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569179" }, { "category": "external", "summary": "1569230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569230" }, { "category": "external", "summary": "1569237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569237" }, { "category": "external", "summary": "1569241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569241" }, { "category": "external", "summary": "1570060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570060" }, { "category": "external", "summary": "1570951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570951" }, { "category": "external", "summary": "1570990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570990" }, { "category": "external", "summary": "1571311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571311" }, { "category": "external", "summary": "1572621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572621" }, { "category": "external", "summary": "1572719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572719" }, { "category": "external", "summary": "1573540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573540" }, { "category": "external", "summary": "1574155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574155" }, { "category": "external", "summary": "1574571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574571" }, { "category": "external", "summary": "1574615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574615" }, { "category": "external", "summary": "1576101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576101" }, { "category": "external", "summary": "1578575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578575" }, { "category": "external", "summary": "1578853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578853" }, { "category": "external", "summary": "1578866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578866" }, { "category": "external", "summary": "1581387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581387" }, { "category": "external", "summary": "1583711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583711" }, { "category": "external", "summary": "1583790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583790" }, { "category": "external", "summary": "1584187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584187" }, { "category": "external", "summary": "1584688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584688" }, { "category": "external", "summary": "1589834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589834" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1972.json" } ], "title": "Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-09-10T14:23:19+00:00", "generator": { "date": "2025-09-10T14:23:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2018:1972", "initial_release_date": "2018-06-25T14:17:26+00:00", "revision_history": [ { "date": "2018-06-25T14:17:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-06-25T14:17:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:23:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms Management Engine 5.8", "product": { "name": "CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "product": { "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "product_id": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-server@3.1.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "product": { "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "product_id": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-setup@3.1.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-debuginfo@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.8.4.5-1.el7cf?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.src", "product": { "name": "python-paramiko-0:2.1.1-4.el7.src", "product_id": "python-paramiko-0:2.1.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.src", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.src", "product_id": "ansible-0:2.4.4.0-1.el7ae.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src" } } }, { "category": "product_version", "name": "cfme-0:5.8.4.5-1.el7cf.src", "product": { "name": "cfme-0:5.8.4.5-1.el7cf.src", "product_id": "cfme-0:5.8.4.5-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "product": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "product": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_id": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64" }, "product_reference": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64" }, "product_reference": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src" }, "product_reference": "cfme-0:5.8.4.5-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src" }, "product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src" }, "product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Graham Mainwaring" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1101", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1563492" } ], "notes": [ { "category": "description", "text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1101" }, { "category": "external", "summary": "RHBZ#1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-25T14:17:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1972" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges" }, { "acknowledgments": [ { "names": [ "Simon Vikstr\u00f6m" ] } ], "cve": "CVE-2018-1104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1565862" } ], "notes": [ { "category": "description", "text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Remote code execution by users with access to define variables in job templates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1104" }, { "category": "external", "summary": "RHBZ#1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-25T14:17:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1972" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Remote code execution by users with access to define variables in job templates" }, { "cve": "CVE-2018-7750", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1557130" } ], "notes": [ { "category": "description", "text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-paramiko: Authentication bypass in transport.py", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7750" }, { "category": "external", "summary": "RHBZ#1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750" } ], "release_date": "2018-03-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-25T14:17:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1972" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-paramiko: Authentication bypass in transport.py" } ] }
rhsa-2018:1328
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for CloudForms Management Engine 5.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\nRed Hat would like to thank Graham Mainwaring of Red Hat for reporting CVE-2018-1101.\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1328", "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1495849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495849" }, { "category": "external", "summary": "1510499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510499" }, { "category": "external", "summary": "1526086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526086" }, { "category": "external", "summary": "1526088", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526088" }, { "category": "external", "summary": "1530680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530680" }, { "category": "external", "summary": "1530760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530760" }, { "category": "external", "summary": "1533220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533220" }, { "category": "external", "summary": "1533233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533233" }, { "category": "external", "summary": "1533515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533515" }, { "category": "external", "summary": "1538094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538094" }, { "category": "external", "summary": "1538100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538100" }, { "category": "external", "summary": "1549625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549625" }, { "category": "external", "summary": "1549722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549722" }, { "category": "external", "summary": "1550728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550728" }, { "category": "external", "summary": "1550730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550730" }, { "category": "external", "summary": "1550736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550736" }, { "category": "external", "summary": "1551692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551692" }, { "category": "external", "summary": "1551696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551696" }, { "category": "external", "summary": "1551698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551698" }, { "category": "external", "summary": "1551703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551703" }, { "category": "external", "summary": "1552266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552266" }, { "category": "external", "summary": "1552269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552269" }, { "category": "external", "summary": "1552278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552278" }, { "category": "external", "summary": "1552282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552282" }, { "category": "external", "summary": "1552288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552288" }, { "category": "external", "summary": "1552290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552290" }, { "category": "external", "summary": "1552301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552301" }, { "category": "external", "summary": "1552303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552303" }, { "category": "external", "summary": "1552305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552305" }, { "category": "external", "summary": "1552323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552323" }, { "category": "external", "summary": "1552334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552334" }, { "category": "external", "summary": "1552335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552335" }, { "category": "external", "summary": "1552671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552671" }, { "category": "external", "summary": "1552673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552673" }, { "category": "external", "summary": "1552677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552677" }, { "category": "external", "summary": "1552704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552704" }, { "category": "external", "summary": "1552707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552707" }, { "category": "external", "summary": "1552723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552723" }, { "category": "external", "summary": "1552735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552735" }, { "category": "external", "summary": "1552737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552737" }, { "category": "external", "summary": "1552739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552739" }, { "category": "external", "summary": "1552740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552740" }, { "category": "external", "summary": "1552741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552741" }, { "category": "external", "summary": "1552743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552743" }, { "category": "external", "summary": "1552746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552746" }, { "category": "external", "summary": "1552748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552748" }, { "category": "external", "summary": "1552753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552753" }, { "category": "external", "summary": "1552762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552762" }, { "category": "external", "summary": "1552763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552763" }, { "category": "external", "summary": "1552776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552776" }, { "category": "external", "summary": "1552782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552782" }, { "category": "external", "summary": "1552783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552783" }, { "category": "external", "summary": "1552785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552785" }, { "category": "external", "summary": "1552790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552790" }, { "category": "external", "summary": "1552791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552791" }, { "category": "external", "summary": "1552792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552792" }, { "category": "external", "summary": "1552794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552794" }, { "category": "external", "summary": "1552796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552796" }, { "category": "external", "summary": "1552798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552798" }, { "category": "external", "summary": "1552800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552800" }, { "category": "external", "summary": "1552801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552801" }, { "category": "external", "summary": "1552802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552802" }, { "category": "external", "summary": "1552804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552804" }, { "category": "external", "summary": "1552809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552809" }, { "category": "external", "summary": "1552817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552817" }, { "category": "external", "summary": "1552824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552824" }, { "category": "external", "summary": "1552826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552826" }, { "category": "external", "summary": "1552828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552828" }, { "category": "external", "summary": "1552838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552838" }, { "category": "external", "summary": "1552842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552842" }, { "category": "external", "summary": "1552873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552873" }, { "category": "external", "summary": "1552879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552879" }, { "category": "external", "summary": "1552880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552880" }, { "category": "external", "summary": "1552882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552882" }, { "category": "external", "summary": "1552884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552884" }, { "category": "external", "summary": "1552886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552886" }, { "category": "external", "summary": "1552889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552889" }, { "category": "external", "summary": "1552890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552890" }, { "category": "external", "summary": "1552895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552895" }, { "category": "external", "summary": "1552900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552900" }, { "category": "external", "summary": "1552903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552903" }, { "category": "external", "summary": "1552904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552904" }, { "category": "external", "summary": "1552908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552908" }, { "category": "external", "summary": "1553191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553191" }, { "category": "external", "summary": "1553197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553197" }, { "category": "external", "summary": "1553214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553214" }, { "category": "external", "summary": "1553224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553224" }, { "category": "external", "summary": "1553241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553241" }, { "category": "external", "summary": "1553242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553242" }, { "category": "external", "summary": "1553243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553243" }, { "category": "external", "summary": "1553244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553244" }, { "category": "external", "summary": "1553251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553251" }, { "category": "external", "summary": "1553288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553288" }, { "category": "external", "summary": "1553295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553295" }, { "category": "external", "summary": "1553304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553304" }, { "category": "external", "summary": "1553307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553307" }, { "category": "external", "summary": "1553309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553309" }, { "category": "external", "summary": "1553311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553311" }, { "category": "external", "summary": "1553315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553315" }, { "category": "external", "summary": "1553316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553316" }, { "category": "external", "summary": "1553317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553317" }, { "category": "external", "summary": "1553319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553319" }, { "category": "external", "summary": "1553322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553322" }, { "category": "external", "summary": "1553323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553323" }, { "category": "external", "summary": "1553326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553326" }, { "category": "external", "summary": "1553327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553327" }, { "category": "external", "summary": "1553329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553329" }, { "category": "external", "summary": "1553336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553336" }, { "category": "external", "summary": "1553340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553340" }, { "category": "external", "summary": "1553345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553345" }, { "category": "external", "summary": "1553362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553362" }, { "category": "external", "summary": "1553384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553384" }, { "category": "external", "summary": "1553389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553389" }, { "category": "external", "summary": "1553392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553392" }, { "category": "external", "summary": "1553393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553393" }, { "category": "external", "summary": "1553396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553396" }, { "category": "external", "summary": "1553397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553397" }, { "category": "external", "summary": "1553399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553399" }, { "category": "external", "summary": "1553480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553480" }, { "category": "external", "summary": "1553482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553482" }, { "category": "external", "summary": "1553483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553483" }, { "category": "external", "summary": "1553768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553768" }, { "category": "external", "summary": "1553776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553776" }, { "category": "external", "summary": "1553779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553779" }, { "category": "external", "summary": "1553780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553780" }, { "category": "external", "summary": "1553789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553789" }, { "category": "external", "summary": "1553791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553791" }, { "category": "external", "summary": "1553836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553836" }, { "category": "external", "summary": "1553873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553873" }, { "category": "external", "summary": "1553903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553903" }, { "category": "external", "summary": "1554358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554358" }, { "category": "external", "summary": "1554370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554370" }, { "category": "external", "summary": "1554454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554454" }, { "category": "external", "summary": "1554532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554532" }, { "category": "external", "summary": "1554541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554541" }, { "category": "external", "summary": "1554823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554823" }, { "category": "external", "summary": "1554825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554825" }, { "category": "external", "summary": "1554832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554832" }, { "category": "external", "summary": "1554839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554839" }, { "category": "external", "summary": "1554889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554889" }, { "category": "external", "summary": "1554898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554898" }, { "category": "external", "summary": "1554901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554901" }, { "category": "external", "summary": "1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "1557353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557353" }, { "category": "external", "summary": "1557361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557361" }, { "category": "external", "summary": "1557367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557367" }, { "category": "external", "summary": "1557378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557378" }, { "category": "external", "summary": "1557380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557380" }, { "category": "external", "summary": "1557388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557388" }, { "category": "external", "summary": "1557391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557391" }, { "category": "external", "summary": "1557400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557400" }, { "category": "external", "summary": "1558030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558030" }, { "category": "external", "summary": "1558038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558038" }, { "category": "external", "summary": "1558040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558040" }, { "category": "external", "summary": "1558046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558046" }, { "category": "external", "summary": "1558048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558048" }, { "category": "external", "summary": "1558078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558078" }, { "category": "external", "summary": "1558092", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558092" }, { "category": "external", "summary": "1558142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558142" }, { "category": "external", "summary": "1558144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558144" }, { "category": "external", "summary": "1558544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558544" }, { "category": "external", "summary": "1558594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558594" }, { "category": "external", "summary": "1558610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558610" }, { "category": "external", "summary": "1558621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558621" }, { "category": "external", "summary": "1558626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558626" }, { "category": "external", "summary": "1559475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559475" }, { "category": "external", "summary": "1559479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559479" }, { "category": "external", "summary": "1559483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559483" }, { "category": "external", "summary": "1559543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559543" }, { "category": "external", "summary": "1559544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559544" }, { "category": "external", "summary": "1559550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559550" }, { "category": "external", "summary": "1559552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559552" }, { "category": "external", "summary": "1559609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559609" }, { "category": "external", "summary": "1559624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559624" }, { "category": "external", "summary": "1560004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560004" }, { "category": "external", "summary": "1560096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560096" }, { "category": "external", "summary": "1560098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560098" }, { "category": "external", "summary": "1560100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560100" }, { "category": "external", "summary": "1560104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560104" }, { "category": "external", "summary": "1560692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560692" }, { "category": "external", "summary": "1560699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560699" }, { "category": "external", "summary": "1560703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560703" }, { "category": "external", "summary": "1560708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560708" }, { "category": "external", "summary": "1561076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561076" }, { "category": "external", "summary": "1561079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561079" }, { "category": "external", "summary": "1561085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561085" }, { "category": "external", "summary": "1561091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561091" }, { "category": "external", "summary": "1561096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561096" }, { "category": "external", "summary": "1561107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561107" }, { "category": "external", "summary": "1561216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561216" }, { "category": "external", "summary": "1561218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561218" }, { "category": "external", "summary": "1561222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561222" }, { "category": "external", "summary": "1562075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562075" }, { "category": "external", "summary": "1562235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562235" }, { "category": "external", "summary": "1562772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562772" }, { "category": "external", "summary": "1562777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562777" }, { "category": "external", "summary": "1562779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562779" }, { "category": "external", "summary": "1562780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562780" }, { "category": "external", "summary": "1562782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562782" }, { "category": "external", "summary": "1562785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562785" }, { "category": "external", "summary": "1562788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562788" }, { "category": "external", "summary": "1562791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562791" }, { "category": "external", "summary": "1562797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562797" }, { "category": "external", "summary": "1562800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562800" }, { "category": "external", "summary": "1562803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562803" }, { "category": "external", "summary": "1562811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562811" }, { "category": "external", "summary": "1563268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563268" }, { "category": "external", "summary": "1563351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563351" }, { "category": "external", "summary": "1563358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563358" }, { "category": "external", "summary": "1563359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563359" }, { "category": "external", "summary": "1563361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563361" }, { "category": "external", "summary": "1563363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563363" }, { "category": "external", "summary": "1563364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563364" }, { "category": "external", "summary": "1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "1563731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563731" }, { "category": "external", "summary": "1563740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563740" }, { "category": "external", "summary": "1565139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565139" }, { "category": "external", "summary": "1565140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565140" }, { "category": "external", "summary": "1565142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565142" }, { "category": "external", "summary": "1565147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565147" }, { "category": "external", "summary": "1565148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565148" }, { "category": "external", "summary": "1565151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565151" }, { "category": "external", "summary": "1565156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565156" }, { "category": "external", "summary": "1565160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565160" }, { "category": "external", "summary": "1565167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565167" }, { "category": "external", "summary": "1565232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565232" }, { "category": "external", "summary": "1565677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565677" }, { "category": "external", "summary": "1565686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565686" }, { "category": "external", "summary": "1565756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565756" }, { "category": "external", "summary": "1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "1566255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566255" }, { "category": "external", "summary": "1566526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566526" }, { "category": "external", "summary": "1566529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566529" }, { "category": "external", "summary": "1566530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566530" }, { "category": "external", "summary": "1566541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566541" }, { "category": "external", "summary": "1566557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566557" }, { "category": "external", "summary": "1566562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566562" }, { "category": "external", "summary": "1566563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566563" }, { "category": "external", "summary": "1566568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566568" }, { "category": "external", "summary": "1566572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566572" }, { "category": "external", "summary": "1566577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566577" }, { "category": "external", "summary": "1566658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566658" }, { "category": "external", "summary": "1567278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567278" }, { "category": "external", "summary": "1567962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567962" }, { "category": "external", "summary": "1568023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568023" }, { "category": "external", "summary": "1568091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568091" }, { "category": "external", "summary": "1568156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568156" }, { "category": "external", "summary": "1568158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568158" }, { "category": "external", "summary": "1568162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568162" }, { "category": "external", "summary": "1568467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568467" }, { "category": "external", "summary": "1568473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568473" }, { "category": "external", "summary": "1568550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568550" }, { "category": "external", "summary": "1568559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568559" }, { "category": "external", "summary": "1568602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568602" }, { "category": "external", "summary": "1569099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569099" }, { "category": "external", "summary": "1569103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569103" }, { "category": "external", "summary": "1569113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569113" }, { "category": "external", "summary": "1569177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569177" }, { "category": "external", "summary": "1569236", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569236" }, { "category": "external", "summary": "1569472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569472" }, { "category": "external", "summary": "1569551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569551" }, { "category": "external", "summary": "1570118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570118" }, { "category": "external", "summary": "1570821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570821" }, { "category": "external", "summary": "1570950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570950" }, { "category": "external", "summary": "1570989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570989" }, { "category": "external", "summary": "1571310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571310" }, { "category": "external", "summary": "1571976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571976" }, { "category": "external", "summary": "1571989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571989" }, { "category": "external", "summary": "1572711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572711" }, { "category": "external", "summary": "1572716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572716" }, { "category": "external", "summary": "1572718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572718" }, { "category": "external", "summary": "1573215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573215" }, { "category": "external", "summary": "1573246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573246" }, { "category": "external", "summary": "1573254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573254" }, { "category": "external", "summary": "1573539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573539" }, { "category": "external", "summary": "1573990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573990" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1328.json" } ], "title": "Red Hat Security Advisory: CloudForms 4.6.2 bug fix and enhancement update", "tracking": { "current_release_date": "2025-09-10T14:22:39+00:00", "generator": { "date": "2025-09-10T14:22:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2018:1328", "initial_release_date": "2018-05-07T20:42:50+00:00", "revision_history": [ { "date": "2018-05-07T20:42:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-07T20:42:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:22:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms Management Engine 5.9", "product": { "name": "CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-libs@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-server@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-plpython@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-pltcl@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-plperl@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-devel@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-debuginfo@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-contrib@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-test@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-docs@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product": { "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product_id": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-debuginfo@0.22.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-venv-tower@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-venv-ansible@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-setup@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-server@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-ui@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-common@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-tools@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "postgresql96-0:9.6.6-1PGDG.el7.src", "product": { "name": "postgresql96-0:9.6.6-1PGDG.el7.src", "product_id": "postgresql96-0:9.6.6-1PGDG.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=src" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "dbus-api-service-0:1.0.1-3.el7cf.src", "product": { "name": "dbus-api-service-0:1.0.1-3.el7cf.src", "product_id": "dbus-api-service-0:1.0.1-3.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=src" } } }, { "category": "product_version", "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.src", "product": { "name": "python-paramiko-0:2.1.1-4.el7.src", "product_id": "python-paramiko-0:2.1.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-tower-0:3.2.4-1.el7at.src", "product": { "name": "ansible-tower-0:3.2.4-1.el7at.src", "product_id": "ansible-tower-0:3.2.4-1.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=src" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.src", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.src", "product_id": "ansible-0:2.4.4.0-1.el7ae.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src" } } }, { "category": "product_version", "name": "cfme-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product": { "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product_id": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-doc@0.22.0-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_id": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch" } } }, { "category": "product_version", "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product": { "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product_id": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-doc@2.4.4.0-1.el7ae?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch" }, "product_reference": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-0:3.2.4-1.el7at.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src" }, "product_reference": "ansible-tower-0:3.2.4-1.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "dbus-api-service-0:1.0.1-3.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src" }, "product_reference": "dbus-api-service-0:1.0.1-3.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64" }, "product_reference": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src" }, "product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64" }, "product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-0:9.6.6-1PGDG.el7.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src" }, "product_reference": "postgresql96-0:9.6.6-1PGDG.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Graham Mainwaring" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1101", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1563492" } ], "notes": [ { "category": "description", "text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1101" }, { "category": "external", "summary": "RHBZ#1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges" }, { "acknowledgments": [ { "names": [ "Simon Vikstr\u00f6m" ] } ], "cve": "CVE-2018-1104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1565862" } ], "notes": [ { "category": "description", "text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Remote code execution by users with access to define variables in job templates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1104" }, { "category": "external", "summary": "RHBZ#1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Remote code execution by users with access to define variables in job templates" }, { "cve": "CVE-2018-7750", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1557130" } ], "notes": [ { "category": "description", "text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-paramiko: Authentication bypass in transport.py", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7750" }, { "category": "external", "summary": "RHBZ#1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750" } ], "release_date": "2018-03-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-paramiko: Authentication bypass in transport.py" } ] }
RHSA-2018:1328
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for CloudForms Management Engine 5.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\nRed Hat would like to thank Graham Mainwaring of Red Hat for reporting CVE-2018-1101.\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1328", "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1495849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495849" }, { "category": "external", "summary": "1510499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510499" }, { "category": "external", "summary": "1526086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526086" }, { "category": "external", "summary": "1526088", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526088" }, { "category": "external", "summary": "1530680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530680" }, { "category": "external", "summary": "1530760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530760" }, { "category": "external", "summary": "1533220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533220" }, { "category": "external", "summary": "1533233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533233" }, { "category": "external", "summary": "1533515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533515" }, { "category": "external", "summary": "1538094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538094" }, { "category": "external", "summary": "1538100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538100" }, { "category": "external", "summary": "1549625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549625" }, { "category": "external", "summary": "1549722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549722" }, { "category": "external", "summary": "1550728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550728" }, { "category": "external", "summary": "1550730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550730" }, { "category": "external", "summary": "1550736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550736" }, { "category": "external", "summary": "1551692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551692" }, { "category": "external", "summary": "1551696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551696" }, { "category": "external", "summary": "1551698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551698" }, { "category": "external", "summary": "1551703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551703" }, { "category": "external", "summary": "1552266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552266" }, { "category": "external", "summary": "1552269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552269" }, { "category": "external", "summary": "1552278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552278" }, { "category": "external", "summary": "1552282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552282" }, { "category": "external", "summary": "1552288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552288" }, { "category": "external", "summary": "1552290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552290" }, { "category": "external", "summary": "1552301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552301" }, { "category": "external", "summary": "1552303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552303" }, { "category": "external", "summary": "1552305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552305" }, { "category": "external", "summary": "1552323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552323" }, { "category": "external", "summary": "1552334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552334" }, { "category": "external", "summary": "1552335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552335" }, { "category": "external", "summary": "1552671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552671" }, { "category": "external", "summary": "1552673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552673" }, { "category": "external", "summary": "1552677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552677" }, { "category": "external", "summary": "1552704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552704" }, { "category": "external", "summary": "1552707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552707" }, { "category": "external", "summary": "1552723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552723" }, { "category": "external", "summary": "1552735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552735" }, { "category": "external", "summary": "1552737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552737" }, { "category": "external", "summary": "1552739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552739" }, { "category": "external", "summary": "1552740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552740" }, { "category": "external", "summary": "1552741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552741" }, { "category": "external", "summary": "1552743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552743" }, { "category": "external", "summary": "1552746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552746" }, { "category": "external", "summary": "1552748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552748" }, { "category": "external", "summary": "1552753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552753" }, { "category": "external", "summary": "1552762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552762" }, { "category": "external", "summary": "1552763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552763" }, { "category": "external", "summary": "1552776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552776" }, { "category": "external", "summary": "1552782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552782" }, { "category": "external", "summary": "1552783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552783" }, { "category": "external", "summary": "1552785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552785" }, { "category": "external", "summary": "1552790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552790" }, { "category": "external", "summary": "1552791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552791" }, { "category": "external", "summary": "1552792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552792" }, { "category": "external", "summary": "1552794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552794" }, { "category": "external", "summary": "1552796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552796" }, { "category": "external", "summary": "1552798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552798" }, { "category": "external", "summary": "1552800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552800" }, { "category": "external", "summary": "1552801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552801" }, { "category": "external", "summary": "1552802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552802" }, { "category": "external", "summary": "1552804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552804" }, { "category": "external", "summary": "1552809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552809" }, { "category": "external", "summary": "1552817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552817" }, { "category": "external", "summary": "1552824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552824" }, { "category": "external", "summary": "1552826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552826" }, { "category": "external", "summary": "1552828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552828" }, { "category": "external", "summary": "1552838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552838" }, { "category": "external", "summary": "1552842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552842" }, { "category": "external", "summary": "1552873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552873" }, { "category": "external", "summary": "1552879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552879" }, { "category": "external", "summary": "1552880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552880" }, { "category": "external", "summary": "1552882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552882" }, { "category": "external", "summary": "1552884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552884" }, { "category": "external", "summary": "1552886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552886" }, { "category": "external", "summary": "1552889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552889" }, { "category": "external", "summary": "1552890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552890" }, { "category": "external", "summary": "1552895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552895" }, { "category": "external", "summary": "1552900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552900" }, { "category": "external", "summary": "1552903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552903" }, { "category": "external", "summary": "1552904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552904" }, { "category": "external", "summary": "1552908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552908" }, { "category": "external", "summary": "1553191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553191" }, { "category": "external", "summary": "1553197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553197" }, { "category": "external", "summary": "1553214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553214" }, { "category": "external", "summary": "1553224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553224" }, { "category": "external", "summary": "1553241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553241" }, { "category": "external", "summary": "1553242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553242" }, { "category": "external", "summary": "1553243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553243" }, { "category": "external", "summary": "1553244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553244" }, { "category": "external", "summary": "1553251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553251" }, { "category": "external", "summary": "1553288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553288" }, { "category": "external", "summary": "1553295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553295" }, { "category": "external", "summary": "1553304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553304" }, { "category": "external", "summary": "1553307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553307" }, { "category": "external", "summary": "1553309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553309" }, { "category": "external", "summary": "1553311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553311" }, { "category": "external", "summary": "1553315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553315" }, { "category": "external", "summary": "1553316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553316" }, { "category": "external", "summary": "1553317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553317" }, { "category": "external", "summary": "1553319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553319" }, { "category": "external", "summary": "1553322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553322" }, { "category": "external", "summary": "1553323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553323" }, { "category": "external", "summary": "1553326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553326" }, { "category": "external", "summary": "1553327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553327" }, { "category": "external", "summary": "1553329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553329" }, { "category": "external", "summary": "1553336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553336" }, { "category": "external", "summary": "1553340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553340" }, { "category": "external", "summary": "1553345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553345" }, { "category": "external", "summary": "1553362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553362" }, { "category": "external", "summary": "1553384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553384" }, { "category": "external", "summary": "1553389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553389" }, { "category": "external", "summary": "1553392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553392" }, { "category": "external", "summary": "1553393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553393" }, { "category": "external", "summary": "1553396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553396" }, { "category": "external", "summary": "1553397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553397" }, { "category": "external", "summary": "1553399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553399" }, { "category": "external", "summary": "1553480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553480" }, { "category": "external", "summary": "1553482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553482" }, { "category": "external", "summary": "1553483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553483" }, { "category": "external", "summary": "1553768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553768" }, { "category": "external", "summary": "1553776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553776" }, { "category": "external", "summary": "1553779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553779" }, { "category": "external", "summary": "1553780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553780" }, { "category": "external", "summary": "1553789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553789" }, { "category": "external", "summary": "1553791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553791" }, { "category": "external", "summary": "1553836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553836" }, { "category": "external", "summary": "1553873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553873" }, { "category": "external", "summary": "1553903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553903" }, { "category": "external", "summary": "1554358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554358" }, { "category": "external", "summary": "1554370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554370" }, { "category": "external", "summary": "1554454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554454" }, { "category": "external", "summary": "1554532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554532" }, { "category": "external", "summary": "1554541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554541" }, { "category": "external", "summary": "1554823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554823" }, { "category": "external", "summary": "1554825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554825" }, { "category": "external", "summary": "1554832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554832" }, { "category": "external", "summary": "1554839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554839" }, { "category": "external", "summary": "1554889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554889" }, { "category": "external", "summary": "1554898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554898" }, { "category": "external", "summary": "1554901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554901" }, { "category": "external", "summary": "1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "1557353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557353" }, { "category": "external", "summary": "1557361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557361" }, { "category": "external", "summary": "1557367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557367" }, { "category": "external", "summary": "1557378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557378" }, { "category": "external", "summary": "1557380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557380" }, { "category": "external", "summary": "1557388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557388" }, { "category": "external", "summary": "1557391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557391" }, { "category": "external", "summary": "1557400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557400" }, { "category": "external", "summary": "1558030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558030" }, { "category": "external", "summary": "1558038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558038" }, { "category": "external", "summary": "1558040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558040" }, { "category": "external", "summary": "1558046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558046" }, { "category": "external", "summary": "1558048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558048" }, { "category": "external", "summary": "1558078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558078" }, { "category": "external", "summary": "1558092", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558092" }, { "category": "external", "summary": "1558142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558142" }, { "category": "external", "summary": "1558144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558144" }, { "category": "external", "summary": "1558544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558544" }, { "category": "external", "summary": "1558594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558594" }, { "category": "external", "summary": "1558610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558610" }, { "category": "external", "summary": "1558621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558621" }, { "category": "external", "summary": "1558626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558626" }, { "category": "external", "summary": "1559475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559475" }, { "category": "external", "summary": "1559479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559479" }, { "category": "external", "summary": "1559483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559483" }, { "category": "external", "summary": "1559543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559543" }, { "category": "external", "summary": "1559544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559544" }, { "category": "external", "summary": "1559550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559550" }, { "category": "external", "summary": "1559552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559552" }, { "category": "external", "summary": "1559609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559609" }, { "category": "external", "summary": "1559624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559624" }, { "category": "external", "summary": "1560004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560004" }, { "category": "external", "summary": "1560096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560096" }, { "category": "external", "summary": "1560098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560098" }, { "category": "external", "summary": "1560100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560100" }, { "category": "external", "summary": "1560104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560104" }, { "category": "external", "summary": "1560692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560692" }, { "category": "external", "summary": "1560699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560699" }, { "category": "external", "summary": "1560703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560703" }, { "category": "external", "summary": "1560708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560708" }, { "category": "external", "summary": "1561076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561076" }, { "category": "external", "summary": "1561079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561079" }, { "category": "external", "summary": "1561085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561085" }, { "category": "external", "summary": "1561091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561091" }, { "category": "external", "summary": "1561096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561096" }, { "category": "external", "summary": "1561107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561107" }, { "category": "external", "summary": "1561216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561216" }, { "category": "external", "summary": "1561218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561218" }, { "category": "external", "summary": "1561222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561222" }, { "category": "external", "summary": "1562075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562075" }, { "category": "external", "summary": "1562235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562235" }, { "category": "external", "summary": "1562772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562772" }, { "category": "external", "summary": "1562777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562777" }, { "category": "external", "summary": "1562779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562779" }, { "category": "external", "summary": "1562780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562780" }, { "category": "external", "summary": "1562782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562782" }, { "category": "external", "summary": "1562785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562785" }, { "category": "external", "summary": "1562788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562788" }, { "category": "external", "summary": "1562791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562791" }, { "category": "external", "summary": "1562797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562797" }, { "category": "external", "summary": "1562800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562800" }, { "category": "external", "summary": "1562803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562803" }, { "category": "external", "summary": "1562811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562811" }, { "category": "external", "summary": "1563268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563268" }, { "category": "external", "summary": "1563351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563351" }, { "category": "external", "summary": "1563358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563358" }, { "category": "external", "summary": "1563359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563359" }, { "category": "external", "summary": "1563361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563361" }, { "category": "external", "summary": "1563363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563363" }, { "category": "external", "summary": "1563364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563364" }, { "category": "external", "summary": "1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "1563731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563731" }, { "category": "external", "summary": "1563740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563740" }, { "category": "external", "summary": "1565139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565139" }, { "category": "external", "summary": "1565140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565140" }, { "category": "external", "summary": "1565142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565142" }, { "category": "external", "summary": "1565147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565147" }, { "category": "external", "summary": "1565148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565148" }, { "category": "external", "summary": "1565151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565151" }, { "category": "external", "summary": "1565156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565156" }, { "category": "external", "summary": "1565160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565160" }, { "category": "external", "summary": "1565167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565167" }, { "category": "external", "summary": "1565232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565232" }, { "category": "external", "summary": "1565677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565677" }, { "category": "external", "summary": "1565686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565686" }, { "category": "external", "summary": "1565756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565756" }, { "category": "external", "summary": "1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "1566255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566255" }, { "category": "external", "summary": "1566526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566526" }, { "category": "external", "summary": "1566529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566529" }, { "category": "external", "summary": "1566530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566530" }, { "category": "external", "summary": "1566541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566541" }, { "category": "external", "summary": "1566557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566557" }, { "category": "external", "summary": "1566562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566562" }, { "category": "external", "summary": "1566563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566563" }, { "category": "external", "summary": "1566568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566568" }, { "category": "external", "summary": "1566572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566572" }, { "category": "external", "summary": "1566577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566577" }, { "category": "external", "summary": "1566658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566658" }, { "category": "external", "summary": "1567278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567278" }, { "category": "external", "summary": "1567962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567962" }, { "category": "external", "summary": "1568023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568023" }, { "category": "external", "summary": "1568091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568091" }, { "category": "external", "summary": "1568156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568156" }, { "category": "external", "summary": "1568158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568158" }, { "category": "external", "summary": "1568162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568162" }, { "category": "external", "summary": "1568467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568467" }, { "category": "external", "summary": "1568473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568473" }, { "category": "external", "summary": "1568550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568550" }, { "category": "external", "summary": "1568559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568559" }, { "category": "external", "summary": "1568602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568602" }, { "category": "external", "summary": "1569099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569099" }, { "category": "external", "summary": "1569103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569103" }, { "category": "external", "summary": "1569113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569113" }, { "category": "external", "summary": "1569177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569177" }, { "category": "external", "summary": "1569236", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569236" }, { "category": "external", "summary": "1569472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569472" }, { "category": "external", "summary": "1569551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569551" }, { "category": "external", "summary": "1570118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570118" }, { "category": "external", "summary": "1570821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570821" }, { "category": "external", "summary": "1570950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570950" }, { "category": "external", "summary": "1570989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570989" }, { "category": "external", "summary": "1571310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571310" }, { "category": "external", "summary": "1571976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571976" }, { "category": "external", "summary": "1571989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571989" }, { "category": "external", "summary": "1572711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572711" }, { "category": "external", "summary": "1572716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572716" }, { "category": "external", "summary": "1572718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572718" }, { "category": "external", "summary": "1573215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573215" }, { "category": "external", "summary": "1573246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573246" }, { "category": "external", "summary": "1573254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573254" }, { "category": "external", "summary": "1573539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573539" }, { "category": "external", "summary": "1573990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573990" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1328.json" } ], "title": "Red Hat Security Advisory: CloudForms 4.6.2 bug fix and enhancement update", "tracking": { "current_release_date": "2025-09-10T14:22:39+00:00", "generator": { "date": "2025-09-10T14:22:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2018:1328", "initial_release_date": "2018-05-07T20:42:50+00:00", "revision_history": [ { "date": "2018-05-07T20:42:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-07T20:42:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:22:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms Management Engine 5.9", "product": { "name": "CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-libs@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-server@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-plpython@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-pltcl@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-plperl@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-devel@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-debuginfo@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-contrib@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-test@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-docs@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product": { "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product_id": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-debuginfo@0.22.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-venv-tower@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-venv-ansible@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-setup@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-server@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-ui@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-common@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-tools@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "postgresql96-0:9.6.6-1PGDG.el7.src", "product": { "name": "postgresql96-0:9.6.6-1PGDG.el7.src", "product_id": "postgresql96-0:9.6.6-1PGDG.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=src" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "dbus-api-service-0:1.0.1-3.el7cf.src", "product": { "name": "dbus-api-service-0:1.0.1-3.el7cf.src", "product_id": "dbus-api-service-0:1.0.1-3.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=src" } } }, { "category": "product_version", "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.src", "product": { "name": "python-paramiko-0:2.1.1-4.el7.src", "product_id": "python-paramiko-0:2.1.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-tower-0:3.2.4-1.el7at.src", "product": { "name": "ansible-tower-0:3.2.4-1.el7at.src", "product_id": "ansible-tower-0:3.2.4-1.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=src" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.src", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.src", "product_id": "ansible-0:2.4.4.0-1.el7ae.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src" } } }, { "category": "product_version", "name": "cfme-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product": { "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product_id": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-doc@0.22.0-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_id": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch" } } }, { "category": "product_version", "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product": { "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product_id": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-doc@2.4.4.0-1.el7ae?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch" }, "product_reference": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-0:3.2.4-1.el7at.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src" }, "product_reference": "ansible-tower-0:3.2.4-1.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "dbus-api-service-0:1.0.1-3.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src" }, "product_reference": "dbus-api-service-0:1.0.1-3.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64" }, "product_reference": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src" }, "product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64" }, "product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-0:9.6.6-1PGDG.el7.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src" }, "product_reference": "postgresql96-0:9.6.6-1PGDG.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Graham Mainwaring" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1101", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1563492" } ], "notes": [ { "category": "description", "text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1101" }, { "category": "external", "summary": "RHBZ#1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges" }, { "acknowledgments": [ { "names": [ "Simon Vikstr\u00f6m" ] } ], "cve": "CVE-2018-1104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1565862" } ], "notes": [ { "category": "description", "text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Remote code execution by users with access to define variables in job templates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1104" }, { "category": "external", "summary": "RHBZ#1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Remote code execution by users with access to define variables in job templates" }, { "cve": "CVE-2018-7750", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1557130" } ], "notes": [ { "category": "description", "text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-paramiko: Authentication bypass in transport.py", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7750" }, { "category": "external", "summary": "RHBZ#1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750" } ], "release_date": "2018-03-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-paramiko: Authentication bypass in transport.py" } ] }
rhsa-2018_1328
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for CloudForms Management Engine 5.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\nRed Hat would like to thank Graham Mainwaring of Red Hat for reporting CVE-2018-1101.\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1328", "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1495849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495849" }, { "category": "external", "summary": "1510499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510499" }, { "category": "external", "summary": "1526086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526086" }, { "category": "external", "summary": "1526088", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526088" }, { "category": "external", "summary": "1530680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530680" }, { "category": "external", "summary": "1530760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530760" }, { "category": "external", "summary": "1533220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533220" }, { "category": "external", "summary": "1533233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533233" }, { "category": "external", "summary": "1533515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533515" }, { "category": "external", "summary": "1538094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538094" }, { "category": "external", "summary": "1538100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538100" }, { "category": "external", "summary": "1549625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549625" }, { "category": "external", "summary": "1549722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549722" }, { "category": "external", "summary": "1550728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550728" }, { "category": "external", "summary": "1550730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550730" }, { "category": "external", "summary": "1550736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550736" }, { "category": "external", "summary": "1551692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551692" }, { "category": "external", "summary": "1551696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551696" }, { "category": "external", "summary": "1551698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551698" }, { "category": "external", "summary": "1551703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551703" }, { "category": "external", "summary": "1552266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552266" }, { "category": "external", "summary": "1552269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552269" }, { "category": "external", "summary": "1552278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552278" }, { "category": "external", "summary": "1552282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552282" }, { "category": "external", "summary": "1552288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552288" }, { "category": "external", "summary": "1552290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552290" }, { "category": "external", "summary": "1552301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552301" }, { "category": "external", "summary": "1552303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552303" }, { "category": "external", "summary": "1552305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552305" }, { "category": "external", "summary": "1552323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552323" }, { "category": "external", "summary": "1552334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552334" }, { "category": "external", "summary": "1552335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552335" }, { "category": "external", "summary": "1552671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552671" }, { "category": "external", "summary": "1552673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552673" }, { "category": "external", "summary": "1552677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552677" }, { "category": "external", "summary": "1552704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552704" }, { "category": "external", "summary": "1552707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552707" }, { "category": "external", "summary": "1552723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552723" }, { "category": "external", "summary": "1552735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552735" }, { "category": "external", "summary": "1552737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552737" }, { "category": "external", "summary": "1552739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552739" }, { "category": "external", "summary": "1552740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552740" }, { "category": "external", "summary": "1552741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552741" }, { "category": "external", "summary": "1552743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552743" }, { "category": "external", "summary": "1552746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552746" }, { "category": "external", "summary": "1552748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552748" }, { "category": "external", "summary": "1552753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552753" }, { "category": "external", "summary": "1552762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552762" }, { "category": "external", "summary": "1552763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552763" }, { "category": "external", "summary": "1552776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552776" }, { "category": "external", "summary": "1552782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552782" }, { "category": "external", "summary": "1552783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552783" }, { "category": "external", "summary": "1552785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552785" }, { "category": "external", "summary": "1552790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552790" }, { "category": "external", "summary": "1552791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552791" }, { "category": "external", "summary": "1552792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552792" }, { "category": "external", "summary": "1552794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552794" }, { "category": "external", "summary": "1552796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552796" }, { "category": "external", "summary": "1552798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552798" }, { "category": "external", "summary": "1552800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552800" }, { "category": "external", "summary": "1552801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552801" }, { "category": "external", "summary": "1552802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552802" }, { "category": "external", "summary": "1552804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552804" }, { "category": "external", "summary": "1552809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552809" }, { "category": "external", "summary": "1552817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552817" }, { "category": "external", "summary": "1552824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552824" }, { "category": "external", "summary": "1552826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552826" }, { "category": "external", "summary": "1552828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552828" }, { "category": "external", "summary": "1552838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552838" }, { "category": "external", "summary": "1552842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552842" }, { "category": "external", "summary": "1552873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552873" }, { "category": "external", "summary": "1552879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552879" }, { "category": "external", "summary": "1552880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552880" }, { "category": "external", "summary": "1552882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552882" }, { "category": "external", "summary": "1552884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552884" }, { "category": "external", "summary": "1552886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552886" }, { "category": "external", "summary": "1552889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552889" }, { "category": "external", "summary": "1552890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552890" }, { "category": "external", "summary": "1552895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552895" }, { "category": "external", "summary": "1552900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552900" }, { "category": "external", "summary": "1552903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552903" }, { "category": "external", "summary": "1552904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552904" }, { "category": "external", "summary": "1552908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552908" }, { "category": "external", "summary": "1553191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553191" }, { "category": "external", "summary": "1553197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553197" }, { "category": "external", "summary": "1553214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553214" }, { "category": "external", "summary": "1553224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553224" }, { "category": "external", "summary": "1553241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553241" }, { "category": "external", "summary": "1553242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553242" }, { "category": "external", "summary": "1553243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553243" }, { "category": "external", "summary": "1553244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553244" }, { "category": "external", "summary": "1553251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553251" }, { "category": "external", "summary": "1553288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553288" }, { "category": "external", "summary": "1553295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553295" }, { "category": "external", "summary": "1553304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553304" }, { "category": "external", "summary": "1553307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553307" }, { "category": "external", "summary": "1553309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553309" }, { "category": "external", "summary": "1553311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553311" }, { "category": "external", "summary": "1553315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553315" }, { "category": "external", "summary": "1553316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553316" }, { "category": "external", "summary": "1553317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553317" }, { "category": "external", "summary": "1553319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553319" }, { "category": "external", "summary": "1553322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553322" }, { "category": "external", "summary": "1553323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553323" }, { "category": "external", "summary": "1553326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553326" }, { "category": "external", "summary": "1553327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553327" }, { "category": "external", "summary": "1553329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553329" }, { "category": "external", "summary": "1553336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553336" }, { "category": "external", "summary": "1553340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553340" }, { "category": "external", "summary": "1553345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553345" }, { "category": "external", "summary": "1553362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553362" }, { "category": "external", "summary": "1553384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553384" }, { "category": "external", "summary": "1553389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553389" }, { "category": "external", "summary": "1553392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553392" }, { "category": "external", "summary": "1553393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553393" }, { "category": "external", "summary": "1553396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553396" }, { "category": "external", "summary": "1553397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553397" }, { "category": "external", "summary": "1553399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553399" }, { "category": "external", "summary": "1553480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553480" }, { "category": "external", "summary": "1553482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553482" }, { "category": "external", "summary": "1553483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553483" }, { "category": "external", "summary": "1553768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553768" }, { "category": "external", "summary": "1553776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553776" }, { "category": "external", "summary": "1553779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553779" }, { "category": "external", "summary": "1553780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553780" }, { "category": "external", "summary": "1553789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553789" }, { "category": "external", "summary": "1553791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553791" }, { "category": "external", "summary": "1553836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553836" }, { "category": "external", "summary": "1553873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553873" }, { "category": "external", "summary": "1553903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553903" }, { "category": "external", "summary": "1554358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554358" }, { "category": "external", "summary": "1554370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554370" }, { "category": "external", "summary": "1554454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554454" }, { "category": "external", "summary": "1554532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554532" }, { "category": "external", "summary": "1554541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554541" }, { "category": "external", "summary": "1554823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554823" }, { "category": "external", "summary": "1554825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554825" }, { "category": "external", "summary": "1554832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554832" }, { "category": "external", "summary": "1554839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554839" }, { "category": "external", "summary": "1554889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554889" }, { "category": "external", "summary": "1554898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554898" }, { "category": "external", "summary": "1554901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554901" }, { "category": "external", "summary": "1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "1557353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557353" }, { "category": "external", "summary": "1557361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557361" }, { "category": "external", "summary": "1557367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557367" }, { "category": "external", "summary": "1557378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557378" }, { "category": "external", "summary": "1557380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557380" }, { "category": "external", "summary": "1557388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557388" }, { "category": "external", "summary": "1557391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557391" }, { "category": "external", "summary": "1557400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557400" }, { "category": "external", "summary": "1558030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558030" }, { "category": "external", "summary": "1558038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558038" }, { "category": "external", "summary": "1558040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558040" }, { "category": "external", "summary": "1558046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558046" }, { "category": "external", "summary": "1558048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558048" }, { "category": "external", "summary": "1558078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558078" }, { "category": "external", "summary": "1558092", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558092" }, { "category": "external", "summary": "1558142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558142" }, { "category": "external", "summary": "1558144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558144" }, { "category": "external", "summary": "1558544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558544" }, { "category": "external", "summary": "1558594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558594" }, { "category": "external", "summary": "1558610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558610" }, { "category": "external", "summary": "1558621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558621" }, { "category": "external", "summary": "1558626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558626" }, { "category": "external", "summary": "1559475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559475" }, { "category": "external", "summary": "1559479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559479" }, { "category": "external", "summary": "1559483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559483" }, { "category": "external", "summary": "1559543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559543" }, { "category": "external", "summary": "1559544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559544" }, { "category": "external", "summary": "1559550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559550" }, { "category": "external", "summary": "1559552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559552" }, { "category": "external", "summary": "1559609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559609" }, { "category": "external", "summary": "1559624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559624" }, { "category": "external", "summary": "1560004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560004" }, { "category": "external", "summary": "1560096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560096" }, { "category": "external", "summary": "1560098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560098" }, { "category": "external", "summary": "1560100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560100" }, { "category": "external", "summary": "1560104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560104" }, { "category": "external", "summary": "1560692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560692" }, { "category": "external", "summary": "1560699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560699" }, { "category": "external", "summary": "1560703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560703" }, { "category": "external", "summary": "1560708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560708" }, { "category": "external", "summary": "1561076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561076" }, { "category": "external", "summary": "1561079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561079" }, { "category": "external", "summary": "1561085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561085" }, { "category": "external", "summary": "1561091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561091" }, { "category": "external", "summary": "1561096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561096" }, { "category": "external", "summary": "1561107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561107" }, { "category": "external", "summary": "1561216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561216" }, { "category": "external", "summary": "1561218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561218" }, { "category": "external", "summary": "1561222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561222" }, { "category": "external", "summary": "1562075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562075" }, { "category": "external", "summary": "1562235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562235" }, { "category": "external", "summary": "1562772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562772" }, { "category": "external", "summary": "1562777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562777" }, { "category": "external", "summary": "1562779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562779" }, { "category": "external", "summary": "1562780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562780" }, { "category": "external", "summary": "1562782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562782" }, { "category": "external", "summary": "1562785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562785" }, { "category": "external", "summary": "1562788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562788" }, { "category": "external", "summary": "1562791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562791" }, { "category": "external", "summary": "1562797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562797" }, { "category": "external", "summary": "1562800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562800" }, { "category": "external", "summary": "1562803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562803" }, { "category": "external", "summary": "1562811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562811" }, { "category": "external", "summary": "1563268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563268" }, { "category": "external", "summary": "1563351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563351" }, { "category": "external", "summary": "1563358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563358" }, { "category": "external", "summary": "1563359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563359" }, { "category": "external", "summary": "1563361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563361" }, { "category": "external", "summary": "1563363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563363" }, { "category": "external", "summary": "1563364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563364" }, { "category": "external", "summary": "1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "1563731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563731" }, { "category": "external", "summary": "1563740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563740" }, { "category": "external", "summary": "1565139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565139" }, { "category": "external", "summary": "1565140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565140" }, { "category": "external", "summary": "1565142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565142" }, { "category": "external", "summary": "1565147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565147" }, { "category": "external", "summary": "1565148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565148" }, { "category": "external", "summary": "1565151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565151" }, { "category": "external", "summary": "1565156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565156" }, { "category": "external", "summary": "1565160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565160" }, { "category": "external", "summary": "1565167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565167" }, { "category": "external", "summary": "1565232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565232" }, { "category": "external", "summary": "1565677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565677" }, { "category": "external", "summary": "1565686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565686" }, { "category": "external", "summary": "1565756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565756" }, { "category": "external", "summary": "1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "1566255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566255" }, { "category": "external", "summary": "1566526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566526" }, { "category": "external", "summary": "1566529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566529" }, { "category": "external", "summary": "1566530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566530" }, { "category": "external", "summary": "1566541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566541" }, { "category": "external", "summary": "1566557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566557" }, { "category": "external", "summary": "1566562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566562" }, { "category": "external", "summary": "1566563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566563" }, { "category": "external", "summary": "1566568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566568" }, { "category": "external", "summary": "1566572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566572" }, { "category": "external", "summary": "1566577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566577" }, { "category": "external", "summary": "1566658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566658" }, { "category": "external", "summary": "1567278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567278" }, { "category": "external", "summary": "1567962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567962" }, { "category": "external", "summary": "1568023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568023" }, { "category": "external", "summary": "1568091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568091" }, { "category": "external", "summary": "1568156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568156" }, { "category": "external", "summary": "1568158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568158" }, { "category": "external", "summary": "1568162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568162" }, { "category": "external", "summary": "1568467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568467" }, { "category": "external", "summary": "1568473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568473" }, { "category": "external", "summary": "1568550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568550" }, { "category": "external", "summary": "1568559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568559" }, { "category": "external", "summary": "1568602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568602" }, { "category": "external", "summary": "1569099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569099" }, { "category": "external", "summary": "1569103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569103" }, { "category": "external", "summary": "1569113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569113" }, { "category": "external", "summary": "1569177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569177" }, { "category": "external", "summary": "1569236", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569236" }, { "category": "external", "summary": "1569472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569472" }, { "category": "external", "summary": "1569551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569551" }, { "category": "external", "summary": "1570118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570118" }, { "category": "external", "summary": "1570821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570821" }, { "category": "external", "summary": "1570950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570950" }, { "category": "external", "summary": "1570989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570989" }, { "category": "external", "summary": "1571310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571310" }, { "category": "external", "summary": "1571976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571976" }, { "category": "external", "summary": "1571989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571989" }, { "category": "external", "summary": "1572711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572711" }, { "category": "external", "summary": "1572716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572716" }, { "category": "external", "summary": "1572718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572718" }, { "category": "external", "summary": "1573215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573215" }, { "category": "external", "summary": "1573246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573246" }, { "category": "external", "summary": "1573254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573254" }, { "category": "external", "summary": "1573539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573539" }, { "category": "external", "summary": "1573990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573990" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1328.json" } ], "title": "Red Hat Security Advisory: CloudForms 4.6.2 bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-22T11:48:46+00:00", "generator": { "date": "2024-11-22T11:48:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1328", "initial_release_date": "2018-05-07T20:42:50+00:00", "revision_history": [ { "date": "2018-05-07T20:42:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-07T20:42:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:48:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms Management Engine 5.9", "product": { "name": "CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-libs@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-server@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-plpython@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-pltcl@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-plperl@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-devel@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-debuginfo@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-contrib@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-test@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-docs@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product": { "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product_id": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-debuginfo@0.22.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-venv-tower@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-venv-ansible@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-setup@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-server@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-ui@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-common@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-tools@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "postgresql96-0:9.6.6-1PGDG.el7.src", "product": { "name": "postgresql96-0:9.6.6-1PGDG.el7.src", "product_id": "postgresql96-0:9.6.6-1PGDG.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=src" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "dbus-api-service-0:1.0.1-3.el7cf.src", "product": { "name": "dbus-api-service-0:1.0.1-3.el7cf.src", "product_id": "dbus-api-service-0:1.0.1-3.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=src" } } }, { "category": "product_version", "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.src", "product": { "name": "python-paramiko-0:2.1.1-4.el7.src", "product_id": "python-paramiko-0:2.1.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-tower-0:3.2.4-1.el7at.src", "product": { "name": "ansible-tower-0:3.2.4-1.el7at.src", "product_id": "ansible-tower-0:3.2.4-1.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=src" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.src", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.src", "product_id": "ansible-0:2.4.4.0-1.el7ae.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src" } } }, { "category": "product_version", "name": "cfme-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product": { "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product_id": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-doc@0.22.0-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_id": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch" } } }, { "category": "product_version", "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product": { "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product_id": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-doc@2.4.4.0-1.el7ae?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch" }, "product_reference": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-0:3.2.4-1.el7at.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src" }, "product_reference": "ansible-tower-0:3.2.4-1.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "dbus-api-service-0:1.0.1-3.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src" }, "product_reference": "dbus-api-service-0:1.0.1-3.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64" }, "product_reference": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src" }, "product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64" }, "product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-0:9.6.6-1PGDG.el7.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src" }, "product_reference": "postgresql96-0:9.6.6-1PGDG.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Graham Mainwaring" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1101", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1563492" } ], "notes": [ { "category": "description", "text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1101" }, { "category": "external", "summary": "RHBZ#1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges" }, { "acknowledgments": [ { "names": [ "Simon Vikstr\u00f6m" ] } ], "cve": "CVE-2018-1104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1565862" } ], "notes": [ { "category": "description", "text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Remote code execution by users with access to define variables in job templates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1104" }, { "category": "external", "summary": "RHBZ#1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Remote code execution by users with access to define variables in job templates" }, { "cve": "CVE-2018-7750", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1557130" } ], "notes": [ { "category": "description", "text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-paramiko: Authentication bypass in transport.py", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7750" }, { "category": "external", "summary": "RHBZ#1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750" } ], "release_date": "2018-03-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-paramiko: Authentication bypass in transport.py" } ] }
rhsa-2018_1972
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for CloudForms Management Engine 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104. The CVE-2018-1101 issue was discovered by Graham Mainwaring (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1972", "url": "https://access.redhat.com/errata/RHSA-2018:1972" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1489507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489507" }, { "category": "external", "summary": "1496902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496902" }, { "category": "external", "summary": "1500951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500951" }, { "category": "external", "summary": "1511030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511030" }, { "category": "external", "summary": "1526156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526156" }, { "category": "external", "summary": "1531499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531499" }, { "category": "external", "summary": "1532272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532272" }, { "category": "external", "summary": "1533082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533082" }, { "category": "external", "summary": "1535369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535369" }, { "category": "external", "summary": "1536684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536684" }, { "category": "external", "summary": "1537132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537132" }, { "category": "external", "summary": "1540579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540579" }, { "category": "external", "summary": "1541341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541341" }, { "category": "external", "summary": "1541427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541427" }, { "category": "external", "summary": "1541700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541700" }, { "category": "external", "summary": "1544488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544488" }, { "category": "external", "summary": "1549626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549626" }, { "category": "external", "summary": "1549723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549723" }, { "category": "external", "summary": "1549833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549833" }, { "category": "external", "summary": "1550116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550116" }, { "category": "external", "summary": "1550276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550276" }, { "category": "external", "summary": "1550715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550715" }, { "category": "external", "summary": "1550729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550729" }, { "category": "external", "summary": "1550732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550732" }, { "category": "external", "summary": "1550737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550737" }, { "category": "external", "summary": "1551627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551627" }, { "category": "external", "summary": "1551693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551693" }, { "category": "external", "summary": "1551697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551697" }, { "category": "external", "summary": "1551699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551699" }, { "category": "external", "summary": "1552135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552135" }, { "category": "external", "summary": "1552233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552233" }, { "category": "external", "summary": "1552780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552780" }, { "category": "external", "summary": "1552891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552891" }, { "category": "external", "summary": "1552905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552905" }, { "category": "external", "summary": "1553225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553225" }, { "category": "external", "summary": "1553249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553249" }, { "category": "external", "summary": "1553308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553308" }, { "category": "external", "summary": "1553331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553331" }, { "category": "external", "summary": "1553337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553337" }, { "category": "external", "summary": "1553364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553364" }, { "category": "external", "summary": "1553465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553465" }, { "category": "external", "summary": "1553473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553473" }, { "category": "external", "summary": "1554533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554533" }, { "category": "external", "summary": "1554543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554543" }, { "category": "external", "summary": "1554900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554900" }, { "category": "external", "summary": "1555487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555487" }, { "category": "external", "summary": "1556814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1556814" }, { "category": "external", "summary": "1557025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557025" }, { "category": "external", "summary": "1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "1558032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558032" }, { "category": "external", "summary": "1558039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558039" }, { "category": "external", "summary": "1558047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558047" }, { "category": "external", "summary": "1558076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558076" }, { "category": "external", "summary": "1558595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558595" }, { "category": "external", "summary": "1558622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558622" }, { "category": "external", "summary": "1559551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559551" }, { "category": "external", "summary": "1559553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559553" }, { "category": "external", "summary": "1560097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560097" }, { "category": "external", "summary": "1560099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560099" }, { "category": "external", "summary": "1560693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560693" }, { "category": "external", "summary": "1561077", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561077" }, { "category": "external", "summary": "1562773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562773" }, { "category": "external", "summary": "1562775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562775" }, { "category": "external", "summary": "1562798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562798" }, { "category": "external", "summary": "1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "1563721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563721" }, { "category": "external", "summary": "1563741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563741" }, { "category": "external", "summary": "1564264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564264" }, { "category": "external", "summary": "1564454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564454" }, { "category": "external", "summary": "1565157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565157" }, { "category": "external", "summary": "1565162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565162" }, { "category": "external", "summary": "1565169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565169" }, { "category": "external", "summary": "1565248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565248" }, { "category": "external", "summary": "1565342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565342" }, { "category": "external", "summary": "1565358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565358" }, { "category": "external", "summary": "1565362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565362" }, { "category": "external", "summary": "1565364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565364" }, { "category": "external", "summary": "1565365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565365" }, { "category": "external", "summary": "1565366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565366" }, { "category": "external", "summary": "1565389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565389" }, { "category": "external", "summary": "1565403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565403" }, { "category": "external", "summary": "1565414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565414" }, { "category": "external", "summary": "1565678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565678" }, { "category": "external", "summary": "1565724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565724" }, { "category": "external", "summary": "1565760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565760" }, { "category": "external", "summary": "1565835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565835" }, { "category": "external", "summary": "1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "1566256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566256" }, { "category": "external", "summary": "1566528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566528" }, { "category": "external", "summary": "1566746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566746" }, { "category": "external", "summary": "1567983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567983" }, { "category": "external", "summary": "1568016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568016" }, { "category": "external", "summary": "1568042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568042" }, { "category": "external", "summary": "1568045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568045" }, { "category": "external", "summary": "1568084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568084" }, { "category": "external", "summary": "1568159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568159" }, { "category": "external", "summary": "1568168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568168" }, { "category": "external", "summary": "1568576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568576" }, { "category": "external", "summary": "1568603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568603" }, { "category": "external", "summary": "1569079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569079" }, { "category": "external", "summary": "1569100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569100" }, { "category": "external", "summary": "1569104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569104" }, { "category": "external", "summary": "1569118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569118" }, { "category": "external", "summary": "1569127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569127" }, { "category": "external", "summary": "1569171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569171" }, { "category": "external", "summary": "1569179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569179" }, { "category": "external", "summary": "1569230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569230" }, { "category": "external", "summary": "1569237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569237" }, { "category": "external", "summary": "1569241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569241" }, { "category": "external", "summary": "1570060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570060" }, { "category": "external", "summary": "1570951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570951" }, { "category": "external", "summary": "1570990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570990" }, { "category": "external", "summary": "1571311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571311" }, { "category": "external", "summary": "1572621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572621" }, { "category": "external", "summary": "1572719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572719" }, { "category": "external", "summary": "1573540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573540" }, { "category": "external", "summary": "1574155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574155" }, { "category": "external", "summary": "1574571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574571" }, { "category": "external", "summary": "1574615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574615" }, { "category": "external", "summary": "1576101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576101" }, { "category": "external", "summary": "1578575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578575" }, { "category": "external", "summary": "1578853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578853" }, { "category": "external", "summary": "1578866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578866" }, { "category": "external", "summary": "1581387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581387" }, { "category": "external", "summary": "1583711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583711" }, { "category": "external", "summary": "1583790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583790" }, { "category": "external", "summary": "1584187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584187" }, { "category": "external", "summary": "1584688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584688" }, { "category": "external", "summary": "1589834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589834" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1972.json" } ], "title": "Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T11:48:52+00:00", "generator": { "date": "2024-11-22T11:48:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1972", "initial_release_date": "2018-06-25T14:17:26+00:00", "revision_history": [ { "date": "2018-06-25T14:17:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-06-25T14:17:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:48:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms Management Engine 5.8", "product": { "name": "CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "product": { "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "product_id": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-server@3.1.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "product": { "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "product_id": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-setup@3.1.7-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-debuginfo@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product": { "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_id": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.8.4.5-1.el7cf?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.src", "product": { "name": "python-paramiko-0:2.1.1-4.el7.src", "product_id": "python-paramiko-0:2.1.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.src", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.src", "product_id": "ansible-0:2.4.4.0-1.el7ae.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src" } } }, { "category": "product_version", "name": "cfme-0:5.8.4.5-1.el7cf.src", "product": { "name": "cfme-0:5.8.4.5-1.el7cf.src", "product_id": "cfme-0:5.8.4.5-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "product": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "product": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_id": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64" }, "product_reference": "ansible-tower-server-0:3.1.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64" }, "product_reference": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src" }, "product_reference": "cfme-0:5.8.4.5-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src" }, "product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src" }, "product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8", "product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.8" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Graham Mainwaring" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1101", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1563492" } ], "notes": [ { "category": "description", "text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1101" }, { "category": "external", "summary": "RHBZ#1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-25T14:17:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1972" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges" }, { "acknowledgments": [ { "names": [ "Simon Vikstr\u00f6m" ] } ], "cve": "CVE-2018-1104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1565862" } ], "notes": [ { "category": "description", "text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Remote code execution by users with access to define variables in job templates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1104" }, { "category": "external", "summary": "RHBZ#1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-25T14:17:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1972" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Remote code execution by users with access to define variables in job templates" }, { "cve": "CVE-2018-7750", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1557130" } ], "notes": [ { "category": "description", "text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-paramiko: Authentication bypass in transport.py", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7750" }, { "category": "external", "summary": "RHBZ#1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750" } ], "release_date": "2018-03-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-25T14:17:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1972" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src", "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-paramiko: Authentication bypass in transport.py" } ] }
cnvd-2018-14411
Vulnerability from cnvd
Title: Ansible Tower存在未明漏洞
Description:
Ansible是美国Ansible公司的一款计算机系统配置管理器,它可用于发布、管理和编排计算机系统。Ansible Tower(又名Ansible UI)是其中的一个提供了用户界面(UI)、仪表板和REST API的任务控制应用程序。
Ansible Tower 3.2.3及之前版本中存在安全漏洞。攻击者可利用该漏洞在Tower服务器上执行任意代码。
Severity: 中
Patch Name: Ansible Tower存在未明漏洞的补丁
Patch Description:
Ansible是美国Ansible公司的一款计算机系统配置管理器,它可用于发布、管理和编排计算机系统。Ansible Tower(又名Ansible UI)是其中的一个提供了用户界面(UI)、仪表板和REST API的任务控制应用程序。
Ansible Tower 3.2.3及之前版本中存在安全漏洞。攻击者可利用该漏洞在Tower服务器上执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.ansible.com/security
Reference: https://access.redhat.com/security/cve/cve-2018-1104
Name | Ansible Ansible Tower <=3.2.3 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-1104", "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1104" } }, "description": "Ansible\u662f\u7f8e\u56fdAnsible\u516c\u53f8\u7684\u4e00\u6b3e\u8ba1\u7b97\u673a\u7cfb\u7edf\u914d\u7f6e\u7ba1\u7406\u5668\uff0c\u5b83\u53ef\u7528\u4e8e\u53d1\u5e03\u3001\u7ba1\u7406\u548c\u7f16\u6392\u8ba1\u7b97\u673a\u7cfb\u7edf\u3002Ansible Tower\uff08\u53c8\u540dAnsible UI\uff09\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u63d0\u4f9b\u4e86\u7528\u6237\u754c\u9762\uff08UI\uff09\u3001\u4eea\u8868\u677f\u548cREST API\u7684\u4efb\u52a1\u63a7\u5236\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nAnsible Tower 3.2.3\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728Tower\u670d\u52a1\u5668\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002", "discovererName": "Sam Fowler", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.ansible.com/security", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-14411", "openTime": "2018-08-01", "patchDescription": "Ansible\u662f\u7f8e\u56fdAnsible\u516c\u53f8\u7684\u4e00\u6b3e\u8ba1\u7b97\u673a\u7cfb\u7edf\u914d\u7f6e\u7ba1\u7406\u5668\uff0c\u5b83\u53ef\u7528\u4e8e\u53d1\u5e03\u3001\u7ba1\u7406\u548c\u7f16\u6392\u8ba1\u7b97\u673a\u7cfb\u7edf\u3002Ansible Tower\uff08\u53c8\u540dAnsible UI\uff09\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u63d0\u4f9b\u4e86\u7528\u6237\u754c\u9762\uff08UI\uff09\u3001\u4eea\u8868\u677f\u548cREST API\u7684\u4efb\u52a1\u63a7\u5236\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nAnsible Tower 3.2.3\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728Tower\u670d\u52a1\u5668\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Ansible Tower\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Ansible Ansible Tower \u003c=3.2.3" }, "referenceLink": "https://access.redhat.com/security/cve/cve-2018-1104", "serverity": "\u4e2d", "submitTime": "2018-05-21", "title": "Ansible Tower\u5b58\u5728\u672a\u660e\u6f0f\u6d1e" }
gsd-2018-1104
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-1104", "description": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.", "id": "GSD-2018-1104", "references": [ "https://access.redhat.com/errata/RHSA-2018:1972", "https://access.redhat.com/errata/RHSA-2018:1328" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-1104" ], "details": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.", "id": "GSD-2018-1104", "modified": "2023-12-13T01:22:36.814050Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2018-04-27T00:00:00", "ID": "CVE-2018-1104", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ansible Tower", "version": { "version_data": [ { "version_value": "through version 3.2.3" } ] } } ] }, "vendor_name": "Red Hat, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ansible.com/security", "refsource": "CONFIRM", "url": "https://www.ansible.com/security" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "name": "RHSA-2018:1972", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1972" }, { "name": "RHSA-2018:1328", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "name": "https://access.redhat.com/security/cve/cve-2018-1104", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2018-1104" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.2.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1104" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-94" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ansible.com/security", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.ansible.com/security" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "name": "https://access.redhat.com/security/cve/cve-2018-1104", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2018-1104" }, { "name": "RHSA-2018:1328", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "name": "RHSA-2018:1972", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1972" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-09T23:38Z", "publishedDate": "2018-05-02T19:29Z" } } }
fkie_cve-2018-1104
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1328 | Vendor Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1972 | Vendor Advisory | |
secalert@redhat.com | https://access.redhat.com/security/cve/cve-2018-1104 | Vendor Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1565862 | Issue Tracking, Vendor Advisory | |
secalert@redhat.com | https://www.ansible.com/security | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1328 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1972 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/cve-2018-1104 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1565862 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ansible.com/security | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
redhat | ansible_tower | * | |
redhat | cloudforms | 4.5 | |
redhat | cloudforms | 4.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "C796B714-EA6E-4DFC-9467-9DC40110E053", "versionEndIncluding": "3.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "32E1BA91-4695-4E64-A9D7-4A6CB6904D41", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "67F7263F-113D-4BAE-B8CB-86A61531A2AC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server." }, { "lang": "es", "value": "Ansible Tower hasta la versi\u00f3n 3.2.3 tiene una vulnerabilidad que permite que usuarios que solo tienen acceso para definir variables para una plantilla de trabajo ejecuten c\u00f3digo arbitrario en el servidor Tower." } ], "id": "CVE-2018-1104", "lastModified": "2024-11-21T03:59:11.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-02T19:29:00.607", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1972" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2018-1104" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://www.ansible.com/security" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2018-1104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ansible.com/security" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.