Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-1104 (GCVE-0-2018-1104)
Vulnerability from cvelistv5 – Published: 2018-05-02 19:00 – Updated: 2024-09-16 19:09| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Red Hat, Inc. | Ansible Tower |
Affected:
through version 3.2.3
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:51:48.555Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.ansible.com/security"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"name": "RHSA-2018:1972",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
},
{
"name": "RHSA-2018:1328",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/cve-2018-1104"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Ansible Tower",
"vendor": "Red Hat, Inc.",
"versions": [
{
"status": "affected",
"version": "through version 3.2.3"
}
]
}
],
"datePublic": "2018-04-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-06-26T09:57:02.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.ansible.com/security"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"name": "RHSA-2018:1972",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
},
{
"name": "RHSA-2018:1328",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://access.redhat.com/security/cve/cve-2018-1104"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"DATE_PUBLIC": "2018-04-27T00:00:00",
"ID": "CVE-2018-1104",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Ansible Tower",
"version": {
"version_data": [
{
"version_value": "through version 3.2.3"
}
]
}
}
]
},
"vendor_name": "Red Hat, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.ansible.com/security",
"refsource": "CONFIRM",
"url": "https://www.ansible.com/security"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"name": "RHSA-2018:1972",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
},
{
"name": "RHSA-2018:1328",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
},
{
"name": "https://access.redhat.com/security/cve/cve-2018-1104",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/cve-2018-1104"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2018-1104",
"datePublished": "2018-05-02T19:00:00.000Z",
"dateReserved": "2017-12-04T00:00:00.000Z",
"dateUpdated": "2024-09-16T19:09:02.633Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.2.3\", \"matchCriteriaId\": \"C796B714-EA6E-4DFC-9467-9DC40110E053\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32E1BA91-4695-4E64-A9D7-4A6CB6904D41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67F7263F-113D-4BAE-B8CB-86A61531A2AC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.\"}, {\"lang\": \"es\", \"value\": \"Ansible Tower hasta la versi\\u00f3n 3.2.3 tiene una vulnerabilidad que permite que usuarios que solo tienen acceso para definir variables para una plantilla de trabajo ejecuten c\\u00f3digo arbitrario en el servidor Tower.\"}]",
"id": "CVE-2018-1104",
"lastModified": "2024-11-21T03:59:11.410",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-05-02T19:29:00.607",
"references": "[{\"url\": \"https://access.redhat.com/errata/RHSA-2018:1328\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1972\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/security/cve/cve-2018-1104\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1565862\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ansible.com/security\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1328\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1972\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/security/cve/cve-2018-1104\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1565862\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ansible.com/security\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-1104\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-05-02T19:29:00.607\",\"lastModified\":\"2024-11-21T03:59:11.410\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.\"},{\"lang\":\"es\",\"value\":\"Ansible Tower hasta la versi\u00f3n 3.2.3 tiene una vulnerabilidad que permite que usuarios que solo tienen acceso para definir variables para una plantilla de trabajo ejecuten c\u00f3digo arbitrario en el servidor Tower.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.3\",\"matchCriteriaId\":\"C796B714-EA6E-4DFC-9467-9DC40110E053\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E1BA91-4695-4E64-A9D7-4A6CB6904D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F7263F-113D-4BAE-B8CB-86A61531A2AC\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1328\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1972\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2018-1104\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1565862\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://www.ansible.com/security\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1972\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2018-1104\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1565862\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://www.ansible.com/security\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
RHSA-2018:1972
Vulnerability from csaf_redhat - Published: 2018-06-25 14:17 - Updated: 2025-11-21 18:05Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.
Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.
It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for CloudForms Management Engine 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104. The CVE-2018-1101 issue was discovered by Graham Mainwaring (Red Hat).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1972",
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1489507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489507"
},
{
"category": "external",
"summary": "1496902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496902"
},
{
"category": "external",
"summary": "1500951",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500951"
},
{
"category": "external",
"summary": "1511030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511030"
},
{
"category": "external",
"summary": "1526156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526156"
},
{
"category": "external",
"summary": "1531499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531499"
},
{
"category": "external",
"summary": "1532272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532272"
},
{
"category": "external",
"summary": "1533082",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533082"
},
{
"category": "external",
"summary": "1535369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535369"
},
{
"category": "external",
"summary": "1536684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536684"
},
{
"category": "external",
"summary": "1537132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537132"
},
{
"category": "external",
"summary": "1540579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540579"
},
{
"category": "external",
"summary": "1541341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541341"
},
{
"category": "external",
"summary": "1541427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541427"
},
{
"category": "external",
"summary": "1541700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541700"
},
{
"category": "external",
"summary": "1544488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544488"
},
{
"category": "external",
"summary": "1549626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549626"
},
{
"category": "external",
"summary": "1549723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549723"
},
{
"category": "external",
"summary": "1549833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549833"
},
{
"category": "external",
"summary": "1550116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550116"
},
{
"category": "external",
"summary": "1550276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550276"
},
{
"category": "external",
"summary": "1550715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550715"
},
{
"category": "external",
"summary": "1550729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550729"
},
{
"category": "external",
"summary": "1550732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550732"
},
{
"category": "external",
"summary": "1550737",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550737"
},
{
"category": "external",
"summary": "1551627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551627"
},
{
"category": "external",
"summary": "1551693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551693"
},
{
"category": "external",
"summary": "1551697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551697"
},
{
"category": "external",
"summary": "1551699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551699"
},
{
"category": "external",
"summary": "1552135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552135"
},
{
"category": "external",
"summary": "1552233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552233"
},
{
"category": "external",
"summary": "1552780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552780"
},
{
"category": "external",
"summary": "1552891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552891"
},
{
"category": "external",
"summary": "1552905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552905"
},
{
"category": "external",
"summary": "1553225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553225"
},
{
"category": "external",
"summary": "1553249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553249"
},
{
"category": "external",
"summary": "1553308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553308"
},
{
"category": "external",
"summary": "1553331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553331"
},
{
"category": "external",
"summary": "1553337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553337"
},
{
"category": "external",
"summary": "1553364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553364"
},
{
"category": "external",
"summary": "1553465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553465"
},
{
"category": "external",
"summary": "1553473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553473"
},
{
"category": "external",
"summary": "1554533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554533"
},
{
"category": "external",
"summary": "1554543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554543"
},
{
"category": "external",
"summary": "1554900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554900"
},
{
"category": "external",
"summary": "1555487",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555487"
},
{
"category": "external",
"summary": "1556814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1556814"
},
{
"category": "external",
"summary": "1557025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557025"
},
{
"category": "external",
"summary": "1557130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
},
{
"category": "external",
"summary": "1558032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558032"
},
{
"category": "external",
"summary": "1558039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558039"
},
{
"category": "external",
"summary": "1558047",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558047"
},
{
"category": "external",
"summary": "1558076",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558076"
},
{
"category": "external",
"summary": "1558595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558595"
},
{
"category": "external",
"summary": "1558622",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558622"
},
{
"category": "external",
"summary": "1559551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559551"
},
{
"category": "external",
"summary": "1559553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559553"
},
{
"category": "external",
"summary": "1560097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560097"
},
{
"category": "external",
"summary": "1560099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560099"
},
{
"category": "external",
"summary": "1560693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560693"
},
{
"category": "external",
"summary": "1561077",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561077"
},
{
"category": "external",
"summary": "1562773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562773"
},
{
"category": "external",
"summary": "1562775",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562775"
},
{
"category": "external",
"summary": "1562798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562798"
},
{
"category": "external",
"summary": "1563492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
},
{
"category": "external",
"summary": "1563721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563721"
},
{
"category": "external",
"summary": "1563741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563741"
},
{
"category": "external",
"summary": "1564264",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564264"
},
{
"category": "external",
"summary": "1564454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564454"
},
{
"category": "external",
"summary": "1565157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565157"
},
{
"category": "external",
"summary": "1565162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565162"
},
{
"category": "external",
"summary": "1565169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565169"
},
{
"category": "external",
"summary": "1565248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565248"
},
{
"category": "external",
"summary": "1565342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565342"
},
{
"category": "external",
"summary": "1565358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565358"
},
{
"category": "external",
"summary": "1565362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565362"
},
{
"category": "external",
"summary": "1565364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565364"
},
{
"category": "external",
"summary": "1565365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565365"
},
{
"category": "external",
"summary": "1565366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565366"
},
{
"category": "external",
"summary": "1565389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565389"
},
{
"category": "external",
"summary": "1565403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565403"
},
{
"category": "external",
"summary": "1565414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565414"
},
{
"category": "external",
"summary": "1565678",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565678"
},
{
"category": "external",
"summary": "1565724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565724"
},
{
"category": "external",
"summary": "1565760",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565760"
},
{
"category": "external",
"summary": "1565835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565835"
},
{
"category": "external",
"summary": "1565862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"category": "external",
"summary": "1566256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566256"
},
{
"category": "external",
"summary": "1566528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566528"
},
{
"category": "external",
"summary": "1566746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566746"
},
{
"category": "external",
"summary": "1567983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567983"
},
{
"category": "external",
"summary": "1568016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568016"
},
{
"category": "external",
"summary": "1568042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568042"
},
{
"category": "external",
"summary": "1568045",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568045"
},
{
"category": "external",
"summary": "1568084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568084"
},
{
"category": "external",
"summary": "1568159",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568159"
},
{
"category": "external",
"summary": "1568168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568168"
},
{
"category": "external",
"summary": "1568576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568576"
},
{
"category": "external",
"summary": "1568603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568603"
},
{
"category": "external",
"summary": "1569079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569079"
},
{
"category": "external",
"summary": "1569100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569100"
},
{
"category": "external",
"summary": "1569104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569104"
},
{
"category": "external",
"summary": "1569118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569118"
},
{
"category": "external",
"summary": "1569127",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569127"
},
{
"category": "external",
"summary": "1569171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569171"
},
{
"category": "external",
"summary": "1569179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569179"
},
{
"category": "external",
"summary": "1569230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569230"
},
{
"category": "external",
"summary": "1569237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569237"
},
{
"category": "external",
"summary": "1569241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569241"
},
{
"category": "external",
"summary": "1570060",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570060"
},
{
"category": "external",
"summary": "1570951",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570951"
},
{
"category": "external",
"summary": "1570990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570990"
},
{
"category": "external",
"summary": "1571311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571311"
},
{
"category": "external",
"summary": "1572621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572621"
},
{
"category": "external",
"summary": "1572719",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572719"
},
{
"category": "external",
"summary": "1573540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573540"
},
{
"category": "external",
"summary": "1574155",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574155"
},
{
"category": "external",
"summary": "1574571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574571"
},
{
"category": "external",
"summary": "1574615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574615"
},
{
"category": "external",
"summary": "1576101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576101"
},
{
"category": "external",
"summary": "1578575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578575"
},
{
"category": "external",
"summary": "1578853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578853"
},
{
"category": "external",
"summary": "1578866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578866"
},
{
"category": "external",
"summary": "1581387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581387"
},
{
"category": "external",
"summary": "1583711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583711"
},
{
"category": "external",
"summary": "1583790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583790"
},
{
"category": "external",
"summary": "1584187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584187"
},
{
"category": "external",
"summary": "1584688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584688"
},
{
"category": "external",
"summary": "1589834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589834"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1972.json"
}
],
"title": "Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:05:16+00:00",
"generator": {
"date": "2025-11-21T18:05:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1972",
"initial_release_date": "2018-06-25T14:17:26+00:00",
"revision_history": [
{
"date": "2018-06-25T14:17:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-25T14:17:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CloudForms Management Engine 5.8",
"product": {
"name": "CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat CloudForms"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"product": {
"name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"product_id": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-server@3.1.7-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"product": {
"name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"product_id": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-setup@3.1.7-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.8.4.5-1.el7cf.x86_64",
"product": {
"name": "cfme-0:5.8.4.5-1.el7cf.x86_64",
"product_id": "cfme-0:5.8.4.5-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product": {
"name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product_id": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-debuginfo@5.8.4.5-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"product": {
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product_id": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.8.4.5-1.el7cf?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-0:2.1.1-4.el7.src",
"product": {
"name": "python-paramiko-0:2.1.1-4.el7.src",
"product_id": "python-paramiko-0:2.1.1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-0:2.4.4.0-1.el7ae.src",
"product": {
"name": "ansible-0:2.4.4.0-1.el7ae.src",
"product_id": "ansible-0:2.4.4.0-1.el7ae.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.8.4.5-1.el7cf.src",
"product": {
"name": "cfme-0:5.8.4.5-1.el7cf.src",
"product_id": "cfme-0:5.8.4.5-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
"product": {
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
"product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
"product": {
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
"product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product": {
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-0:2.1.1-4.el7.noarch",
"product": {
"name": "python-paramiko-0:2.1.1-4.el7.noarch",
"product_id": "python-paramiko-0:2.1.1-4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product": {
"name": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product_id": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch"
},
"product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src"
},
"product_reference": "ansible-0:2.4.4.0-1.el7ae.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64"
},
"product_reference": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64"
},
"product_reference": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src"
},
"product_reference": "cfme-0:5.8.4.5-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64"
},
"product_reference": "cfme-0:5.8.4.5-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src"
},
"product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64"
},
"product_reference": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src"
},
"product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64"
},
"product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch"
},
"product_reference": "python-paramiko-0:2.1.1-4.el7.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src"
},
"product_reference": "python-paramiko-0:2.1.1-4.el7.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch"
},
"product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src"
},
"product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Graham Mainwaring"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2018-1101",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1563492"
}
],
"notes": [
{
"category": "description",
"text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1101"
},
{
"category": "external",
"summary": "RHBZ#1563492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101"
}
],
"release_date": "2018-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-25T14:17:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges"
},
{
"acknowledgments": [
{
"names": [
"Simon Vikstr\u00f6m"
]
}
],
"cve": "CVE-2018-1104",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565862"
}
],
"notes": [
{
"category": "description",
"text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible-tower: Remote code execution by users with access to define variables in job templates",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1104"
},
{
"category": "external",
"summary": "RHBZ#1565862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104"
}
],
"release_date": "2018-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-25T14:17:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ansible-tower: Remote code execution by users with access to define variables in job templates"
},
{
"cve": "CVE-2018-7750",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2018-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1557130"
}
],
"notes": [
{
"category": "description",
"text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-paramiko: Authentication bypass in transport.py",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7750"
},
{
"category": "external",
"summary": "RHBZ#1557130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750"
}
],
"release_date": "2018-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-25T14:17:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python-paramiko: Authentication bypass in transport.py"
}
]
}
RHSA-2018:1328
Vulnerability from csaf_redhat - Published: 2018-05-07 20:42 - Updated: 2025-11-21 18:04Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.
Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.
It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for CloudForms Management Engine 5.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\nRed Hat would like to thank Graham Mainwaring of Red Hat for reporting CVE-2018-1101.\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1328",
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1495849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495849"
},
{
"category": "external",
"summary": "1510499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510499"
},
{
"category": "external",
"summary": "1526086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526086"
},
{
"category": "external",
"summary": "1526088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526088"
},
{
"category": "external",
"summary": "1530680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530680"
},
{
"category": "external",
"summary": "1530760",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530760"
},
{
"category": "external",
"summary": "1533220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533220"
},
{
"category": "external",
"summary": "1533233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533233"
},
{
"category": "external",
"summary": "1533515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533515"
},
{
"category": "external",
"summary": "1538094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538094"
},
{
"category": "external",
"summary": "1538100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538100"
},
{
"category": "external",
"summary": "1549625",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549625"
},
{
"category": "external",
"summary": "1549722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549722"
},
{
"category": "external",
"summary": "1550728",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550728"
},
{
"category": "external",
"summary": "1550730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550730"
},
{
"category": "external",
"summary": "1550736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550736"
},
{
"category": "external",
"summary": "1551692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551692"
},
{
"category": "external",
"summary": "1551696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551696"
},
{
"category": "external",
"summary": "1551698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551698"
},
{
"category": "external",
"summary": "1551703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551703"
},
{
"category": "external",
"summary": "1552266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552266"
},
{
"category": "external",
"summary": "1552269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552269"
},
{
"category": "external",
"summary": "1552278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552278"
},
{
"category": "external",
"summary": "1552282",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552282"
},
{
"category": "external",
"summary": "1552288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552288"
},
{
"category": "external",
"summary": "1552290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552290"
},
{
"category": "external",
"summary": "1552301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552301"
},
{
"category": "external",
"summary": "1552303",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552303"
},
{
"category": "external",
"summary": "1552305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552305"
},
{
"category": "external",
"summary": "1552323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552323"
},
{
"category": "external",
"summary": "1552334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552334"
},
{
"category": "external",
"summary": "1552335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552335"
},
{
"category": "external",
"summary": "1552671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552671"
},
{
"category": "external",
"summary": "1552673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552673"
},
{
"category": "external",
"summary": "1552677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552677"
},
{
"category": "external",
"summary": "1552704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552704"
},
{
"category": "external",
"summary": "1552707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552707"
},
{
"category": "external",
"summary": "1552723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552723"
},
{
"category": "external",
"summary": "1552735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552735"
},
{
"category": "external",
"summary": "1552737",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552737"
},
{
"category": "external",
"summary": "1552739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552739"
},
{
"category": "external",
"summary": "1552740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552740"
},
{
"category": "external",
"summary": "1552741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552741"
},
{
"category": "external",
"summary": "1552743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552743"
},
{
"category": "external",
"summary": "1552746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552746"
},
{
"category": "external",
"summary": "1552748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552748"
},
{
"category": "external",
"summary": "1552753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552753"
},
{
"category": "external",
"summary": "1552762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552762"
},
{
"category": "external",
"summary": "1552763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552763"
},
{
"category": "external",
"summary": "1552776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552776"
},
{
"category": "external",
"summary": "1552782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552782"
},
{
"category": "external",
"summary": "1552783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552783"
},
{
"category": "external",
"summary": "1552785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552785"
},
{
"category": "external",
"summary": "1552790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552790"
},
{
"category": "external",
"summary": "1552791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552791"
},
{
"category": "external",
"summary": "1552792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552792"
},
{
"category": "external",
"summary": "1552794",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552794"
},
{
"category": "external",
"summary": "1552796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552796"
},
{
"category": "external",
"summary": "1552798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552798"
},
{
"category": "external",
"summary": "1552800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552800"
},
{
"category": "external",
"summary": "1552801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552801"
},
{
"category": "external",
"summary": "1552802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552802"
},
{
"category": "external",
"summary": "1552804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552804"
},
{
"category": "external",
"summary": "1552809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552809"
},
{
"category": "external",
"summary": "1552817",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552817"
},
{
"category": "external",
"summary": "1552824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552824"
},
{
"category": "external",
"summary": "1552826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552826"
},
{
"category": "external",
"summary": "1552828",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552828"
},
{
"category": "external",
"summary": "1552838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552838"
},
{
"category": "external",
"summary": "1552842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552842"
},
{
"category": "external",
"summary": "1552873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552873"
},
{
"category": "external",
"summary": "1552879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552879"
},
{
"category": "external",
"summary": "1552880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552880"
},
{
"category": "external",
"summary": "1552882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552882"
},
{
"category": "external",
"summary": "1552884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552884"
},
{
"category": "external",
"summary": "1552886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552886"
},
{
"category": "external",
"summary": "1552889",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552889"
},
{
"category": "external",
"summary": "1552890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552890"
},
{
"category": "external",
"summary": "1552895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552895"
},
{
"category": "external",
"summary": "1552900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552900"
},
{
"category": "external",
"summary": "1552903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552903"
},
{
"category": "external",
"summary": "1552904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552904"
},
{
"category": "external",
"summary": "1552908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552908"
},
{
"category": "external",
"summary": "1553191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553191"
},
{
"category": "external",
"summary": "1553197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553197"
},
{
"category": "external",
"summary": "1553214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553214"
},
{
"category": "external",
"summary": "1553224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553224"
},
{
"category": "external",
"summary": "1553241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553241"
},
{
"category": "external",
"summary": "1553242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553242"
},
{
"category": "external",
"summary": "1553243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553243"
},
{
"category": "external",
"summary": "1553244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553244"
},
{
"category": "external",
"summary": "1553251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553251"
},
{
"category": "external",
"summary": "1553288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553288"
},
{
"category": "external",
"summary": "1553295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553295"
},
{
"category": "external",
"summary": "1553304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553304"
},
{
"category": "external",
"summary": "1553307",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553307"
},
{
"category": "external",
"summary": "1553309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553309"
},
{
"category": "external",
"summary": "1553311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553311"
},
{
"category": "external",
"summary": "1553315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553315"
},
{
"category": "external",
"summary": "1553316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553316"
},
{
"category": "external",
"summary": "1553317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553317"
},
{
"category": "external",
"summary": "1553319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553319"
},
{
"category": "external",
"summary": "1553322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553322"
},
{
"category": "external",
"summary": "1553323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553323"
},
{
"category": "external",
"summary": "1553326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553326"
},
{
"category": "external",
"summary": "1553327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553327"
},
{
"category": "external",
"summary": "1553329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553329"
},
{
"category": "external",
"summary": "1553336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553336"
},
{
"category": "external",
"summary": "1553340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553340"
},
{
"category": "external",
"summary": "1553345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553345"
},
{
"category": "external",
"summary": "1553362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553362"
},
{
"category": "external",
"summary": "1553384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553384"
},
{
"category": "external",
"summary": "1553389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553389"
},
{
"category": "external",
"summary": "1553392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553392"
},
{
"category": "external",
"summary": "1553393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553393"
},
{
"category": "external",
"summary": "1553396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553396"
},
{
"category": "external",
"summary": "1553397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553397"
},
{
"category": "external",
"summary": "1553399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553399"
},
{
"category": "external",
"summary": "1553480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553480"
},
{
"category": "external",
"summary": "1553482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553482"
},
{
"category": "external",
"summary": "1553483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553483"
},
{
"category": "external",
"summary": "1553768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553768"
},
{
"category": "external",
"summary": "1553776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553776"
},
{
"category": "external",
"summary": "1553779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553779"
},
{
"category": "external",
"summary": "1553780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553780"
},
{
"category": "external",
"summary": "1553789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553789"
},
{
"category": "external",
"summary": "1553791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553791"
},
{
"category": "external",
"summary": "1553836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553836"
},
{
"category": "external",
"summary": "1553873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553873"
},
{
"category": "external",
"summary": "1553903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553903"
},
{
"category": "external",
"summary": "1554358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554358"
},
{
"category": "external",
"summary": "1554370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554370"
},
{
"category": "external",
"summary": "1554454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554454"
},
{
"category": "external",
"summary": "1554532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554532"
},
{
"category": "external",
"summary": "1554541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554541"
},
{
"category": "external",
"summary": "1554823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554823"
},
{
"category": "external",
"summary": "1554825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554825"
},
{
"category": "external",
"summary": "1554832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554832"
},
{
"category": "external",
"summary": "1554839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554839"
},
{
"category": "external",
"summary": "1554889",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554889"
},
{
"category": "external",
"summary": "1554898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554898"
},
{
"category": "external",
"summary": "1554901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554901"
},
{
"category": "external",
"summary": "1557130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
},
{
"category": "external",
"summary": "1557353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557353"
},
{
"category": "external",
"summary": "1557361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557361"
},
{
"category": "external",
"summary": "1557367",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557367"
},
{
"category": "external",
"summary": "1557378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557378"
},
{
"category": "external",
"summary": "1557380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557380"
},
{
"category": "external",
"summary": "1557388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557388"
},
{
"category": "external",
"summary": "1557391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557391"
},
{
"category": "external",
"summary": "1557400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557400"
},
{
"category": "external",
"summary": "1558030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558030"
},
{
"category": "external",
"summary": "1558038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558038"
},
{
"category": "external",
"summary": "1558040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558040"
},
{
"category": "external",
"summary": "1558046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558046"
},
{
"category": "external",
"summary": "1558048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558048"
},
{
"category": "external",
"summary": "1558078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558078"
},
{
"category": "external",
"summary": "1558092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558092"
},
{
"category": "external",
"summary": "1558142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558142"
},
{
"category": "external",
"summary": "1558144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558144"
},
{
"category": "external",
"summary": "1558544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558544"
},
{
"category": "external",
"summary": "1558594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558594"
},
{
"category": "external",
"summary": "1558610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558610"
},
{
"category": "external",
"summary": "1558621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558621"
},
{
"category": "external",
"summary": "1558626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558626"
},
{
"category": "external",
"summary": "1559475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559475"
},
{
"category": "external",
"summary": "1559479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559479"
},
{
"category": "external",
"summary": "1559483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559483"
},
{
"category": "external",
"summary": "1559543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559543"
},
{
"category": "external",
"summary": "1559544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559544"
},
{
"category": "external",
"summary": "1559550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559550"
},
{
"category": "external",
"summary": "1559552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559552"
},
{
"category": "external",
"summary": "1559609",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559609"
},
{
"category": "external",
"summary": "1559624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559624"
},
{
"category": "external",
"summary": "1560004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560004"
},
{
"category": "external",
"summary": "1560096",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560096"
},
{
"category": "external",
"summary": "1560098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560098"
},
{
"category": "external",
"summary": "1560100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560100"
},
{
"category": "external",
"summary": "1560104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560104"
},
{
"category": "external",
"summary": "1560692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560692"
},
{
"category": "external",
"summary": "1560699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560699"
},
{
"category": "external",
"summary": "1560703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560703"
},
{
"category": "external",
"summary": "1560708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560708"
},
{
"category": "external",
"summary": "1561076",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561076"
},
{
"category": "external",
"summary": "1561079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561079"
},
{
"category": "external",
"summary": "1561085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561085"
},
{
"category": "external",
"summary": "1561091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561091"
},
{
"category": "external",
"summary": "1561096",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561096"
},
{
"category": "external",
"summary": "1561107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561107"
},
{
"category": "external",
"summary": "1561216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561216"
},
{
"category": "external",
"summary": "1561218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561218"
},
{
"category": "external",
"summary": "1561222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561222"
},
{
"category": "external",
"summary": "1562075",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562075"
},
{
"category": "external",
"summary": "1562235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562235"
},
{
"category": "external",
"summary": "1562772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562772"
},
{
"category": "external",
"summary": "1562777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562777"
},
{
"category": "external",
"summary": "1562779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562779"
},
{
"category": "external",
"summary": "1562780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562780"
},
{
"category": "external",
"summary": "1562782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562782"
},
{
"category": "external",
"summary": "1562785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562785"
},
{
"category": "external",
"summary": "1562788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562788"
},
{
"category": "external",
"summary": "1562791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562791"
},
{
"category": "external",
"summary": "1562797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562797"
},
{
"category": "external",
"summary": "1562800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562800"
},
{
"category": "external",
"summary": "1562803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562803"
},
{
"category": "external",
"summary": "1562811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562811"
},
{
"category": "external",
"summary": "1563268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563268"
},
{
"category": "external",
"summary": "1563351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563351"
},
{
"category": "external",
"summary": "1563358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563358"
},
{
"category": "external",
"summary": "1563359",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563359"
},
{
"category": "external",
"summary": "1563361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563361"
},
{
"category": "external",
"summary": "1563363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563363"
},
{
"category": "external",
"summary": "1563364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563364"
},
{
"category": "external",
"summary": "1563492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
},
{
"category": "external",
"summary": "1563731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563731"
},
{
"category": "external",
"summary": "1563740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563740"
},
{
"category": "external",
"summary": "1565139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565139"
},
{
"category": "external",
"summary": "1565140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565140"
},
{
"category": "external",
"summary": "1565142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565142"
},
{
"category": "external",
"summary": "1565147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565147"
},
{
"category": "external",
"summary": "1565148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565148"
},
{
"category": "external",
"summary": "1565151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565151"
},
{
"category": "external",
"summary": "1565156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565156"
},
{
"category": "external",
"summary": "1565160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565160"
},
{
"category": "external",
"summary": "1565167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565167"
},
{
"category": "external",
"summary": "1565232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565232"
},
{
"category": "external",
"summary": "1565677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565677"
},
{
"category": "external",
"summary": "1565686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565686"
},
{
"category": "external",
"summary": "1565756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565756"
},
{
"category": "external",
"summary": "1565862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"category": "external",
"summary": "1566255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566255"
},
{
"category": "external",
"summary": "1566526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566526"
},
{
"category": "external",
"summary": "1566529",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566529"
},
{
"category": "external",
"summary": "1566530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566530"
},
{
"category": "external",
"summary": "1566541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566541"
},
{
"category": "external",
"summary": "1566557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566557"
},
{
"category": "external",
"summary": "1566562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566562"
},
{
"category": "external",
"summary": "1566563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566563"
},
{
"category": "external",
"summary": "1566568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566568"
},
{
"category": "external",
"summary": "1566572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566572"
},
{
"category": "external",
"summary": "1566577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566577"
},
{
"category": "external",
"summary": "1566658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566658"
},
{
"category": "external",
"summary": "1567278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567278"
},
{
"category": "external",
"summary": "1567962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567962"
},
{
"category": "external",
"summary": "1568023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568023"
},
{
"category": "external",
"summary": "1568091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568091"
},
{
"category": "external",
"summary": "1568156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568156"
},
{
"category": "external",
"summary": "1568158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568158"
},
{
"category": "external",
"summary": "1568162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568162"
},
{
"category": "external",
"summary": "1568467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568467"
},
{
"category": "external",
"summary": "1568473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568473"
},
{
"category": "external",
"summary": "1568550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568550"
},
{
"category": "external",
"summary": "1568559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568559"
},
{
"category": "external",
"summary": "1568602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568602"
},
{
"category": "external",
"summary": "1569099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569099"
},
{
"category": "external",
"summary": "1569103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569103"
},
{
"category": "external",
"summary": "1569113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569113"
},
{
"category": "external",
"summary": "1569177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569177"
},
{
"category": "external",
"summary": "1569236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569236"
},
{
"category": "external",
"summary": "1569472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569472"
},
{
"category": "external",
"summary": "1569551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569551"
},
{
"category": "external",
"summary": "1570118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570118"
},
{
"category": "external",
"summary": "1570821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570821"
},
{
"category": "external",
"summary": "1570950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570950"
},
{
"category": "external",
"summary": "1570989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570989"
},
{
"category": "external",
"summary": "1571310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571310"
},
{
"category": "external",
"summary": "1571976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571976"
},
{
"category": "external",
"summary": "1571989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571989"
},
{
"category": "external",
"summary": "1572711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572711"
},
{
"category": "external",
"summary": "1572716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572716"
},
{
"category": "external",
"summary": "1572718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572718"
},
{
"category": "external",
"summary": "1573215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573215"
},
{
"category": "external",
"summary": "1573246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573246"
},
{
"category": "external",
"summary": "1573254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573254"
},
{
"category": "external",
"summary": "1573539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573539"
},
{
"category": "external",
"summary": "1573990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573990"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1328.json"
}
],
"title": "Red Hat Security Advisory: CloudForms 4.6.2 bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:04:37+00:00",
"generator": {
"date": "2025-11-21T18:04:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1328",
"initial_release_date": "2018-05-07T20:42:50+00:00",
"revision_history": [
{
"date": "2018-05-07T20:42:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-07T20:42:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CloudForms Management Engine 5.9",
"product": {
"name": "CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat CloudForms"
},
{
"branches": [
{
"category": "product_version",
"name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-libs@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-server@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-plpython@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-pltcl@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-plperl@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-devel@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-debuginfo@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-contrib@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-test@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-docs@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"product": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"product_id": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"product": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-debuginfo@0.22.0-2.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-venv-tower@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-venv-ansible@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-setup@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-server@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-ui@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-debuginfo@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance-common@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance-tools@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset-debuginfo@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "postgresql96-0:9.6.6-1PGDG.el7.src",
"product": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.src",
"product_id": "postgresql96-0:9.6.6-1PGDG.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "dbus-api-service-0:1.0.1-3.el7cf.src",
"product": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.src",
"product_id": "dbus-api-service-0:1.0.1-3.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"product": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-0:2.1.1-4.el7.src",
"product": {
"name": "python-paramiko-0:2.1.1-4.el7.src",
"product_id": "python-paramiko-0:2.1.1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-0:3.2.4-1.el7at.src",
"product": {
"name": "ansible-tower-0:3.2.4-1.el7at.src",
"product_id": "ansible-tower-0:3.2.4-1.el7at.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-0:2.4.4.0-1.el7ae.src",
"product": {
"name": "ansible-0:2.4.4.0-1.el7ae.src",
"product_id": "ansible-0:2.4.4.0-1.el7ae.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"product_id": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-doc@0.22.0-2.el7cf?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product": {
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-0:2.1.1-4.el7.noarch",
"product": {
"name": "python-paramiko-0:2.1.1-4.el7.noarch",
"product_id": "python-paramiko-0:2.1.1-4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product": {
"name": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product_id": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"product": {
"name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"product_id": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-doc@2.4.4.0-1.el7ae?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch"
},
"product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src"
},
"product_reference": "ansible-0:2.4.4.0-1.el7ae.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch"
},
"product_reference": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-0:3.2.4-1.el7at.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src"
},
"product_reference": "ansible-tower-0:3.2.4-1.el7at.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src"
},
"product_reference": "dbus-api-service-0:1.0.1-3.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64"
},
"product_reference": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src"
},
"product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64"
},
"product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src"
},
"product_reference": "postgresql96-0:9.6.6-1PGDG.el7.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch"
},
"product_reference": "python-paramiko-0:2.1.1-4.el7.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src"
},
"product_reference": "python-paramiko-0:2.1.1-4.el7.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch"
},
"product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src"
},
"product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Graham Mainwaring"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2018-1101",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1563492"
}
],
"notes": [
{
"category": "description",
"text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1101"
},
{
"category": "external",
"summary": "RHBZ#1563492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101"
}
],
"release_date": "2018-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-07T20:42:50+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges"
},
{
"acknowledgments": [
{
"names": [
"Simon Vikstr\u00f6m"
]
}
],
"cve": "CVE-2018-1104",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565862"
}
],
"notes": [
{
"category": "description",
"text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible-tower: Remote code execution by users with access to define variables in job templates",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1104"
},
{
"category": "external",
"summary": "RHBZ#1565862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104"
}
],
"release_date": "2018-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-07T20:42:50+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ansible-tower: Remote code execution by users with access to define variables in job templates"
},
{
"cve": "CVE-2018-7750",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2018-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1557130"
}
],
"notes": [
{
"category": "description",
"text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-paramiko: Authentication bypass in transport.py",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7750"
},
{
"category": "external",
"summary": "RHBZ#1557130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750"
}
],
"release_date": "2018-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-07T20:42:50+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python-paramiko: Authentication bypass in transport.py"
}
]
}
RHSA-2018_1972
Vulnerability from csaf_redhat - Published: 2018-06-25 14:17 - Updated: 2024-11-22 11:48Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.
Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.
It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for CloudForms Management Engine 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104. The CVE-2018-1101 issue was discovered by Graham Mainwaring (Red Hat).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1972",
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1489507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489507"
},
{
"category": "external",
"summary": "1496902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496902"
},
{
"category": "external",
"summary": "1500951",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500951"
},
{
"category": "external",
"summary": "1511030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511030"
},
{
"category": "external",
"summary": "1526156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526156"
},
{
"category": "external",
"summary": "1531499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531499"
},
{
"category": "external",
"summary": "1532272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532272"
},
{
"category": "external",
"summary": "1533082",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533082"
},
{
"category": "external",
"summary": "1535369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535369"
},
{
"category": "external",
"summary": "1536684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536684"
},
{
"category": "external",
"summary": "1537132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537132"
},
{
"category": "external",
"summary": "1540579",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540579"
},
{
"category": "external",
"summary": "1541341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541341"
},
{
"category": "external",
"summary": "1541427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541427"
},
{
"category": "external",
"summary": "1541700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541700"
},
{
"category": "external",
"summary": "1544488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544488"
},
{
"category": "external",
"summary": "1549626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549626"
},
{
"category": "external",
"summary": "1549723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549723"
},
{
"category": "external",
"summary": "1549833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549833"
},
{
"category": "external",
"summary": "1550116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550116"
},
{
"category": "external",
"summary": "1550276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550276"
},
{
"category": "external",
"summary": "1550715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550715"
},
{
"category": "external",
"summary": "1550729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550729"
},
{
"category": "external",
"summary": "1550732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550732"
},
{
"category": "external",
"summary": "1550737",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550737"
},
{
"category": "external",
"summary": "1551627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551627"
},
{
"category": "external",
"summary": "1551693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551693"
},
{
"category": "external",
"summary": "1551697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551697"
},
{
"category": "external",
"summary": "1551699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551699"
},
{
"category": "external",
"summary": "1552135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552135"
},
{
"category": "external",
"summary": "1552233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552233"
},
{
"category": "external",
"summary": "1552780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552780"
},
{
"category": "external",
"summary": "1552891",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552891"
},
{
"category": "external",
"summary": "1552905",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552905"
},
{
"category": "external",
"summary": "1553225",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553225"
},
{
"category": "external",
"summary": "1553249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553249"
},
{
"category": "external",
"summary": "1553308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553308"
},
{
"category": "external",
"summary": "1553331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553331"
},
{
"category": "external",
"summary": "1553337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553337"
},
{
"category": "external",
"summary": "1553364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553364"
},
{
"category": "external",
"summary": "1553465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553465"
},
{
"category": "external",
"summary": "1553473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553473"
},
{
"category": "external",
"summary": "1554533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554533"
},
{
"category": "external",
"summary": "1554543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554543"
},
{
"category": "external",
"summary": "1554900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554900"
},
{
"category": "external",
"summary": "1555487",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555487"
},
{
"category": "external",
"summary": "1556814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1556814"
},
{
"category": "external",
"summary": "1557025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557025"
},
{
"category": "external",
"summary": "1557130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
},
{
"category": "external",
"summary": "1558032",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558032"
},
{
"category": "external",
"summary": "1558039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558039"
},
{
"category": "external",
"summary": "1558047",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558047"
},
{
"category": "external",
"summary": "1558076",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558076"
},
{
"category": "external",
"summary": "1558595",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558595"
},
{
"category": "external",
"summary": "1558622",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558622"
},
{
"category": "external",
"summary": "1559551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559551"
},
{
"category": "external",
"summary": "1559553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559553"
},
{
"category": "external",
"summary": "1560097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560097"
},
{
"category": "external",
"summary": "1560099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560099"
},
{
"category": "external",
"summary": "1560693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560693"
},
{
"category": "external",
"summary": "1561077",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561077"
},
{
"category": "external",
"summary": "1562773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562773"
},
{
"category": "external",
"summary": "1562775",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562775"
},
{
"category": "external",
"summary": "1562798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562798"
},
{
"category": "external",
"summary": "1563492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
},
{
"category": "external",
"summary": "1563721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563721"
},
{
"category": "external",
"summary": "1563741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563741"
},
{
"category": "external",
"summary": "1564264",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564264"
},
{
"category": "external",
"summary": "1564454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1564454"
},
{
"category": "external",
"summary": "1565157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565157"
},
{
"category": "external",
"summary": "1565162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565162"
},
{
"category": "external",
"summary": "1565169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565169"
},
{
"category": "external",
"summary": "1565248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565248"
},
{
"category": "external",
"summary": "1565342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565342"
},
{
"category": "external",
"summary": "1565358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565358"
},
{
"category": "external",
"summary": "1565362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565362"
},
{
"category": "external",
"summary": "1565364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565364"
},
{
"category": "external",
"summary": "1565365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565365"
},
{
"category": "external",
"summary": "1565366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565366"
},
{
"category": "external",
"summary": "1565389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565389"
},
{
"category": "external",
"summary": "1565403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565403"
},
{
"category": "external",
"summary": "1565414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565414"
},
{
"category": "external",
"summary": "1565678",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565678"
},
{
"category": "external",
"summary": "1565724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565724"
},
{
"category": "external",
"summary": "1565760",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565760"
},
{
"category": "external",
"summary": "1565835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565835"
},
{
"category": "external",
"summary": "1565862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"category": "external",
"summary": "1566256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566256"
},
{
"category": "external",
"summary": "1566528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566528"
},
{
"category": "external",
"summary": "1566746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566746"
},
{
"category": "external",
"summary": "1567983",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567983"
},
{
"category": "external",
"summary": "1568016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568016"
},
{
"category": "external",
"summary": "1568042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568042"
},
{
"category": "external",
"summary": "1568045",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568045"
},
{
"category": "external",
"summary": "1568084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568084"
},
{
"category": "external",
"summary": "1568159",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568159"
},
{
"category": "external",
"summary": "1568168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568168"
},
{
"category": "external",
"summary": "1568576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568576"
},
{
"category": "external",
"summary": "1568603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568603"
},
{
"category": "external",
"summary": "1569079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569079"
},
{
"category": "external",
"summary": "1569100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569100"
},
{
"category": "external",
"summary": "1569104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569104"
},
{
"category": "external",
"summary": "1569118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569118"
},
{
"category": "external",
"summary": "1569127",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569127"
},
{
"category": "external",
"summary": "1569171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569171"
},
{
"category": "external",
"summary": "1569179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569179"
},
{
"category": "external",
"summary": "1569230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569230"
},
{
"category": "external",
"summary": "1569237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569237"
},
{
"category": "external",
"summary": "1569241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569241"
},
{
"category": "external",
"summary": "1570060",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570060"
},
{
"category": "external",
"summary": "1570951",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570951"
},
{
"category": "external",
"summary": "1570990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570990"
},
{
"category": "external",
"summary": "1571311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571311"
},
{
"category": "external",
"summary": "1572621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572621"
},
{
"category": "external",
"summary": "1572719",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572719"
},
{
"category": "external",
"summary": "1573540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573540"
},
{
"category": "external",
"summary": "1574155",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574155"
},
{
"category": "external",
"summary": "1574571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574571"
},
{
"category": "external",
"summary": "1574615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574615"
},
{
"category": "external",
"summary": "1576101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576101"
},
{
"category": "external",
"summary": "1578575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578575"
},
{
"category": "external",
"summary": "1578853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578853"
},
{
"category": "external",
"summary": "1578866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578866"
},
{
"category": "external",
"summary": "1581387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581387"
},
{
"category": "external",
"summary": "1583711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583711"
},
{
"category": "external",
"summary": "1583790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583790"
},
{
"category": "external",
"summary": "1584187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584187"
},
{
"category": "external",
"summary": "1584688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584688"
},
{
"category": "external",
"summary": "1589834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589834"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1972.json"
}
],
"title": "Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-22T11:48:52+00:00",
"generator": {
"date": "2024-11-22T11:48:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1972",
"initial_release_date": "2018-06-25T14:17:26+00:00",
"revision_history": [
{
"date": "2018-06-25T14:17:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-25T14:17:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T11:48:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CloudForms Management Engine 5.8",
"product": {
"name": "CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cloudforms_managementengine:5.8::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat CloudForms"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"product": {
"name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"product_id": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-server@3.1.7-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"product": {
"name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"product_id": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-setup@3.1.7-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.8.4.5-1.el7cf.x86_64",
"product": {
"name": "cfme-0:5.8.4.5-1.el7cf.x86_64",
"product_id": "cfme-0:5.8.4.5-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product": {
"name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product_id": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-debuginfo@5.8.4.5-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"product": {
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product_id": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.8.4.5-1.el7cf?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-0:2.1.1-4.el7.src",
"product": {
"name": "python-paramiko-0:2.1.1-4.el7.src",
"product_id": "python-paramiko-0:2.1.1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-0:2.4.4.0-1.el7ae.src",
"product": {
"name": "ansible-0:2.4.4.0-1.el7ae.src",
"product_id": "ansible-0:2.4.4.0-1.el7ae.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.8.4.5-1.el7cf.src",
"product": {
"name": "cfme-0:5.8.4.5-1.el7cf.src",
"product_id": "cfme-0:5.8.4.5-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.8.4.5-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
"product": {
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
"product_id": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.8.4.5-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
"product": {
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
"product_id": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.8.4.5-1.el7cf?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product": {
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-0:2.1.1-4.el7.noarch",
"product": {
"name": "python-paramiko-0:2.1.1-4.el7.noarch",
"product_id": "python-paramiko-0:2.1.1-4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product": {
"name": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product_id": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch"
},
"product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src"
},
"product_reference": "ansible-0:2.4.4.0-1.el7ae.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-server-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64"
},
"product_reference": "ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64"
},
"product_reference": "ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src"
},
"product_reference": "cfme-0:5.8.4.5-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64"
},
"product_reference": "cfme-0:5.8.4.5-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src"
},
"product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64"
},
"product_reference": "cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src"
},
"product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64"
},
"product_reference": "cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch"
},
"product_reference": "python-paramiko-0:2.1.1-4.el7.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src"
},
"product_reference": "python-paramiko-0:2.1.1-4.el7.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch"
},
"product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src"
},
"product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.8",
"product_id": "7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.8"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Graham Mainwaring"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2018-1101",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1563492"
}
],
"notes": [
{
"category": "description",
"text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1101"
},
{
"category": "external",
"summary": "RHBZ#1563492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101"
}
],
"release_date": "2018-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-25T14:17:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges"
},
{
"acknowledgments": [
{
"names": [
"Simon Vikstr\u00f6m"
]
}
],
"cve": "CVE-2018-1104",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565862"
}
],
"notes": [
{
"category": "description",
"text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible-tower: Remote code execution by users with access to define variables in job templates",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1104"
},
{
"category": "external",
"summary": "RHBZ#1565862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104"
}
],
"release_date": "2018-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-25T14:17:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ansible-tower: Remote code execution by users with access to define variables in job templates"
},
{
"cve": "CVE-2018-7750",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2018-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1557130"
}
],
"notes": [
{
"category": "description",
"text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-paramiko: Authentication bypass in transport.py",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7750"
},
{
"category": "external",
"summary": "RHBZ#1557130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750"
}
],
"release_date": "2018-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-25T14:17:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.8:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.8:ansible-tower-server-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:ansible-tower-setup-0:3.1.7-1.el7at.x86_64",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-appliance-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-appliance-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-debuginfo-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.src",
"7Server-RH7-CFME-5.8:cfme-gemset-0:5.8.4.5-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.8:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.8:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python-paramiko: Authentication bypass in transport.py"
}
]
}
RHSA-2018_1328
Vulnerability from csaf_redhat - Published: 2018-05-07 20:42 - Updated: 2024-11-22 11:48Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.
Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.
It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for CloudForms Management Engine 5.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\nRed Hat would like to thank Graham Mainwaring of Red Hat for reporting CVE-2018-1101.\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1328",
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1495849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495849"
},
{
"category": "external",
"summary": "1510499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510499"
},
{
"category": "external",
"summary": "1526086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526086"
},
{
"category": "external",
"summary": "1526088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526088"
},
{
"category": "external",
"summary": "1530680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530680"
},
{
"category": "external",
"summary": "1530760",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530760"
},
{
"category": "external",
"summary": "1533220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533220"
},
{
"category": "external",
"summary": "1533233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533233"
},
{
"category": "external",
"summary": "1533515",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533515"
},
{
"category": "external",
"summary": "1538094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538094"
},
{
"category": "external",
"summary": "1538100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538100"
},
{
"category": "external",
"summary": "1549625",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549625"
},
{
"category": "external",
"summary": "1549722",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549722"
},
{
"category": "external",
"summary": "1550728",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550728"
},
{
"category": "external",
"summary": "1550730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550730"
},
{
"category": "external",
"summary": "1550736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550736"
},
{
"category": "external",
"summary": "1551692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551692"
},
{
"category": "external",
"summary": "1551696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551696"
},
{
"category": "external",
"summary": "1551698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551698"
},
{
"category": "external",
"summary": "1551703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551703"
},
{
"category": "external",
"summary": "1552266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552266"
},
{
"category": "external",
"summary": "1552269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552269"
},
{
"category": "external",
"summary": "1552278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552278"
},
{
"category": "external",
"summary": "1552282",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552282"
},
{
"category": "external",
"summary": "1552288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552288"
},
{
"category": "external",
"summary": "1552290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552290"
},
{
"category": "external",
"summary": "1552301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552301"
},
{
"category": "external",
"summary": "1552303",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552303"
},
{
"category": "external",
"summary": "1552305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552305"
},
{
"category": "external",
"summary": "1552323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552323"
},
{
"category": "external",
"summary": "1552334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552334"
},
{
"category": "external",
"summary": "1552335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552335"
},
{
"category": "external",
"summary": "1552671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552671"
},
{
"category": "external",
"summary": "1552673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552673"
},
{
"category": "external",
"summary": "1552677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552677"
},
{
"category": "external",
"summary": "1552704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552704"
},
{
"category": "external",
"summary": "1552707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552707"
},
{
"category": "external",
"summary": "1552723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552723"
},
{
"category": "external",
"summary": "1552735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552735"
},
{
"category": "external",
"summary": "1552737",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552737"
},
{
"category": "external",
"summary": "1552739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552739"
},
{
"category": "external",
"summary": "1552740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552740"
},
{
"category": "external",
"summary": "1552741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552741"
},
{
"category": "external",
"summary": "1552743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552743"
},
{
"category": "external",
"summary": "1552746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552746"
},
{
"category": "external",
"summary": "1552748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552748"
},
{
"category": "external",
"summary": "1552753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552753"
},
{
"category": "external",
"summary": "1552762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552762"
},
{
"category": "external",
"summary": "1552763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552763"
},
{
"category": "external",
"summary": "1552776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552776"
},
{
"category": "external",
"summary": "1552782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552782"
},
{
"category": "external",
"summary": "1552783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552783"
},
{
"category": "external",
"summary": "1552785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552785"
},
{
"category": "external",
"summary": "1552790",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552790"
},
{
"category": "external",
"summary": "1552791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552791"
},
{
"category": "external",
"summary": "1552792",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552792"
},
{
"category": "external",
"summary": "1552794",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552794"
},
{
"category": "external",
"summary": "1552796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552796"
},
{
"category": "external",
"summary": "1552798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552798"
},
{
"category": "external",
"summary": "1552800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552800"
},
{
"category": "external",
"summary": "1552801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552801"
},
{
"category": "external",
"summary": "1552802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552802"
},
{
"category": "external",
"summary": "1552804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552804"
},
{
"category": "external",
"summary": "1552809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552809"
},
{
"category": "external",
"summary": "1552817",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552817"
},
{
"category": "external",
"summary": "1552824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552824"
},
{
"category": "external",
"summary": "1552826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552826"
},
{
"category": "external",
"summary": "1552828",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552828"
},
{
"category": "external",
"summary": "1552838",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552838"
},
{
"category": "external",
"summary": "1552842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552842"
},
{
"category": "external",
"summary": "1552873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552873"
},
{
"category": "external",
"summary": "1552879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552879"
},
{
"category": "external",
"summary": "1552880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552880"
},
{
"category": "external",
"summary": "1552882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552882"
},
{
"category": "external",
"summary": "1552884",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552884"
},
{
"category": "external",
"summary": "1552886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552886"
},
{
"category": "external",
"summary": "1552889",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552889"
},
{
"category": "external",
"summary": "1552890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552890"
},
{
"category": "external",
"summary": "1552895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552895"
},
{
"category": "external",
"summary": "1552900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552900"
},
{
"category": "external",
"summary": "1552903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552903"
},
{
"category": "external",
"summary": "1552904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552904"
},
{
"category": "external",
"summary": "1552908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552908"
},
{
"category": "external",
"summary": "1553191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553191"
},
{
"category": "external",
"summary": "1553197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553197"
},
{
"category": "external",
"summary": "1553214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553214"
},
{
"category": "external",
"summary": "1553224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553224"
},
{
"category": "external",
"summary": "1553241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553241"
},
{
"category": "external",
"summary": "1553242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553242"
},
{
"category": "external",
"summary": "1553243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553243"
},
{
"category": "external",
"summary": "1553244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553244"
},
{
"category": "external",
"summary": "1553251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553251"
},
{
"category": "external",
"summary": "1553288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553288"
},
{
"category": "external",
"summary": "1553295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553295"
},
{
"category": "external",
"summary": "1553304",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553304"
},
{
"category": "external",
"summary": "1553307",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553307"
},
{
"category": "external",
"summary": "1553309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553309"
},
{
"category": "external",
"summary": "1553311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553311"
},
{
"category": "external",
"summary": "1553315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553315"
},
{
"category": "external",
"summary": "1553316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553316"
},
{
"category": "external",
"summary": "1553317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553317"
},
{
"category": "external",
"summary": "1553319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553319"
},
{
"category": "external",
"summary": "1553322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553322"
},
{
"category": "external",
"summary": "1553323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553323"
},
{
"category": "external",
"summary": "1553326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553326"
},
{
"category": "external",
"summary": "1553327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553327"
},
{
"category": "external",
"summary": "1553329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553329"
},
{
"category": "external",
"summary": "1553336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553336"
},
{
"category": "external",
"summary": "1553340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553340"
},
{
"category": "external",
"summary": "1553345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553345"
},
{
"category": "external",
"summary": "1553362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553362"
},
{
"category": "external",
"summary": "1553384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553384"
},
{
"category": "external",
"summary": "1553389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553389"
},
{
"category": "external",
"summary": "1553392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553392"
},
{
"category": "external",
"summary": "1553393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553393"
},
{
"category": "external",
"summary": "1553396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553396"
},
{
"category": "external",
"summary": "1553397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553397"
},
{
"category": "external",
"summary": "1553399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553399"
},
{
"category": "external",
"summary": "1553480",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553480"
},
{
"category": "external",
"summary": "1553482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553482"
},
{
"category": "external",
"summary": "1553483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553483"
},
{
"category": "external",
"summary": "1553768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553768"
},
{
"category": "external",
"summary": "1553776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553776"
},
{
"category": "external",
"summary": "1553779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553779"
},
{
"category": "external",
"summary": "1553780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553780"
},
{
"category": "external",
"summary": "1553789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553789"
},
{
"category": "external",
"summary": "1553791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553791"
},
{
"category": "external",
"summary": "1553836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553836"
},
{
"category": "external",
"summary": "1553873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553873"
},
{
"category": "external",
"summary": "1553903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553903"
},
{
"category": "external",
"summary": "1554358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554358"
},
{
"category": "external",
"summary": "1554370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554370"
},
{
"category": "external",
"summary": "1554454",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554454"
},
{
"category": "external",
"summary": "1554532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554532"
},
{
"category": "external",
"summary": "1554541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554541"
},
{
"category": "external",
"summary": "1554823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554823"
},
{
"category": "external",
"summary": "1554825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554825"
},
{
"category": "external",
"summary": "1554832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554832"
},
{
"category": "external",
"summary": "1554839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554839"
},
{
"category": "external",
"summary": "1554889",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554889"
},
{
"category": "external",
"summary": "1554898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554898"
},
{
"category": "external",
"summary": "1554901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554901"
},
{
"category": "external",
"summary": "1557130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
},
{
"category": "external",
"summary": "1557353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557353"
},
{
"category": "external",
"summary": "1557361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557361"
},
{
"category": "external",
"summary": "1557367",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557367"
},
{
"category": "external",
"summary": "1557378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557378"
},
{
"category": "external",
"summary": "1557380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557380"
},
{
"category": "external",
"summary": "1557388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557388"
},
{
"category": "external",
"summary": "1557391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557391"
},
{
"category": "external",
"summary": "1557400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557400"
},
{
"category": "external",
"summary": "1558030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558030"
},
{
"category": "external",
"summary": "1558038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558038"
},
{
"category": "external",
"summary": "1558040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558040"
},
{
"category": "external",
"summary": "1558046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558046"
},
{
"category": "external",
"summary": "1558048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558048"
},
{
"category": "external",
"summary": "1558078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558078"
},
{
"category": "external",
"summary": "1558092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558092"
},
{
"category": "external",
"summary": "1558142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558142"
},
{
"category": "external",
"summary": "1558144",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558144"
},
{
"category": "external",
"summary": "1558544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558544"
},
{
"category": "external",
"summary": "1558594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558594"
},
{
"category": "external",
"summary": "1558610",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558610"
},
{
"category": "external",
"summary": "1558621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558621"
},
{
"category": "external",
"summary": "1558626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558626"
},
{
"category": "external",
"summary": "1559475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559475"
},
{
"category": "external",
"summary": "1559479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559479"
},
{
"category": "external",
"summary": "1559483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559483"
},
{
"category": "external",
"summary": "1559543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559543"
},
{
"category": "external",
"summary": "1559544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559544"
},
{
"category": "external",
"summary": "1559550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559550"
},
{
"category": "external",
"summary": "1559552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559552"
},
{
"category": "external",
"summary": "1559609",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559609"
},
{
"category": "external",
"summary": "1559624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559624"
},
{
"category": "external",
"summary": "1560004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560004"
},
{
"category": "external",
"summary": "1560096",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560096"
},
{
"category": "external",
"summary": "1560098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560098"
},
{
"category": "external",
"summary": "1560100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560100"
},
{
"category": "external",
"summary": "1560104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560104"
},
{
"category": "external",
"summary": "1560692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560692"
},
{
"category": "external",
"summary": "1560699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560699"
},
{
"category": "external",
"summary": "1560703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560703"
},
{
"category": "external",
"summary": "1560708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560708"
},
{
"category": "external",
"summary": "1561076",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561076"
},
{
"category": "external",
"summary": "1561079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561079"
},
{
"category": "external",
"summary": "1561085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561085"
},
{
"category": "external",
"summary": "1561091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561091"
},
{
"category": "external",
"summary": "1561096",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561096"
},
{
"category": "external",
"summary": "1561107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561107"
},
{
"category": "external",
"summary": "1561216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561216"
},
{
"category": "external",
"summary": "1561218",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561218"
},
{
"category": "external",
"summary": "1561222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561222"
},
{
"category": "external",
"summary": "1562075",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562075"
},
{
"category": "external",
"summary": "1562235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562235"
},
{
"category": "external",
"summary": "1562772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562772"
},
{
"category": "external",
"summary": "1562777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562777"
},
{
"category": "external",
"summary": "1562779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562779"
},
{
"category": "external",
"summary": "1562780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562780"
},
{
"category": "external",
"summary": "1562782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562782"
},
{
"category": "external",
"summary": "1562785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562785"
},
{
"category": "external",
"summary": "1562788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562788"
},
{
"category": "external",
"summary": "1562791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562791"
},
{
"category": "external",
"summary": "1562797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562797"
},
{
"category": "external",
"summary": "1562800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562800"
},
{
"category": "external",
"summary": "1562803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562803"
},
{
"category": "external",
"summary": "1562811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562811"
},
{
"category": "external",
"summary": "1563268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563268"
},
{
"category": "external",
"summary": "1563351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563351"
},
{
"category": "external",
"summary": "1563358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563358"
},
{
"category": "external",
"summary": "1563359",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563359"
},
{
"category": "external",
"summary": "1563361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563361"
},
{
"category": "external",
"summary": "1563363",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563363"
},
{
"category": "external",
"summary": "1563364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563364"
},
{
"category": "external",
"summary": "1563492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
},
{
"category": "external",
"summary": "1563731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563731"
},
{
"category": "external",
"summary": "1563740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563740"
},
{
"category": "external",
"summary": "1565139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565139"
},
{
"category": "external",
"summary": "1565140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565140"
},
{
"category": "external",
"summary": "1565142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565142"
},
{
"category": "external",
"summary": "1565147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565147"
},
{
"category": "external",
"summary": "1565148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565148"
},
{
"category": "external",
"summary": "1565151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565151"
},
{
"category": "external",
"summary": "1565156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565156"
},
{
"category": "external",
"summary": "1565160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565160"
},
{
"category": "external",
"summary": "1565167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565167"
},
{
"category": "external",
"summary": "1565232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565232"
},
{
"category": "external",
"summary": "1565677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565677"
},
{
"category": "external",
"summary": "1565686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565686"
},
{
"category": "external",
"summary": "1565756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565756"
},
{
"category": "external",
"summary": "1565862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"category": "external",
"summary": "1566255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566255"
},
{
"category": "external",
"summary": "1566526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566526"
},
{
"category": "external",
"summary": "1566529",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566529"
},
{
"category": "external",
"summary": "1566530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566530"
},
{
"category": "external",
"summary": "1566541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566541"
},
{
"category": "external",
"summary": "1566557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566557"
},
{
"category": "external",
"summary": "1566562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566562"
},
{
"category": "external",
"summary": "1566563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566563"
},
{
"category": "external",
"summary": "1566568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566568"
},
{
"category": "external",
"summary": "1566572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566572"
},
{
"category": "external",
"summary": "1566577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566577"
},
{
"category": "external",
"summary": "1566658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566658"
},
{
"category": "external",
"summary": "1567278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567278"
},
{
"category": "external",
"summary": "1567962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567962"
},
{
"category": "external",
"summary": "1568023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568023"
},
{
"category": "external",
"summary": "1568091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568091"
},
{
"category": "external",
"summary": "1568156",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568156"
},
{
"category": "external",
"summary": "1568158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568158"
},
{
"category": "external",
"summary": "1568162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568162"
},
{
"category": "external",
"summary": "1568467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568467"
},
{
"category": "external",
"summary": "1568473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568473"
},
{
"category": "external",
"summary": "1568550",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568550"
},
{
"category": "external",
"summary": "1568559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568559"
},
{
"category": "external",
"summary": "1568602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568602"
},
{
"category": "external",
"summary": "1569099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569099"
},
{
"category": "external",
"summary": "1569103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569103"
},
{
"category": "external",
"summary": "1569113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569113"
},
{
"category": "external",
"summary": "1569177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569177"
},
{
"category": "external",
"summary": "1569236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569236"
},
{
"category": "external",
"summary": "1569472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569472"
},
{
"category": "external",
"summary": "1569551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569551"
},
{
"category": "external",
"summary": "1570118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570118"
},
{
"category": "external",
"summary": "1570821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570821"
},
{
"category": "external",
"summary": "1570950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570950"
},
{
"category": "external",
"summary": "1570989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570989"
},
{
"category": "external",
"summary": "1571310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571310"
},
{
"category": "external",
"summary": "1571976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571976"
},
{
"category": "external",
"summary": "1571989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571989"
},
{
"category": "external",
"summary": "1572711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572711"
},
{
"category": "external",
"summary": "1572716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572716"
},
{
"category": "external",
"summary": "1572718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572718"
},
{
"category": "external",
"summary": "1573215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573215"
},
{
"category": "external",
"summary": "1573246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573246"
},
{
"category": "external",
"summary": "1573254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573254"
},
{
"category": "external",
"summary": "1573539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573539"
},
{
"category": "external",
"summary": "1573990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573990"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1328.json"
}
],
"title": "Red Hat Security Advisory: CloudForms 4.6.2 bug fix and enhancement update",
"tracking": {
"current_release_date": "2024-11-22T11:48:46+00:00",
"generator": {
"date": "2024-11-22T11:48:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1328",
"initial_release_date": "2018-05-07T20:42:50+00:00",
"revision_history": [
{
"date": "2018-05-07T20:42:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-07T20:42:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T11:48:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CloudForms Management Engine 5.9",
"product": {
"name": "CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat CloudForms"
},
{
"branches": [
{
"category": "product_version",
"name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-libs@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-server@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-plpython@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-pltcl@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-plperl@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-devel@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-debuginfo@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-contrib@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-test@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"product": {
"name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"product_id": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96-docs@9.6.6-1PGDG.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"product": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"product_id": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"product": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"product_id": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-debuginfo@0.22.0-2.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-venv-tower@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-venv-ansible@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-setup@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-server@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"product": {
"name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"product_id": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower-ui@3.2.4-1.el7at?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-debuginfo@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance-common@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance-tools@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset-debuginfo@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"product": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "postgresql96-0:9.6.6-1PGDG.el7.src",
"product": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.src",
"product_id": "postgresql96-0:9.6.6-1PGDG.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "dbus-api-service-0:1.0.1-3.el7cf.src",
"product": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.src",
"product_id": "dbus-api-service-0:1.0.1-3.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"product": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-0:2.1.1-4.el7.src",
"product": {
"name": "python-paramiko-0:2.1.1-4.el7.src",
"product_id": "python-paramiko-0:2.1.1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-tower-0:3.2.4-1.el7at.src",
"product": {
"name": "ansible-tower-0:3.2.4-1.el7at.src",
"product_id": "ansible-tower-0:3.2.4-1.el7at.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-0:2.4.4.0-1.el7ae.src",
"product": {
"name": "ansible-0:2.4.4.0-1.el7ae.src",
"product_id": "ansible-0:2.4.4.0-1.el7ae.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"product": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"product": {
"name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"product_id": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-doc@0.22.0-2.el7cf?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product": {
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-paramiko-0:2.1.1-4.el7.noarch",
"product": {
"name": "python-paramiko-0:2.1.1-4.el7.noarch",
"product_id": "python-paramiko-0:2.1.1-4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product": {
"name": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product_id": "ansible-0:2.4.4.0-1.el7ae.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"product": {
"name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"product_id": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-doc@2.4.4.0-1.el7ae?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch"
},
"product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src"
},
"product_reference": "ansible-0:2.4.4.0-1.el7ae.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch"
},
"product_reference": "ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-0:3.2.4-1.el7at.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src"
},
"product_reference": "ansible-tower-0:3.2.4-1.el7at.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64"
},
"product_reference": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src"
},
"product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64"
},
"product_reference": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src"
},
"product_reference": "dbus-api-service-0:1.0.1-3.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64"
},
"product_reference": "dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src"
},
"product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64"
},
"product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src"
},
"product_reference": "postgresql96-0:9.6.6-1PGDG.el7.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64"
},
"product_reference": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch"
},
"product_reference": "python-paramiko-0:2.1.1-4.el7.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src"
},
"product_reference": "python-paramiko-0:2.1.1-4.el7.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch"
},
"product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src"
},
"product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch as a component of CloudForms Management Engine 5.9",
"product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
},
"product_reference": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch",
"relates_to_product_reference": "7Server-RH7-CFME-5.9"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Graham Mainwaring"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2018-1101",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-04-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1563492"
}
],
"notes": [
{
"category": "description",
"text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1101"
},
{
"category": "external",
"summary": "RHBZ#1563492",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101"
}
],
"release_date": "2018-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-07T20:42:50+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges"
},
{
"acknowledgments": [
{
"names": [
"Simon Vikstr\u00f6m"
]
}
],
"cve": "CVE-2018-1104",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565862"
}
],
"notes": [
{
"category": "description",
"text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible-tower: Remote code execution by users with access to define variables in job templates",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1104"
},
{
"category": "external",
"summary": "RHBZ#1565862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104"
}
],
"release_date": "2018-04-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-07T20:42:50+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ansible-tower: Remote code execution by users with access to define variables in job templates"
},
{
"cve": "CVE-2018-7750",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2018-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1557130"
}
],
"notes": [
{
"category": "description",
"text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-paramiko: Authentication bypass in transport.py",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7750"
},
{
"category": "external",
"summary": "RHBZ#1557130",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750"
}
],
"release_date": "2018-03-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-07T20:42:50+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src",
"7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src",
"7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src",
"7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src",
"7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src",
"7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src",
"7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src",
"7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64",
"7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python-paramiko: Authentication bypass in transport.py"
}
]
}
GHSA-4839-8MXX-4XR9
Vulnerability from github – Published: 2022-05-13 01:33 – Updated: 2022-05-13 01:33Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.
{
"affected": [],
"aliases": [
"CVE-2018-1104"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-05-02T19:29:00Z",
"severity": "HIGH"
},
"details": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.",
"id": "GHSA-4839-8mxx-4xr9",
"modified": "2022-05-13T01:33:32Z",
"published": "2022-05-13T01:33:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/cve-2018-1104"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"type": "WEB",
"url": "https://www.ansible.com/security"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CNVD-2018-14411
Vulnerability from cnvd - Published: 2018-08-01目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.ansible.com/security
| Name | Ansible Ansible Tower <=3.2.3 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-1104",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1104"
}
},
"description": "Ansible\u662f\u7f8e\u56fdAnsible\u516c\u53f8\u7684\u4e00\u6b3e\u8ba1\u7b97\u673a\u7cfb\u7edf\u914d\u7f6e\u7ba1\u7406\u5668\uff0c\u5b83\u53ef\u7528\u4e8e\u53d1\u5e03\u3001\u7ba1\u7406\u548c\u7f16\u6392\u8ba1\u7b97\u673a\u7cfb\u7edf\u3002Ansible Tower\uff08\u53c8\u540dAnsible UI\uff09\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u63d0\u4f9b\u4e86\u7528\u6237\u754c\u9762\uff08UI\uff09\u3001\u4eea\u8868\u677f\u548cREST API\u7684\u4efb\u52a1\u63a7\u5236\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nAnsible Tower 3.2.3\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728Tower\u670d\u52a1\u5668\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Sam Fowler",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.ansible.com/security",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-14411",
"openTime": "2018-08-01",
"patchDescription": "Ansible\u662f\u7f8e\u56fdAnsible\u516c\u53f8\u7684\u4e00\u6b3e\u8ba1\u7b97\u673a\u7cfb\u7edf\u914d\u7f6e\u7ba1\u7406\u5668\uff0c\u5b83\u53ef\u7528\u4e8e\u53d1\u5e03\u3001\u7ba1\u7406\u548c\u7f16\u6392\u8ba1\u7b97\u673a\u7cfb\u7edf\u3002Ansible Tower\uff08\u53c8\u540dAnsible UI\uff09\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u63d0\u4f9b\u4e86\u7528\u6237\u754c\u9762\uff08UI\uff09\u3001\u4eea\u8868\u677f\u548cREST API\u7684\u4efb\u52a1\u63a7\u5236\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nAnsible Tower 3.2.3\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728Tower\u670d\u52a1\u5668\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Ansible Tower\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Ansible Ansible Tower \u003c=3.2.3"
},
"referenceLink": "https://access.redhat.com/security/cve/cve-2018-1104",
"serverity": "\u4e2d",
"submitTime": "2018-05-21",
"title": "Ansible Tower\u5b58\u5728\u672a\u660e\u6f0f\u6d1e"
}
GSD-2018-1104
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-1104",
"description": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.",
"id": "GSD-2018-1104",
"references": [
"https://access.redhat.com/errata/RHSA-2018:1972",
"https://access.redhat.com/errata/RHSA-2018:1328"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-1104"
],
"details": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.",
"id": "GSD-2018-1104",
"modified": "2023-12-13T01:22:36.814050Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"DATE_PUBLIC": "2018-04-27T00:00:00",
"ID": "CVE-2018-1104",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Ansible Tower",
"version": {
"version_data": [
{
"version_value": "through version 3.2.3"
}
]
}
}
]
},
"vendor_name": "Red Hat, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.ansible.com/security",
"refsource": "CONFIRM",
"url": "https://www.ansible.com/security"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"name": "RHSA-2018:1972",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
},
{
"name": "RHSA-2018:1328",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
},
{
"name": "https://access.redhat.com/security/cve/cve-2018-1104",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/cve-2018-1104"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.2.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-1104"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.ansible.com/security",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ansible.com/security"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"name": "https://access.redhat.com/security/cve/cve-2018-1104",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/security/cve/cve-2018-1104"
},
{
"name": "RHSA-2018:1328",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
},
{
"name": "RHSA-2018:1972",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-10-09T23:38Z",
"publishedDate": "2018-05-02T19:29Z"
}
}
}
FKIE_CVE-2018-1104
Vulnerability from fkie_nvd - Published: 2018-05-02 19:29 - Updated: 2024-11-21 03:59| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1328 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:1972 | Vendor Advisory | |
| secalert@redhat.com | https://access.redhat.com/security/cve/cve-2018-1104 | Vendor Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1565862 | Issue Tracking, Vendor Advisory | |
| secalert@redhat.com | https://www.ansible.com/security | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1328 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1972 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/cve-2018-1104 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1565862 | Issue Tracking, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.ansible.com/security | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| redhat | ansible_tower | * | |
| redhat | cloudforms | 4.5 | |
| redhat | cloudforms | 4.6 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C796B714-EA6E-4DFC-9467-9DC40110E053",
"versionEndIncluding": "3.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:cloudforms:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "32E1BA91-4695-4E64-A9D7-4A6CB6904D41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "67F7263F-113D-4BAE-B8CB-86A61531A2AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server."
},
{
"lang": "es",
"value": "Ansible Tower hasta la versi\u00f3n 3.2.3 tiene una vulnerabilidad que permite que usuarios que solo tienen acceso para definir variables para una plantilla de trabajo ejecuten c\u00f3digo arbitrario en el servidor Tower."
}
],
"id": "CVE-2018-1104",
"lastModified": "2024-11-21T03:59:11.410",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-05-02T19:29:00.607",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/security/cve/cve-2018-1104"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ansible.com/security"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1328"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1972"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/security/cve/cve-2018-1104"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ansible.com/security"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.