rhsa-2018_1328
Vulnerability from csaf_redhat
Published
2018-05-07 20:42
Modified
2024-11-22 11:48
Summary
Red Hat Security Advisory: CloudForms 4.6.2 bug fix and enhancement update
Notes
Topic
An update is now available for CloudForms Management Engine 5.9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.
Security Fix(es):
* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)
* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)
Red Hat would like to thank Graham Mainwaring of Red Hat for reporting CVE-2018-1101.
* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)
Red Hat would like to thank Simon Vikström for reporting CVE-2018-1104.
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for CloudForms Management Engine 5.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nSecurity Fix(es):\n\n* python-paramiko: Authentication bypass in transport.py (CVE-2018-7750)\n\n* ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges (CVE-2018-1101)\n\nRed Hat would like to thank Graham Mainwaring of Red Hat for reporting CVE-2018-1101.\n\n* ansible-tower: Remote code execution by users with access to define variables in job templates (CVE-2018-1104)\n\nRed Hat would like to thank Simon Vikstr\u00f6m for reporting CVE-2018-1104.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1328", "url": "https://access.redhat.com/errata/RHSA-2018:1328" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1495849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495849" }, { "category": "external", "summary": "1510499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510499" }, { "category": "external", "summary": "1526086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526086" }, { "category": "external", "summary": "1526088", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526088" }, { "category": "external", "summary": "1530680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530680" }, { "category": "external", "summary": "1530760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530760" }, { "category": "external", "summary": "1533220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533220" }, { "category": "external", "summary": "1533233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533233" }, { "category": "external", "summary": "1533515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533515" }, { "category": "external", "summary": "1538094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538094" }, { "category": "external", "summary": "1538100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538100" }, { "category": "external", "summary": "1549625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549625" }, { "category": "external", "summary": "1549722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549722" }, { "category": "external", "summary": "1550728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550728" }, { "category": "external", "summary": "1550730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550730" }, { "category": "external", "summary": "1550736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550736" }, { "category": "external", "summary": "1551692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551692" }, { "category": "external", "summary": "1551696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551696" }, { "category": "external", "summary": "1551698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551698" }, { "category": "external", "summary": "1551703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551703" }, { "category": "external", "summary": "1552266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552266" }, { "category": "external", "summary": "1552269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552269" }, { "category": "external", "summary": "1552278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552278" }, { "category": "external", "summary": "1552282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552282" }, { "category": "external", "summary": "1552288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552288" }, { "category": "external", "summary": "1552290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552290" }, { "category": "external", "summary": "1552301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552301" }, { "category": "external", "summary": "1552303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552303" }, { "category": "external", "summary": "1552305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552305" }, { "category": "external", "summary": "1552323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552323" }, { "category": "external", "summary": "1552334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552334" }, { "category": "external", "summary": "1552335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552335" }, { "category": "external", "summary": "1552671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552671" }, { "category": "external", "summary": "1552673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552673" }, { "category": "external", "summary": "1552677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552677" }, { "category": "external", "summary": "1552704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552704" }, { "category": "external", "summary": "1552707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552707" }, { "category": "external", "summary": "1552723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552723" }, { "category": "external", "summary": "1552735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552735" }, { "category": "external", "summary": "1552737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552737" }, { "category": "external", "summary": "1552739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552739" }, { "category": "external", "summary": "1552740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552740" }, { "category": "external", "summary": "1552741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552741" }, { "category": "external", "summary": "1552743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552743" }, { "category": "external", "summary": "1552746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552746" }, { "category": "external", "summary": "1552748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552748" }, { "category": "external", "summary": "1552753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552753" }, { "category": "external", "summary": "1552762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552762" }, { "category": "external", "summary": "1552763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552763" }, { "category": "external", "summary": "1552776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552776" }, { "category": "external", "summary": "1552782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552782" }, { "category": "external", "summary": "1552783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552783" }, { "category": "external", "summary": "1552785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552785" }, { "category": "external", "summary": "1552790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552790" }, { "category": "external", "summary": "1552791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552791" }, { "category": "external", "summary": "1552792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552792" }, { "category": "external", "summary": "1552794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552794" }, { "category": "external", "summary": "1552796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552796" }, { "category": "external", "summary": "1552798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552798" }, { "category": "external", "summary": "1552800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552800" }, { "category": "external", "summary": "1552801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552801" }, { "category": "external", "summary": "1552802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552802" }, { "category": "external", "summary": "1552804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552804" }, { "category": "external", "summary": "1552809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552809" }, { "category": "external", "summary": "1552817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552817" }, { "category": "external", "summary": "1552824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552824" }, { "category": "external", "summary": "1552826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552826" }, { "category": "external", "summary": "1552828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552828" }, { "category": "external", "summary": "1552838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552838" }, { "category": "external", "summary": "1552842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552842" }, { "category": "external", "summary": "1552873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552873" }, { "category": "external", "summary": "1552879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552879" }, { "category": "external", "summary": "1552880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552880" }, { "category": "external", "summary": "1552882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552882" }, { "category": "external", "summary": "1552884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552884" }, { "category": "external", "summary": "1552886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552886" }, { "category": "external", "summary": "1552889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552889" }, { "category": "external", "summary": "1552890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552890" }, { "category": "external", "summary": "1552895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552895" }, { "category": "external", "summary": "1552900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552900" }, { "category": "external", "summary": "1552903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552903" }, { "category": "external", "summary": "1552904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552904" }, { "category": "external", "summary": "1552908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552908" }, { "category": "external", "summary": "1553191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553191" }, { "category": "external", "summary": "1553197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553197" }, { "category": "external", "summary": "1553214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553214" }, { "category": "external", "summary": "1553224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553224" }, { "category": "external", "summary": "1553241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553241" }, { "category": "external", "summary": "1553242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553242" }, { "category": "external", "summary": "1553243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553243" }, { "category": "external", "summary": "1553244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553244" }, { "category": "external", "summary": "1553251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553251" }, { "category": "external", "summary": "1553288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553288" }, { "category": "external", "summary": "1553295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553295" }, { "category": "external", "summary": "1553304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553304" }, { "category": "external", "summary": "1553307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553307" }, { "category": "external", "summary": "1553309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553309" }, { "category": "external", "summary": "1553311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553311" }, { "category": "external", "summary": "1553315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553315" }, { "category": "external", "summary": "1553316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553316" }, { "category": "external", "summary": "1553317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553317" }, { "category": "external", "summary": "1553319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553319" }, { "category": "external", "summary": "1553322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553322" }, { "category": "external", "summary": "1553323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553323" }, { "category": "external", "summary": "1553326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553326" }, { "category": "external", "summary": "1553327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553327" }, { "category": "external", "summary": "1553329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553329" }, { "category": "external", "summary": "1553336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553336" }, { "category": "external", "summary": "1553340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553340" }, { "category": "external", "summary": "1553345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553345" }, { "category": "external", "summary": "1553362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553362" }, { "category": "external", "summary": "1553384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553384" }, { "category": "external", "summary": "1553389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553389" }, { "category": "external", "summary": "1553392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553392" }, { "category": "external", "summary": "1553393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553393" }, { "category": "external", "summary": "1553396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553396" }, { "category": "external", "summary": "1553397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553397" }, { "category": "external", "summary": "1553399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553399" }, { "category": "external", "summary": "1553480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553480" }, { "category": "external", "summary": "1553482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553482" }, { "category": "external", "summary": "1553483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553483" }, { "category": "external", "summary": "1553768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553768" }, { "category": "external", "summary": "1553776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553776" }, { "category": "external", "summary": "1553779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553779" }, { "category": "external", "summary": "1553780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553780" }, { "category": "external", "summary": "1553789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553789" }, { "category": "external", "summary": "1553791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553791" }, { "category": "external", "summary": "1553836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553836" }, { "category": "external", "summary": "1553873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553873" }, { "category": "external", "summary": "1553903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553903" }, { "category": "external", "summary": "1554358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554358" }, { "category": "external", "summary": "1554370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554370" }, { "category": "external", "summary": "1554454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554454" }, { "category": "external", "summary": "1554532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554532" }, { "category": "external", "summary": "1554541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554541" }, { "category": "external", "summary": "1554823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554823" }, { "category": "external", "summary": "1554825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554825" }, { "category": "external", "summary": "1554832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554832" }, { "category": "external", "summary": "1554839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554839" }, { "category": "external", "summary": "1554889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554889" }, { "category": "external", "summary": "1554898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554898" }, { "category": "external", "summary": "1554901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554901" }, { "category": "external", "summary": "1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "1557353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557353" }, { "category": "external", "summary": "1557361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557361" }, { "category": "external", "summary": "1557367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557367" }, { "category": "external", "summary": "1557378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557378" }, { "category": "external", "summary": "1557380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557380" }, { "category": "external", "summary": "1557388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557388" }, { "category": "external", "summary": "1557391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557391" }, { "category": "external", "summary": "1557400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557400" }, { "category": "external", "summary": "1558030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558030" }, { "category": "external", "summary": "1558038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558038" }, { "category": "external", "summary": "1558040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558040" }, { "category": "external", "summary": "1558046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558046" }, { "category": "external", "summary": "1558048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558048" }, { "category": "external", "summary": "1558078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558078" }, { "category": "external", "summary": "1558092", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558092" }, { "category": "external", "summary": "1558142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558142" }, { "category": "external", "summary": "1558144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558144" }, { "category": "external", "summary": "1558544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558544" }, { "category": "external", "summary": "1558594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558594" }, { "category": "external", "summary": "1558610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558610" }, { "category": "external", "summary": "1558621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558621" }, { "category": "external", "summary": "1558626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558626" }, { "category": "external", "summary": "1559475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559475" }, { "category": "external", "summary": "1559479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559479" }, { "category": "external", "summary": "1559483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559483" }, { "category": "external", "summary": "1559543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559543" }, { "category": "external", "summary": "1559544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559544" }, { "category": "external", "summary": "1559550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559550" }, { "category": "external", "summary": "1559552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559552" }, { "category": "external", "summary": "1559609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559609" }, { "category": "external", "summary": "1559624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559624" }, { "category": "external", "summary": "1560004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560004" }, { "category": "external", "summary": "1560096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560096" }, { "category": "external", "summary": "1560098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560098" }, { "category": "external", "summary": "1560100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560100" }, { "category": "external", "summary": "1560104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560104" }, { "category": "external", "summary": "1560692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560692" }, { "category": "external", "summary": "1560699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560699" }, { "category": "external", "summary": "1560703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560703" }, { "category": "external", "summary": "1560708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560708" }, { "category": "external", "summary": "1561076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561076" }, { "category": "external", "summary": "1561079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561079" }, { "category": "external", "summary": "1561085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561085" }, { "category": "external", "summary": "1561091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561091" }, { "category": "external", "summary": "1561096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561096" }, { "category": "external", "summary": "1561107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561107" }, { "category": "external", "summary": "1561216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561216" }, { "category": "external", "summary": "1561218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561218" }, { "category": "external", "summary": "1561222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561222" }, { "category": "external", "summary": "1562075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562075" }, { "category": "external", "summary": "1562235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562235" }, { "category": "external", "summary": "1562772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562772" }, { "category": "external", "summary": "1562777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562777" }, { "category": "external", "summary": "1562779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562779" }, { "category": "external", "summary": "1562780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562780" }, { "category": "external", "summary": "1562782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562782" }, { "category": "external", "summary": "1562785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562785" }, { "category": "external", "summary": "1562788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562788" }, { "category": "external", "summary": "1562791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562791" }, { "category": "external", "summary": "1562797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562797" }, { "category": "external", "summary": "1562800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562800" }, { "category": "external", "summary": "1562803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562803" }, { "category": "external", "summary": "1562811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562811" }, { "category": "external", "summary": "1563268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563268" }, { "category": "external", "summary": "1563351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563351" }, { "category": "external", "summary": "1563358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563358" }, { "category": "external", "summary": "1563359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563359" }, { "category": "external", "summary": "1563361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563361" }, { "category": "external", "summary": "1563363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563363" }, { "category": "external", "summary": "1563364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563364" }, { "category": "external", "summary": "1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "1563731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563731" }, { "category": "external", "summary": "1563740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563740" }, { "category": "external", "summary": "1565139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565139" }, { "category": "external", "summary": "1565140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565140" }, { "category": "external", "summary": "1565142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565142" }, { "category": "external", "summary": "1565147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565147" }, { "category": "external", "summary": "1565148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565148" }, { "category": "external", "summary": "1565151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565151" }, { "category": "external", "summary": "1565156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565156" }, { "category": "external", "summary": "1565160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565160" }, { "category": "external", "summary": "1565167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565167" }, { "category": "external", "summary": "1565232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565232" }, { "category": "external", "summary": "1565677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565677" }, { "category": "external", "summary": "1565686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565686" }, { "category": "external", "summary": "1565756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565756" }, { "category": "external", "summary": "1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "1566255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566255" }, { "category": "external", "summary": "1566526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566526" }, { "category": "external", "summary": "1566529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566529" }, { "category": "external", "summary": "1566530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566530" }, { "category": "external", "summary": "1566541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566541" }, { "category": "external", "summary": "1566557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566557" }, { "category": "external", "summary": "1566562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566562" }, { "category": "external", "summary": "1566563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566563" }, { "category": "external", "summary": "1566568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566568" }, { "category": "external", "summary": "1566572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566572" }, { "category": "external", "summary": "1566577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566577" }, { "category": "external", "summary": "1566658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566658" }, { "category": "external", "summary": "1567278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567278" }, { "category": "external", "summary": "1567962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567962" }, { "category": "external", "summary": "1568023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568023" }, { "category": "external", "summary": "1568091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568091" }, { "category": "external", "summary": "1568156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568156" }, { "category": "external", "summary": "1568158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568158" }, { "category": "external", "summary": "1568162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568162" }, { "category": "external", "summary": "1568467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568467" }, { "category": "external", "summary": "1568473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568473" }, { "category": "external", "summary": "1568550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568550" }, { "category": "external", "summary": "1568559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568559" }, { "category": "external", "summary": "1568602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568602" }, { "category": "external", "summary": "1569099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569099" }, { "category": "external", "summary": "1569103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569103" }, { "category": "external", "summary": "1569113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569113" }, { "category": "external", "summary": "1569177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569177" }, { "category": "external", "summary": "1569236", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569236" }, { "category": "external", "summary": "1569472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569472" }, { "category": "external", "summary": "1569551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569551" }, { "category": "external", "summary": "1570118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570118" }, { "category": "external", "summary": "1570821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570821" }, { "category": "external", "summary": "1570950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570950" }, { "category": "external", "summary": "1570989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570989" }, { "category": "external", "summary": "1571310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571310" }, { "category": "external", "summary": "1571976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571976" }, { "category": "external", "summary": "1571989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571989" }, { "category": "external", "summary": "1572711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572711" }, { "category": "external", "summary": "1572716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572716" }, { "category": "external", "summary": "1572718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572718" }, { "category": "external", "summary": "1573215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573215" }, { "category": "external", "summary": "1573246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573246" }, { "category": "external", "summary": "1573254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573254" }, { "category": "external", "summary": "1573539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573539" }, { "category": "external", "summary": "1573990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573990" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1328.json" } ], "title": "Red Hat Security Advisory: CloudForms 4.6.2 bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-22T11:48:46+00:00", "generator": { "date": "2024-11-22T11:48:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1328", "initial_release_date": "2018-05-07T20:42:50+00:00", "revision_history": [ { "date": "2018-05-07T20:42:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-07T20:42:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:48:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms Management Engine 5.9", "product": { "name": "CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-libs@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-server@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-plpython@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-pltcl@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-plperl@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-devel@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-debuginfo@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-contrib@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-test@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product": { "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product_id": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96-docs@9.6.6-1PGDG.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-doc@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json-debuginfo@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product": { "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product_id": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product": { "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product_id": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-debuginfo@0.22.0-2.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-venv-tower@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-venv-ansible@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-setup@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-server@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product": { "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product_id": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower-ui@3.2.4-1.el7at?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-common@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-tools@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset-debuginfo@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=x86_64" } } }, { "category": "product_version", "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "postgresql96-0:9.6.6-1PGDG.el7.src", "product": { "name": "postgresql96-0:9.6.6-1PGDG.el7.src", "product_id": "postgresql96-0:9.6.6-1PGDG.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql96@9.6.6-1PGDG.el7?arch=src" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_id": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-json@2.1.0-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "dbus-api-service-0:1.0.1-3.el7cf.src", "product": { "name": "dbus-api-service-0:1.0.1-3.el7cf.src", "product_id": "dbus-api-service-0:1.0.1-3.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dbus-api-service@1.0.1-3.el7cf?arch=src" } } }, { "category": "product_version", "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product_id": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-configmap-generator@0.2.1-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product_id": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton@0.22.0-2.el7cf?arch=src" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.src", "product": { "name": "python-paramiko-0:2.1.1-4.el7.src", "product_id": "python-paramiko-0:2.1.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-tower-0:3.2.4-1.el7at.src", "product": { "name": "ansible-tower-0:3.2.4-1.el7at.src", "product_id": "ansible-tower-0:3.2.4-1.el7at.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-tower@3.2.4-1.el7at?arch=src" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.src", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.src", "product_id": "ansible-0:2.4.4.0-1.el7ae.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=src" } } }, { "category": "product_version", "name": "cfme-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-appliance@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-gemset@5.9.2.4-1.el7cf?arch=src" } } }, { "category": "product_version", "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product_id": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cfme-amazon-smartstate@5.9.2.4-1.el7cf?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product": { "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product_id": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-ruby23-rubygem-qpid_proton-doc@0.22.0-2.el7cf?arch=noarch" } } }, { "category": "product_version", "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko-doc@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product": { "name": "python-paramiko-0:2.1.1-4.el7.noarch", "product_id": "python-paramiko-0:2.1.1-4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paramiko@2.1.1-4.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_id": "ansible-0:2.4.4.0-1.el7ae.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible@2.4.4.0-1.el7ae?arch=noarch" } } }, { "category": "product_version", "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product": { "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product_id": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-doc@2.4.4.0-1.el7ae?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-0:2.4.4.0-1.el7ae.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src" }, "product_reference": "ansible-0:2.4.4.0-1.el7ae.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-doc-0:2.4.4.0-1.el7ae.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch" }, "product_reference": "ansible-doc-0:2.4.4.0-1.el7ae.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-0:3.2.4-1.el7at.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src" }, "product_reference": "ansible-tower-0:3.2.4-1.el7at.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-server-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-server-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64" }, "product_reference": "ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src" }, "product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64" }, "product_reference": "cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "dbus-api-service-0:1.0.1-3.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src" }, "product_reference": "dbus-api-service-0:1.0.1-3.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "dbus-api-service-0:1.0.1-3.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64" }, "product_reference": "dbus-api-service-0:1.0.1-3.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src" }, "product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64" }, "product_reference": "httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-0:9.6.6-1PGDG.el7.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src" }, "product_reference": "postgresql96-0:9.6.6-1PGDG.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64" }, "product_reference": "postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-0:2.1.1-4.el7.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src" }, "product_reference": "python-paramiko-0:2.1.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "python-paramiko-doc-0:2.1.1-4.el7.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch" }, "product_reference": "python-paramiko-doc-0:2.1.1-4.el7.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64 as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "relates_to_product_reference": "7Server-RH7-CFME-5.9" }, { "category": "default_component_of", "full_product_name": { "name": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch as a component of CloudForms Management Engine 5.9", "product_id": "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" }, "product_reference": "rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch", "relates_to_product_reference": "7Server-RH7-CFME-5.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Graham Mainwaring" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1101", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1563492" } ], "notes": [ { "category": "description", "text": "Ansible Tower, before version 3.2.4, has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1101" }, { "category": "external", "summary": "RHBZ#1563492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1101", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1101" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges" }, { "acknowledgments": [ { "names": [ "Simon Vikstr\u00f6m" ] } ], "cve": "CVE-2018-1104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1565862" } ], "notes": [ { "category": "description", "text": "Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.", "title": "Vulnerability description" }, { "category": "summary", "text": "ansible-tower: Remote code execution by users with access to define variables in job templates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1104" }, { "category": "external", "summary": "RHBZ#1565862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1104", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1104" } ], "release_date": "2018-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ansible-tower: Remote code execution by users with access to define variables in job templates" }, { "cve": "CVE-2018-7750", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1557130" } ], "notes": [ { "category": "description", "text": "It was found that when acting as an SSH server, paramiko did not properly check whether authentication is completed before processing other requests. A customized SSH client could use this to bypass authentication when accessing any resources controlled by paramiko.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-paramiko: Authentication bypass in transport.py", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is a user authentication bypass in the SSH Server functionality of paramiko (normally used by subclassing `paramiko.ServerInterface`). Where paramiko is used only for its client-side functionality (e.g. `paramiko.SSHClient`), the vulnerability is not exposed and thus cannot be exploited.\n\nThe following Red Hat products use paramiko only in client-side mode. Server side functionality is not used.\n\n* Red Hat Ceph Storage 2\n* Red Hat CloudForms 4\n* Red Hat Enterprise Linux 7\n* Red Hat Enterprise Virtualization\n* Red Hat Gluster Storage 3\n* Red Hat Openshift Container Platform\n* Red Hat Quick Cloud Installer\n* Red Hat Satellite 6\n* Red Hat Storage Console 2\n* Red Hat OpenStack Platform\n* Red Hat Update Infrastructure", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7750" }, { "category": "external", "summary": "RHBZ#1557130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557130" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7750", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7750" } ], "release_date": "2018-03-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-07T20:42:50+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1328" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-0:2.4.4.0-1.el7ae.src", "7Server-RH7-CFME-5.9:ansible-doc-0:2.4.4.0-1.el7ae.noarch", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.src", "7Server-RH7-CFME-5.9:ansible-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-server-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-setup-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-ui-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-ansible-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:ansible-tower-venv-tower-0:3.2.4-1.el7at.x86_64", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-amazon-smartstate-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-appliance-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-common-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-appliance-tools-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.src", "7Server-RH7-CFME-5.9:cfme-gemset-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:cfme-gemset-debuginfo-0:5.9.2.4-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.src", "7Server-RH7-CFME-5.9:dbus-api-service-0:1.0.1-3.el7cf.x86_64", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.src", "7Server-RH7-CFME-5.9:httpd-configmap-generator-0:0.2.1-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.src", "7Server-RH7-CFME-5.9:postgresql96-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-contrib-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-debuginfo-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-devel-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-docs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-libs-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plperl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-plpython-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-pltcl-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-server-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:postgresql96-test-0:9.6.6-1PGDG.el7.x86_64", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:python-paramiko-0:2.1.1-4.el7.src", "7Server-RH7-CFME-5.9:python-paramiko-doc-0:2.1.1-4.el7.noarch", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-debuginfo-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-json-doc-0:2.1.0-1.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.src", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-debuginfo-0:0.22.0-2.el7cf.x86_64", "7Server-RH7-CFME-5.9:rh-ruby23-rubygem-qpid_proton-doc-0:0.22.0-2.el7cf.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-paramiko: Authentication bypass in transport.py" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.