rhsa-2018:1328
Vulnerability from csaf_redhat
Published
2018-05-07 20:42
Modified
2025-10-09 18:41
Summary
Red Hat Security Advisory: CloudForms 4.6.2 bug fix and enhancement update
Notes
Topic
An update is now available for CloudForms Management Engine 5.9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.
Security Fix(es):
* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)
* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)
Red Hat would like to thank Graham Mainwaring of Red Hat for reporting CVE-2018-1101.
* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)
Red Hat would like to thank Simon Vikström for reporting CVE-2018-1104.
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for CloudForms Management Engine 5.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\nRed Hat would like to thank Graham Mainwaring of Red Hat for reporting CVE-2018-1101.\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1328",
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1495849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495849"
},
{
"category": "external",
"summary": "1510499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510499"
},
{
"category": "external",
"summary": "1526086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526086"
},
{
"category": "external",
"summary": "1526088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526088"
},
{
"category": "external",
"summary": "1530680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530680"
},
{
"category": "external",
"summary": "1530760",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530760"
},
{
"category": "external",
"summary": "1533220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533220"
},
{
"category": "external",
"summary": "1533233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533233"
},
{
"category": "external",
"summary": "1533515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533515"
},
{
"category": "external",
"summary": "1538094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538094"
},
{
"category": "external",
"summary": "1538100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538100"
},
{
"category": "external",
"summary": "1549625",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549625"
},
{
"category": "external",
"summary": "1549722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549722"
},
{
"category": "external",
"summary": "1550728",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550728"
},
{
"category": "external",
"summary": "1550730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550730"
},
{
"category": "external",
"summary": "1550736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550736"
},
{
"category": "external",
"summary": "1551692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551692"
},
{
"category": "external",
"summary": "1551696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551696"
},
{
"category": "external",
"summary": "1551698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551698"
},
{
"category": "external",
"summary": "1551703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551703"
},
{
"category": "external",
"summary": "1552266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552266"
},
{
"category": "external",
"summary": "1552269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552269"
},
{
"category": "external",
"summary": "1552278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552278"
},
{
"category": "external",
"summary": "1552282",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552282"
},
{
"category": "external",
"summary": "1552288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552288"
},
{
"category": "external",
"summary": "1552290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552290"
},
{
"category": "external",
"summary": "1552301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552301"
},
{
"category": "external",
"summary": "1552303",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552303"
},
{
"category": "external",
"summary": "1552305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552305"
},
{
"category": "external",
"summary": "1552323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552323"
},
{
"category": "external",
"summary": "1552334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552334"
},
{
"category": "external",
"summary": "1552335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552335"
},
{
"category": "external",
"summary": "1552671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552671"
},
{
"category": "external",
"summary": "1552673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552673"
},
{
"category": "external",
"summary": "1552677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552677"
},
{
"category": "external",
"summary": "1552704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552704"
},
{
"category": "external",
"summary": "1552707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552707"
},
{
"category": "external",
"summary": "1552723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552723"
},
{
"category": "external",
"summary": "1552735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552735"
},
{
"category": "external",
"summary": "1552737",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552737"
},
{
"category": "external",
"summary": "1552739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552739"
},
{
"category": "external",
"summary": "1552740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552740"
},
{
"category": "external",
"summary": "1552741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552741"
},
{
"category": "external",
"summary": "1552743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552743"
},
{
"category": "external",
"summary": "1552746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552746"
},
{
"category": "external",
"summary": "1552748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552748"
},
{
"category": "external",
"summary": "1552753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552753"
},
{
"category": "external",
"summary": "1552762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552762"
},
{
"category": "external",
"summary": "1552763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552763"
},
{
"category": "external",
"summary": "1552776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552776"
},
{
"category": "external",
"summary": "1552782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552782"
},
{
"category": "external",
"summary": "1552783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552783"
},
{
"category": "external",
"summary": "1552785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552785"
},
{
"category": "external",
"summary": "1552790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552790"
},
{
"category": "external",
"summary": "1552791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552791"
},
{
"category": "external",
"summary": "1552792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552792"
},
{
"category": "external",
"summary": "1552794",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552794"
},
{
"category": "external",
"summary": "1552796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552796"
},
{
"category": "external",
"summary": "1552798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552798"
},
{
"category": "external",
"summary": "1552800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552800"
},
{
"category": "external",
"summary": "1552801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552801"
},
{
"category": "external",
"summary": "1552802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552802"
},
{
"category": "external",
"summary": "1552804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552804"
},
{
"category": "external",
"summary": "1552809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552809"
},
{
"category": "external",
"summary": "1552817",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552817"
},
{
"category": "external",
"summary": "1552824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552824"
},
{
"category": "external",
"summary": "1552826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552826"
},
{
"category": "external",
"summary": "1552828",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552828"
},
{
"category": "external",
"summary": "1552838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552838"
},
{
"category": "external",
"summary": "1552842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552842"
},
{
"category": "external",
"summary": "1552873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552873"
},
{
"category": "external",
"summary": "1552879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552879"
},
{
"category": "external",
"summary": "1552880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552880"
},
{
"category": "external",
"summary": "1552882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552882"
},
{
"category": "external",
"summary": "1552884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552884"
},
{
"category": "external",
"summary": "1552886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552886"
},
{
"category": "external",
"summary": "1552889",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552889"
},
{
"category": "external",
"summary": "1552890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552890"
},
{
"category": "external",
"summary": "1552895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552895"
},
{
"category": "external",
"summary": "1552900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552900"
},
{
"category": "external",
"summary": "1552903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552903"
},
{
"category": "external",
"summary": "1552904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552904"
},
{
"category": "external",
"summary": "1552908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552908"
},
{
"category": "external",
"summary": "1553191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553191"
},
{
"category": "external",
"summary": "1553197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553197"
},
{
"category": "external",
"summary": "1553214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553214"
},
{
"category": "external",
"summary": "1553224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553224"
},
{
"category": "external",
"summary": "1553241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553241"
},
{
"category": "external",
"summary": "1553242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553242"
},
{
"category": "external",
"summary": "1553243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553243"
},
{
"category": "external",
"summary": "1553244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553244"
},
{
"category": "external",
"summary": "1553251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553251"
},
{
"category": "external",
"summary": "1553288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553288"
},
{
"category": "external",
"summary": "1553295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553295"
},
{
"category": "external",
"summary": "1553304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553304"
},
{
"category": "external",
"summary": "1553307",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553307"
},
{
"category": "external",
"summary": "1553309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553309"
},
{
"category": "external",
"summary": "1553311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553311"
},
{
"category": "external",
"summary": "1553315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553315"
},
{
"category": "external",
"summary": "1553316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553316"
},
{
"category": "external",
"summary": "1553317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553317"
},
{
"category": "external",
"summary": "1553319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553319"
},
{
"category": "external",
"summary": "1553322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553322"
},
{
"category": "external",
"summary": "1553323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553323"
},
{
"category": "external",
"summary": "1553326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553326"
},
{
"category": "external",
"summary": "1553327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553327"
},
{
"category": "external",
"summary": "1553329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553329"
},
{
"category": "external",
"summary": "1553336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553336"
},
{
"category": "external",
"summary": "1553340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553340"
},
{
"category": "external",
"summary": "1553345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553345"
},
{
"category": "external",
"summary": "1553362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553362"
},
{
"category": "external",
"summary": "1553384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553384"
},
{
"category": "external",
"summary": "1553389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553389"
},
{
"category": "external",
"summary": "1553392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553392"
},
{
"category": "external",
"summary": "1553393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553393"
},
{
"category": "external",
"summary": "1553396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553396"
},
{
"category": "external",
"summary": "1553397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553397"
},
{
"category": "external",
"summary": "1553399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553399"
},
{
"category": "external",
"summary": "1553480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553480"
},
{
"category": "external",
"summary": "1553482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553482"
},
{
"category": "external",
"summary": "1553483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553483"
},
{
"category": "external",
"summary": "1553768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553768"
},
{
"category": "external",
"summary": "1553776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553776"
},
{
"category": "external",
"summary": "1553779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553779"
},
{
"category": "external",
"summary": "1553780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553780"
},
{
"category": "external",
"summary": "1553789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553789"
},
{
"category": "external",
"summary": "1553791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553791"
},
{
"category": "external",
"summary": "1553836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553836"
},
{
"category": "external",
"summary": "1553873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553873"
},
{
"category": "external",
"summary": "1553903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553903"
},
{
"category": "external",
"summary": "1554358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554358"
},
{
"category": "external",
"summary": "1554370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554370"
},
{
"category": "external",
"summary": "1554454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554454"
},
{
"category": "external",
"summary": "1554532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554532"
},
{
"category": "external",
"summary": "1554541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554541"
},
{
"category": "external",
"summary": "1554823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554823"
},
{
"category": "external",
"summary": "1554825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554825"
},
{
"category": "external",
"summary": "1554832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554832"
},
{
"category": "external",
"summary": "1554839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554839"
},
{
"category": "external",
"summary": "1554889",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554889"
},
{
"category": "external",
"summary": "1554898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554898"
},
{
"category": "external",
"summary": "1554901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554901"
},
{
"category": "external",
"summary": "1557130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
},
{
"category": "external",
"summary": "1557353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557353"
},
{
"category": "external",
"summary": "1557361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557361"
},
{
"category": "external",
"summary": "1557367",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557367"
},
{
"category": "external",
"summary": "1557378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557378"
},
{
"category": "external",
"summary": "1557380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557380"
},
{
"category": "external",
"summary": "1557388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557388"
},
{
"category": "external",
"summary": "1557391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557391"
},
{
"category": "external",
"summary": "1557400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557400"
},
{
"category": "external",
"summary": "1558030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558030"
},
{
"category": "external",
"summary": "1558038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558038"
},
{
"category": "external",
"summary": "1558040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558040"
},
{
"category": "external",
"summary": "1558046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558046"
},
{
"category": "external",
"summary": "1558048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558048"
},
{
"category": "external",
"summary": "1558078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558078"
},
{
"category": "external",
"summary": "1558092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558092"
},
{
"category": "external",
"summary": "1558142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558142"
},
{
"category": "external",
"summary": "1558144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558144"
},
{
"category": "external",
"summary": "1558544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558544"
},
{
"category": "external",
"summary": "1558594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558594"
},
{
"category": "external",
"summary": "1558610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558610"
},
{
"category": "external",
"summary": "1558621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558621"
},
{
"category": "external",
"summary": "1558626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558626"
},
{
"category": "external",
"summary": "1559475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559475"
},
{
"category": "external",
"summary": "1559479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559479"
},
{
"category": "external",
"summary": "1559483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559483"
},
{
"category": "external",
"summary": "1559543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559543"
},
{
"category": "external",
"summary": "1559544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559544"
},
{
"category": "external",
"summary": "1559550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559550"
},
{
"category": "external",
"summary": "1559552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559552"
},
{
"category": "external",
"summary": "1559609",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559609"
},
{
"category": "external",
"summary": "1559624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559624"
},
{
"category": "external",
"summary": "1560004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560004"
},
{
"category": "external",
"summary": "1560096",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560096"
},
{
"category": "external",
"summary": "1560098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560098"
},
{
"category": "external",
"summary": "1560100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560100"
},
{
"category": "external",
"summary": "1560104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560104"
},
{
"category": "external",
"summary": "1560692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560692"
},
{
"category": "external",
"summary": "1560699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560699"
},
{
"category": "external",
"summary": "1560703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560703"
},
{
"category": "external",
"summary": "1560708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560708"
},
{
"category": "external",
"summary": "1561076",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561076"
},
{
"category": "external",
"summary": "1561079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561079"
},
{
"category": "external",
"summary": "1561085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561085"
},
{
"category": "external",
"summary": "1561091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561091"
},
{
"category": "external",
"summary": "1561096",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561096"
},
{
"category": "external",
"summary": "1561107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561107"
},
{
"category": "external",
"summary": "1561216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561216"
},
{
"category": "external",
"summary": "1561218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561218"
},
{
"category": "external",
"summary": "1561222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561222"
},
{
"category": "external",
"summary": "1562075",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562075"
},
{
"category": "external",
"summary": "1562235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562235"
},
{
"category": "external",
"summary": "1562772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562772"
},
{
"category": "external",
"summary": "1562777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562777"
},
{
"category": "external",
"summary": "1562779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562779"
},
{
"category": "external",
"summary": "1562780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562780"
},
{
"category": "external",
"summary": "1562782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562782"
},
{
"category": "external",
"summary": "1562785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562785"
},
{
"category": "external",
"summary": "1562788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562788"
},
{
"category": "external",
"summary": "1562791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562791"
},
{
"category": "external",
"summary": "1562797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562797"
},
{
"category": "external",
"summary": "1562800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562800"
},
{
"category": "external",
"summary": "1562803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562803"
},
{
"category": "external",
"summary": "1562811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562811"
},
{
"category": "external",
"summary": "1563268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563268"
},
{
"category": "external",
"summary": "1563351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563351"
},
{
"category": "external",
"summary": "1563358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563358"
},
{
"category": "external",
"summary": "1563359",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563359"
},
{
"category": "external",
"summary": "1563361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563361"
},
{
"category": "external",
"summary": "1563363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563363"
},
{
"category": "external",
"summary": "1563364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563364"
},
{
"category": "external",
"summary": "1563492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
},
{
"category": "external",
"summary": "1563731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563731"
},
{
"category": "external",
"summary": "1563740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563740"
},
{
"category": "external",
"summary": "1565139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565139"
},
{
"category": "external",
"summary": "1565140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565140"
},
{
"category": "external",
"summary": "1565142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565142"
},
{
"category": "external",
"summary": "1565147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565147"
},
{
"category": "external",
"summary": "1565148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565148"
},
{
"category": "external",
"summary": "1565151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565151"
},
{
"category": "external",
"summary": "1565156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565156"
},
{
"category": "external",
"summary": "1565160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565160"
},
{
"category": "external",
"summary": "1565167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565167"
},
{
"category": "external",
"summary": "1565232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565232"
},
{
"category": "external",
"summary": "1565677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565677"
},
{
"category": "external",
"summary": "1565686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565686"
},
{
"category": "external",
"summary": "1565756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565756"
},
{
"category": "external",
"summary": "1565862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"category": "external",
"summary": "1566255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566255"
},
{
"category": "external",
"summary": "1566526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566526"
},
{
"category": "external",
"summary": "1566529",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566529"
},
{
"category": "external",
"summary": "1566530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566530"
},
{
"category": "external",
"summary": "1566541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566541"
},
{
"category": "external",
"summary": "1566557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566557"
},
{
"category": "external",
"summary": "1566562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566562"
},
{
"category": "external",
"summary": "1566563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566563"
},
{
"category": "external",
"summary": "1566568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566568"
},
{
"category": "external",
"summary": "1566572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566572"
},
{
"category": "external",
"summary": "1566577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566577"
},
{
"category": "external",
"summary": "1566658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566658"
},
{
"category": "external",
"summary": "1567278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567278"
},
{
"category": "external",
"summary": "1567962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567962"
},
{
"category": "external",
"summary": "1568023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568023"
},
{
"category": "external",
"summary": "1568091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568091"
},
{
"category": "external",
"summary": "1568156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568156"
},
{
"category": "external",
"summary": "1568158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568158"
},
{
"category": "external",
"summary": "1568162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568162"
},
{
"category": "external",
"summary": "1568467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568467"
},
{
"category": "external",
"summary": "1568473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568473"
},
{
"category": "external",
"summary": "1568550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568550"
},
{
"category": "external",
"summary": "1568559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568559"
},
{
"category": "external",
"summary": "1568602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568602"
},
{
"category": "external",
"summary": "1569099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569099"
},
{
"category": "external",
"summary": "1569103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569103"
},
{
"category": "external",
"summary": "1569113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569113"
},
{
"category": "external",
"summary": "1569177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569177"
},
{
"category": "external",
"summary": "1569236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569236"
},
{
"category": "external",
"summary": "1569472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569472"
},
{
"category": "external",
"summary": "1569551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569551"
},
{
"category": "external",
"summary": "1570118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570118"
},
{
"category": "external",
"summary": "1570821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570821"
},
{
"category": "external",
"summary": "1570950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570950"
},
{
"category": "external",
"summary": "1570989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570989"
},
{
"category": "external",
"summary": "1571310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571310"
},
{
"category": "external",
"summary": "1571976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571976"
},
{
"category": "external",
"summary": "1571989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571989"
},
{
"category": "external",
"summary": "1572711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572711"
},
{
"category": "external",
"summary": "1572716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572716"
},
{
"category": "external",
"summary": "1572718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572718"
},
{
"category": "external",
"summary": "1573215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573215"
},
{
"category": "external",
"summary": "1573246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573246"
},
{
"category": "external",
"summary": "1573254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573254"
},
{
"category": "external",
"summary": "1573539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573539"
},
{
"category": "external",
"summary": "1573990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573990"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1328.json"
}
],
"title": "Red Hat Security Advisory: CloudForms 4.6.2 bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-10-09T18:41:26+00:00",
"generator": {
"date": "2025-10-09T18:41:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2018:1328",
"initial_release_date": "2018-05-07T20:42:50+00:00",
"revision_history": [
{
"date": "2018-05-07T20:42:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-07T20:42:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:41:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CloudForms Management Engine 5.9",
"product": {
"name": "CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat CloudForms"
},
{
"branches": [
{
"category": "product_version",
"name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-libs@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-server@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-plpython@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-pltcl@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-plperl@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-devel@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-debuginfo@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-contrib@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-test@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-docs@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"product": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"product_id": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"product": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-debuginfo@0.22.0-2.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-venv-tower@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-venv-ansible@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-setup@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-server@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-ui@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-debuginfo@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance-common@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance-tools@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset-debuginfo@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "postgresql96-0:9.6.6-1PGDG.el7.src",
"product": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.src",
"product_id": "postgresql96-0:9.6.6-1PGDG.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "dbus-api-service-0:1.0.1-3.el7cf.src",
"product": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.src",
"product_id": "dbus-api-service-0:1.0.1-3.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"product": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-0:2.1.1-4.el7.src",
"product": {
"name": "python-paramiko-0:2.1.1-4.el7.src",
"product_id": "python-paramiko-0:2.1.1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-0:3.2.4-1.el7at.src",
"product": {
"name": "ansible-tower-0:3.2.4-1.el7at.src",
"product_id": "ansible-tower-0:3.2.4-1.el7at.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-0:2.4.4.0-1.el7ae.src",
"product": {
"name": "ansible-0:2.4.4.0-1.el7ae.src",
"product_id": "ansible-0:2.4.4.0-1.el7ae.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"product_id": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-doc@0.22.0-2.el7cf?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product": {
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-0:2.1.1-4.el7.noarch",
"product": {
"name": "python-paramiko-0:2.1.1-4.el7.noarch",
"product_id": "python-paramiko-0:2.1.1-4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product": {
"name": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product_id": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"product": {
"name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"product_id": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-doc@2.4.4.0-1.el7ae?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch"
},
"product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src"
},
"product_reference": "ansible-0:2.4.4.0-1.el7ae.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch"
},
"product_reference": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-0:3.2.4-1.el7at.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src"
},
"product_reference": "ansible-tower-0:3.2.4-1.el7at.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src"
},
"product_reference": "dbus-api-service-0:1.0.1-3.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64"
},
"product_reference": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src"
},
"product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64"
},
"product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src"
},
"product_reference": "postgresql96-0:9.6.6-1PGDG.el7.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch"
},
"product_reference": "python-paramiko-0:2.1.1-4.el7.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src"
},
"product_reference": "python-paramiko-0:2.1.1-4.el7.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch"
},
"product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src"
},
"product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Graham Mainwaring"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2018-1101",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1563492"
}
],
"notes": [
{
"category": "description",
"text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1101"
},
{
"category": "external",
"summary": "RHBZ#1563492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101"
}
],
"release_date": "2018-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-07T20:42:50+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges"
},
{
"acknowledgments": [
{
"names": [
"Simon Vikstr\u00f6m"
]
}
],
"cve": "CVE-2018-1104",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565862"
}
],
"notes": [
{
"category": "description",
"text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible-tower: Remote code execution by users with access to define variables in job templates",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1104"
},
{
"category": "external",
"summary": "RHBZ#1565862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104"
}
],
"release_date": "2018-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-07T20:42:50+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ansible-tower: Remote code execution by users with access to define variables in job templates"
},
{
"cve": "CVE-2018-7750",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2018-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1557130"
}
],
"notes": [
{
"category": "description",
"text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-paramiko: Authentication bypass in transport.py",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7750"
},
{
"category": "external",
"summary": "RHBZ#1557130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750"
}
],
"release_date": "2018-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-07T20:42:50+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python-paramiko: Authentication bypass in transport.py"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…