var-202006-1825
Vulnerability from variot

FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity). FasterXML jackson-databind Exists in an unreliable data deserialization vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. FasterXML Jackson is a data processing tool for Java developed by American FasterXML Company. jackson-databind is one of the components with data binding function. A security vulnerability exists in FasterXML jackson-databind 2.x versions prior to 2.9.10.5. An attacker could exploit this vulnerability to execute arbitrary code on the system by sending specially crafted input. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: Satellite 6.8 release Advisory ID: RHSA-2020:4366-01 Product: Red Hat Satellite 6 Advisory URL: https://access.redhat.com/errata/RHSA-2020:4366 Issue date: 2020-10-27 CVE Names: CVE-2018-3258 CVE-2018-11751 CVE-2019-12781 CVE-2019-16782 CVE-2020-5216 CVE-2020-5217 CVE-2020-5267 CVE-2020-7238 CVE-2020-7663 CVE-2020-7942 CVE-2020-7943 CVE-2020-8161 CVE-2020-8184 CVE-2020-8840 CVE-2020-9546 CVE-2020-9547 CVE-2020-9548 CVE-2020-10693 CVE-2020-10968 CVE-2020-10969 CVE-2020-11619 CVE-2020-14061 CVE-2020-14062 CVE-2020-14195 CVE-2020-14334 CVE-2020-14380 ==================================================================== 1. Summary:

An update is now available for Red Hat Satellite 6.8 for RHEL 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Satellite 6.7 - noarch, x86_64 Red Hat Satellite Capsule 6.8 - noarch, x86_64

  1. Description:

Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool.

Security Fix(es):

  • mysql-connector-java: Connector/J unspecified vulnerability (CPU October 2018) (CVE-2018-3258)
  • netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)
  • rubygem-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser (CVE-2020-7663)
  • puppet: puppet server and puppetDB may leak sensitive information via metrics API (CVE-2020-7943)
  • jackson-databind: multiple serialization gadgets (CVE-2020-8840 CVE-2020-9546 CVE-2020-9547 CVE-2020-9548 CVE-2020-10968 CVE-2020-10969 CVE-2020-11619 CVE-2020-14061 CVE-2020-14062 CVE-2020-14195)
  • foreman: unauthorized cache read on RPM-based installations through local user (CVE-2020-14334)
  • Satellite: Local user impersonation by Single sign-on (SSO) user leads to account takeover (CVE-2020-14380)
  • Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS (CVE-2019-12781)
  • rubygem-rack: hijack sessions by using timing attacks targeting the session id (CVE-2019-16782)
  • rubygem-secure_headers: limited header injection when using dynamic overrides with user input (CVE-2020-5216)
  • rubygem-secure_headers: directive injection when using dynamic overrides with user input (CVE-2020-5217)
  • rubygem-actionview: views that use the j or escape_javascript methods are susceptible to XSS attacks (CVE-2020-5267)
  • puppet: Arbitrary catalog retrieval (CVE-2020-7942)
  • rubygem-rack: directory traversal in Rack::Directory (CVE-2020-8161)
  • rubygem-rack: percent-encoded cookies can be used to overwrite existing prefixed cookie names (CVE-2020-8184)
  • hibernate-validator: Improper input validation in the interpolation of constraint error messages (CVE-2020-10693)
  • puppet-agent: Puppet Agent does not properly verify SSL connection when downloading a CRL (CVE-2018-11751)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

  • Provides the Satellite Ansible Modules that allow for full automation of your Satellite configuration and deployment.

  • Adds ability to install Satellite and Capsules and manage hosts in a IPv6 network environment

  • Ansible based Capsule Upgrade automation: Ability to centrally upgrade all of your Capsule servers with a single job execution.

  • Platform upgrades to Postgres 12, Ansible 2.9, Ruby on Rails and latest version of Puppet

  • Support for HTTP UEFI provisioning

  • Support for CAC card authentication with Keycloak integration

  • Add ability to upgrade Red Hat Enterprise Linux 7 hosts to version 8 using the LEAPP based tooling.

  • Support for Red Hat Enterprise Linux Traces integration

  • satellite-maintain & foreman-maintain are now self updating

  • Notifications in the UI to warn users when subscriptions are expiring.

The items above are not a complete list of changes. This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.

  1. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1160344 - [RFE] Satellite support for cname as alternate cname for satellite server 1261802 - [RFE] Make the foreman bootdisk full-host image work on UEFI systems 1300211 - capsule-certs-generate failed to increment release number when generating certificate rpm for foreman-proxy 1332702 - smart-proxy-openscap-send with additional features - alert if file corrupt 1398317 - For the vms built by Satellite 6 using "Network Based" installation mode on VMWare, unable to change the boot sequence via BIOS 1410616 - [RFE] Prominent notification of expiring subscriptions. 1410916 - Should only be able to add repositories you have access to 1429033 - Host provisioned with RHEL Workstation OS, after provisioning displayed as generic RedHat 7.3 1461781 - [RFE]A button should be available in the GUI to clear the recurring logics. 1469267 - need updated rubygem-rake 1486446 - Content view versions list has slow query for package count 1486696 - 'hammer host update' removes existing host parameters 1494180 - Sorting by network address for subnet doesn't work properly 1501499 - tomcat listens to 0.0.0.0 for serving requests but just needs localhost 1503037 - [RFE] Cancelled future/recurring job invocations should not get the status "failed" but rather "cancelled" 1505842 - Remote Execution engine: Error initializing command: Net::SSH::HostKeyMismatch - fingerprint 20:a9:b7:45:1a:b7:d6:42:1e:03:d1:1f:06:20:4c:e2 does not match for "172.17.0.101" 1531674 - Operating System Templates are ordered inconsistently in UI. 1537320 - [RFE] Support for Capsules at 1 version lower than Satellite 1543316 - Satellite 6.2 Upgrade Fails with error "rake aborted! NoMethodError: undefined method first' for nil:NilClass" when there are custom bookmarks created 1563270 - Sync status information is lost after cleaning up old tasks related to sync. 1569324 - Webrick is unable to use 2 supported TLS v1.2 ciphers ('ECDHE-RSA-AES128-GCM-SHA256', 'ECDHE-RSA-AES256-GCM-SHA384') 1571907 - Passenger threads throwing tracebacks on API jobs after spawning 1576859 - [RFE] Implement automatic assigning subnets through data provided by facter 1584184 - [RFE] The locked template is getting overridden by default 1601101 - [RFE] Add autofill functionality to the Job invocation Search query box, copy from Hosts search box 1607706 - [RFE] Add support for --vlanid in Satellite Kickstart Default provisioning template 1608001 - Rearrange search/filter options on Red Hat Repositories page. 1613391 - race condition on removing multiple organizations simultaneously 1619274 - [RFE] Red Hat Satellite should now be able to discover and provision bare metal machines via UEFI HTTP boot 1619422 - User Agent for Downstream RSS feed still says Foreman and Foreman Version 1620214 - Page should auto-refresh after subscriptions have been modified on the Satellite webui 1624049 - Changing the organization in the Satellite WebUI does not change the sync plan page information from the previous organization 1625258 - Having empty "Allocation (GB)" when creating a new Host, nil:NilClass returned on creating the Host 1627066 - Unable to revert to the original version of the provisioning template 1630433 - [RFE] Include Ansible Satellite modules with Ansible Core modules 1630536 - yum repos password stored as cleartext 1632577 - Audit log show 'missing' for adding/removing repository to a CV 1640615 - CVE-2018-3258 mysql-connector-java: Connector/J unspecified vulnerability (CPU October 2018) 1645062 - host_collection controller responds with 200 instead of 201 to a POST request 1645749 - repositories controller responds with 200 instead of 201 to a POST request 1647216 - Lack of edit_smart_proxies permission causes error when setting host to Build 1647364 - [RFE] Extend the audits by the http request id 1647781 - Audits contain no data (Added foo to Missing(ID: x)) 1651297 - Very slow query when using facts on user roles as filters 1653217 - [RFE] More evocative name for Play Ansible Roles option? 1654347 - Satellite may create duplicate CreateRssNotifications tasks after restarting foreman tasks 1654375 - [RFE] Mention specifically uder the admin chexbox for AD LDAP user if its created with admin role, 1659418 - katello-tracer-upload failing with error "ImportError: No module named katello" 1665277 - subscription manager register activation key with special character failed 1665893 - candlepin refuses to start or hangs periodically when having too many messages in ActiveMQ journal 1666693 - Command "hammer subscription list" is not correctly showing the comment "Guests of " in the "Type" field in the output. 1677907 - Ansible API endpoints return 404 1680157 - [RFE] Puppet 'package' provider type does not support selecting modularity streams 1680458 - Locked Report Templates are getting removed. 1680567 - Reporting Engine API to list report template per organization/location returns 404 error 1681619 - [RFE] Disable the option to enter a MAC address after selecting a compute resource while creating new hosts through Satellite 1685949 - [RFE] Support passing of attribute name instead of Id's in RHV workflow 1687116 - kernel version checks should not use /lib/modules to determine running version 1688886 - subscription-manager not attaching the right quantity per the cpu core 1691416 - Delays when many clients upload tracer data simultaneously 1697476 - [RFE] To be able to see the name of the provisioning template being used to build a host from the host itself 1702434 - foreman-bootloaders-redhat-tftpboot expected file permissions in package don't match runtime permissions 1705097 - An empty report file doesn't show any headers 1709557 - [RFE] warn the user if they have done a select all and it includes the restart|reboot service 1709842 - Tracer shows the machines needs rebooting even after reboot if kernel-debug is installed 1710511 - Filter by os_minor includes unexpected values on the Satellite web UI. 1715999 - Use Infoblox API for DNS conflict check and not system resolver 1716423 - Nonexistent quota can be set 1717403 - Broken breadcrumbs link to compute resource VM list on VM detail page 1718012 - [RFE] Add a hard limit of 100 items to restrict any fact child-hash/array 1718954 - [RFE] When the contentAccessMode is set to org_environment for an owner, we should disable auto-attach globally 1719509 - [RFE] "hammer host list" including erratas information 1719516 - [RFE] "hammer host-collection hosts" including erratas information 1720725 - [RFE] Ability to override DHCP options and wait_after_restart option for race condition 1721419 - SSH key cannot be added when FIPS enabled 1722954 - Slow performance when running "hammer host list" with a high number of Content Hosts (15k+ for example) 1723313 - foreman_tasks:cleanup description contain inconsistent information 1724494 - [Capsule][smart_proxy_dynflow_core] "PID file /var/run/foreman-proxy/smart_proxy_dynflow_core.pid not readable (yet?) after start" 1724497 - CVE-2019-12781 Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS 1726768 - [RFE] Red Hat Satellite 6 GUI, Tasks should show Full name 1729968 - Editing disk size of a Compute Profile for a VMware Compute Resource makes the whole Storage section disappear 1730083 - [RFE] Add Jobs button to host detail page 1731155 - Cloud init template missing snippet compared to Kickstart default user data 1731229 - podman search against Red Hat Satellite 6 fails. 1731235 - [RFE] Create Report Template to list inactive hosts 1733241 - [RFE] hammer does not inherit parent location information 1733650 - Satellite receives RPM1004 pulp error and 403 Forbidden http error retrieving packages from CDN 1736809 - undefined methodsplit' for nil:NilClass when viewing the host info with hammer 1737135 - Content Hosts loses subscriptions after Vmotion and auto attach is unable to assigned the subscriptions if any other subscription is already attached to the host. 1737564 - [RFE] Support custom images on Azure 1738548 - Parameter --openscap-proxy-id is missing in hammer host create command. 1740943 - Increasing Ansible verbosity level does not increase the verbosity of output 1743056 - While creating a host for a particular location, all the domains are in the pull down list, even if only one domain is selected for that location. 1743776 - Error while deleting the content view version. 1745516 - Multiple duplicate index entries are present in candlepin database 1746936 - satellite6 is not using remote execution by default even after setting remote execution by default from satellite web-UI. 1749692 - Default Rhel8 scap content does not get populated on the Satellite 1749916 - [RFE] Satellite should support certificates with > 2048 Key size 1751981 - Parent object properties are not propagated to Child objects in Location and Host Group 1752880 - katello-host-tools-tracer stats paths abusively, leading to a hang or slowness of yum command 1753551 - Traces output from Satellite GUI has mismatches with client tracer output 1756991 - 2 inputs with same name -> uninitialized constant #::NonUniqueInputsError 1757317 - [RFE] Dynflow workers extraction 1757394 - [BUG] Non-admin users always get "Missing one of the required permissions" message while accessing their own table_preferences via Satellite 6 API 1759160 - Rake task for cleaning up DHCP records on proxy 1761872 - Disabled buttons are still working 1763178 - [RFE] Unnecessary call to userhelp and therefore log entries 1763816 - [RFE] Report which users access the API 1766613 - Fact search bar broken and resets to only searching hostname 1766906 - Associating more than 10 Ansible roles to a Host only sets based on the per-page setting 1767497 - Compute Resource filter does not correctly allow Refresh Cache 1767635 - [RFE] Enable Organization and Location to be entered not just selected 1770366 - [RFE] Improve upgrade efficiency by moving RPM post-installation scripts to the installer. 1770544 - Puppet run job notification do not populate "%{puppet_options}"' value 1770777 - Changing concurrency level while executing Ansible jobs fail with NoMethodError: undefined method []' for nil:NilClass 1771367 - undefined methodrequest_uri' when Openidc Provider Token Endpoint is none 1771428 - Openscap documentation link on Satellite 6 webui is broke 1771484 - Client side documentation links are not branded 1771693 - 'Deployed on' parameter is not listed in API output 1772381 - Incorrect example to use multiple attributes as a matcher key in the tooltip for Order 1772517 - login with the user name as same as existing user group gives 500 ISE and wont allow user to login again 1772544 - Use APIv4 is not the default when creating a new compute resource in ovirt 1773298 - GET /katello/api/srpms/compare always fails with error: Missing template katello/api/v2/common/compare 1774710 - UI: When selecting the server type in ldap authentication, "attribute mappings" fields could be populated automatically 1778396 - exporting/importing report template process is causing a different report during the visualization (blank lines) 1778503 - Prepended text on OS name creation 1778681 - Some pages are missing title in html head 1779638 - Unable to filter/search http-proxies using Organization/Location for Satellite UI. 1781671 - While using concurrency_level in remote execution, job progress in WebUI is not being updated properly 1782352 - [RHEL 8.1 client] All packages are not getting updated after click on "Update All Packages" 1782426 - Viewing errata from a repository returns incorrect unfiltered results 1783568 - [RFE] - Bulk Tracer Remediation 1783882 - Ldap refresh failed with "Validation failed: Adding would cause a cycle!" 1784012 - Default kickstart places log to /mnt/sysimage/root/install.post.log 1784341 - disable CertificateRevocationListTask job in candlepin.conf by default 1785117 - [RFE] Add functionality in foreman logging to hash-out or mark as [FILTERED] the password in /var/log/foreman-maintain/foreman-maintain.log and /var/log/foreman-installer/satellite.log file 1785231 - Ansible Variable override to false does not gets reflected on client machine on Red Hat Satellite 6. 1785624 - [UI] Importing templates with associate 'never' is not resulting as expected 1785683 - Does not load datacenter when multiple compute resources are created for same VCenter 1785902 - Ansible RunHostJob tasks failed with "Failed to initialize: NoMethodError - undefined method []' for nil:NilClass" 1785940 - [RFE] Reporting template should allow host filtering based on applicable errata issue date 1787329 - change filename in initrd live CPIO archive to fdi.iso 1788261 - CVE-2018-11751 puppet-agent: Puppet Agent does not properly verify SSL connection when downloading a CRL 1788958 - [RFE] add "elapsed time" column to export and hammer, make it filterable in WebUI 1789006 - Smart proxy dynflow core listens on 0.0.0.0 1789100 - CVE-2019-16782 rubygem-rack: hijack sessions by using timing attacks targeting the session id 1789434 - Template editor not always allows refreshing of the preview pane 1789522 - On unhealthy Satellite, dynflow_envelopes table might grow indefinitely 1789686 - Non-admin user with enough permissions can't generate report of applicable errata 1789815 - The "start" parameter should be mentioned inside "--compute-attributes:" in hammer_cli for Satellite 6 1789911 - "foreman-rake katello:publish_unpublished_repositories" is referring to column which no longer exists in katello_repositories table. 1789924 - [RFE] As user I want to see a "disabled" status for Simple Content Access (Golden Ticketed) Orgs 1791654 - drop config_templates api endpoints and parameters 1791656 - drop deprecated host status endpoint 1791658 - drop reports api endpoint 1791659 - Removeuse_puppet_defaultapi params 1791663 - remove deprecated permissions api parameters 1791665 - drop deprecated compute resource uuid parameter 1792131 - [UI] Could not specify organization/location for users that come from keycloak 1792135 - Not able to login again if session expired from keycloak 1792174 - [RFE] Subscription report template 1792304 - When generating custom report, leave output format field empty 1792378 - [RFE] Long role names are cut off in the roles UI 1793951 - [RFE] Display request UUID on audits page 1794015 - When using boot disk based provisioning, sometimes foreman tries to recreate folder foreman_isos in the datastore even when the folder already exists 1794346 - Change the label for the flashing eye icon during user impersonation 1794641 - Sync status page's content are not being displayed properly. 1795809 - HTML tags visible on paused task page 1796155 - [RFE] host_collections not available in reporting engine unless safe mode disabled 1796205 - iso upload: correctly check if upload directory exists 1796225 - CVE-2020-7238 netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling 1796259 - loading subscriptions page is very slow 1796697 - Unable to list/enable EUS repositories on the RHEL clients registered in the satellite server with org_environment contentAccessMode 1798489 - [RHSSO] - If Access Token Lifespan is set to 5 mins then the user is getting sign out instead after idle SSO timeout 1798668 - Configure default MongoDB WiredTiger cache to be 20% of RAM in the Satellite server 1799480 - CLI - hammer repository info shows blank sync status if the repository sync is in warning/error state. 1800503 - In Hammer, it is not possible to set default keyboard layout for a RHEV host 1801264 - CVE-2020-5217 rubygem-secure_headers: directive injection when using dynamic overrides with user input 1801286 - CVE-2020-5216 rubygem-secure_headers: limited header injection when using dynamic overrides with user input 1802529 - Repository sync in tasks page shows percentage in 17 decimal points 1802631 - Importing Ansible variables yields NoMethodError: undefined methodmap' for nil:NilClass (initialize_variables) [variables_importer.rb] 1803846 - Red Hat Insights Risk Summary shows systems at risk while there are none 1804496 - While performing bulk actions, unable to select all tasks under Monitor --> Tasks page. 1804651 - Missing information about "Create Capsule" via webUI 1805501 - CVE-2020-10693 hibernate-validator: Improper input validation in the interpolation of constraint error messages 1805727 - Default Custom Repository download policy setting refers to old name (Default Repository download policy) in satellite 6.7 1806713 - hypervisor checkin fails with cp_consumer_hypervisor_ukey error 1806842 - Disabling dynflow_enable_console from setting should hide "Dynflow console" in Tasks 1806897 - Red Hat Inventory Uploads fail with NoMethodError: undefined method mtu' 1807042 - [RFE] Support additional disks for VM on Azure Compute Resource 1807321 - A non-admin users with view recurring_logics permissions are unable to list recurring logics. 1807829 - Generated inventory file doesn't exist 1807946 - Multiple duplicate index entries are present in foreman database 1808843 - Satellite lists unrelated RHV storage domains using v4 API 1810250 - Unable to delete repository - Content with ID could not be found 1810549 - dropping packets to qdrouterd triggers a memory leak in qpid-proton 0.28.0-2 libraries used by goferd 1810774 - Applying errata via Host Collection the errata are trying to be applied to all hosts associated with the host collection 1811390 - Links to an errata list of a repository lack repositoryId in URI and points to generic "errata" page instead 1812031 - Improve regenerate applicability tasks performance by querying NEVRA only data from repo_content_units 1812858 - Satellite Inventory Plugin does not appear to make reports which match yupana's API specification 1812904 - 'Hypervisors' task fails with 'undefined method[]' for nil:NilClass' error 1813005 - Prevent --tuning option to be applied in Capsule servers 1813313 - [Tracker] Test HTTP UEFI on IPv6 (QA only tracker) 1814095 - Applicable errata not showing up for module stream errata 1815104 - Locked provisioning template should not be allowed to add audit comment 1815135 - hammer does not support description for custom repositories 1815146 - Backslash escapes when downloading a JSON-formatted report multiple times 1815608 - Content Hosts has Access to Content View from Different Organization 1816330 - CVE-2020-8840 jackson-databind: Lacks certain xbean-reflect/JNDI blocking 1816332 - CVE-2020-9546 jackson-databind: Serialization gadgets in shaded-hikari-config 1816337 - CVE-2020-9547 jackson-databind: Serialization gadgets in ibatis-sqlmap 1816340 - CVE-2020-9548 jackson-databind: Serialization gadgets in anteros-core 1816699 - Satellite Receptor Installer role can miss accounts under certain conditions 1816720 - CVE-2020-7942 puppet: Arbitrary catalog retrieval 1816853 - Report generated by Red Hat Inventory Uploads is empty. 1817215 - Admin must be able to provide all the client ids involved inside Satellite settings. 1817224 - Loading one org's content view when switching to a different org 1817481 - Plugin does not set page 1817728 - Default task polling is too frequent at scale 1817874 - After data upload from satellite UI it is not visible on cloud.redhat.com. 1818062 - Deprecated message about katello agent being shown on content host registration page 1818816 - Web console should open in a new tab/window 1819145 - [RFE] Incorporate apipie-dsl to document template macros, provided as one-time generated HTML document 1819208 - CVE-2020-10968 jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.<em>.RmiProvider 1819212 - CVE-2020-10969 jackson-databind: Serialization gadgets in javax.swing.JEditorPane 1820193 - Deleted Global Http Proxy is still being used during repository sync. 1820245 - reports in JSON format can't handle unicode characters 1821182 - [Repository] - Packages are not getting synced with rpm-with-sha-512 1821335 - Inventory plugin captures information for systems with any entitlement 1821457 - [RFE] Capsules shouldn't update hosts' "Registered through" facts on the Satellite server in a load-balanced configuration. 1821629 - Eager zero seems to do nothing 1821651 - Manifest import task progress remains at 0. 1821752 - New version of the plugin is available: 1.0.5 1822039 - Get HTTP error when deploying the virt-who configure plugin 1822560 - Unable to sync large openshift docker repos 1823905 - Update distributor version to sat-6.7 1823991 - [RFE] Add a more performant way to sort reports 1824183 - Virtual host get counted as physical hosts on cloud.redhat.com 1824931 - After upgrading to Satellite 6.7 the Tasks page in WebUI goes "Blank" 1825760 - schedule inventory plugin sync failed due to 'organization_id' typecasting issue. 1825930 - [Regression] RedHat Insights client proxying stopped working due to missing proxy 1825978 - Manifest refresh failed with 'Katello::Errors::CandlepinError Invalid credentials.' error 1826298 - even when I cancel ReX job, remediation still shows it as running 1826340 - [RFE] Ability to provision a VM using Red Hat Gold BYOS images 1826515 - [RFE] Consume Candlepin events via STOMP 1826625 - Improve performance of externalNodes 1826678 - New version of the plugin is available: 2.0.6 1826734 - Tasks uses wrong controller name for bookmarks 1826805 - CVE-2020-11619 jackson-databind: Serialization gadgets in org.springframework:spring-aop 1827389 - Manifest import and delete calls Actions::Pulp::Repository::Refresh for non-Library repositories 1827583 - Installing dhcp_isc and dhcp_remote_isc fails with "You cannot specify the same gem twice with different version requirements.....You specified: rsec (< 1) and rsec (>= 0)" 1828257 - Receptor init file missing [Install] section, receptor service won't run after restart 1828486 - CVE-2020-7943 puppet: puppet server and puppetDB may leak sensitive information via metrics API 1828549 - Manifest Certificate Exposed by Unprivileged User 1828682 - Create compute resource shows console error 'Cannot read property 'aDataSort' of undefined' 1828789 - [RFE] Satellite installer should support installing the Satellite Inventory Provider by default 1828868 - Add keep alive option in Receptor node 1829487 - Ansible verbosity level does not work 1829766 - undefined method <code>tr' for nil:NilClass when trying to get a new DHCP lease from infoblox 1830253 - Default job templates are not locked 1830403 - Capsule sync fails when promoting a content view to more than one lifecyle env at the same time 1830834 - Unable to update default value of a smart class parameter (Sql query error). 1830860 - Refactor loading regions based on subscription dynamically 1830882 - Red Hat Satellite brand icon is missing 1830884 - bootstrap.py script tries to yum install puppet package that is not in rhel-7-server-satellite-tools-6.7-rpms repo 1831528 - CVE-2020-5267 rubygem-actionview: views that use the</code>j<code>or</code>escape_javascript<code>methods are susceptible to XSS attacks 1833031 - Improve RH account ID fetching in cloud connector playbook 1833035 - Add remediation bulk ack message (i.e. all hosts for a given run has finished) 1833039 - Introduce error code to playbook_run_finished response type 1833311 - "Failed to save: Failed to save when overriding parameters for ansible, cause: Default value is invalid" while creating scap policy with ansible deployment option. 1834302 - --enable-foreman-plugin-rh-cloud fails: Execution of '/bin/yum -d 0 -e 0 -y install tfm-rubygem-foreman_rh_cloud' returned 1: Error: Nothing to do 1834377 - Disable mongo FTDC 1834866 - Missing macro for "registered_at" host subscription facet 1834898 - Login Page background got centralized and cropped 1835189 - Missing macro for "host_redhat_subscriptions" in host subscription facet 1835241 - Some applicability of the consumers are not recalculated after syncing a repository 1835882 - While executing "Configure Cloud Connector" playbook on Satellite 6.7 server it does not honour HTTP Proxy setting 1836155 - Support follow on rails, travis and i18n work for AzureRm plugin 1836771 - In satellite installation summary report, satellite should be mentioned instead of foreman. 1836774 - Some foreman services failed to start (pulp_streamer) 1836845 - "Generate at" in report template should be current date 1837951 - "invalid Unicode Property \p: /\b\perform various actions through those proxies\b(?!-)/" warning messages appears in dynflow-sidekiq@worker-hosts-queue 1838160 - 'Registered hosts' report does not list kernel release for rhsm clients 1838191 - Arrow position is on left rather in the middle under "Start Time" 1838281 - CVE-2020-8161 rubygem-rack: directory traversal in Rack::Directory 1838917 - Repositories are not showing their available Release versions due to a low default db pool size 1838963 - Hypervisors from Satellite, never makes their way to HBI 1838965 - Product name link is not working on the activation keys "Repository Sets" tab. 1839025 - Configure Cloud Connector relies on information which is no longer provided by the API 1839649 - satellite-installer --reset returns a traceback 1839726 - Bring tfm-rubygem-foreman_leapp to downstream builds 1839779 - undefined local variable or method</code>implicit_order_column' for #<ActiveRecord::Associations::CollectionProxy> on GET request to /discovery_rules endpoint 1839966 - New version of the plugin is available: 2.0.7 1840166 - ERF42-4995 [Foreman::Exception]: Invalid authenticity token message displayed with traceback, If re-login the machine after session timed-out . 1840191 - Validate parameters passed by receptor to the receptor-satellite plugin 1840218 - ArgumentError: wrong number of arguments 1840525 - Content host list doesn't update after the successful deletion of content host. 1840635 - Proxy has failed to load one or more features (Realm) 1840723 - Selected scenario is DISABLED, can not continue 1840745 - Satellite installation failed with puppet error " No Puppet module parser is installed" 1841098 - Failed to resolve package dependency while doing satellite upgrade. 1841143 - Known hosts key removal may fail hard, preventing host from being provisioned 1841573 - Clicking breadcrumb "Auth Source Ldaps" on Create LDAP Auth Source results in "The page you were looking for doesn't exist." 1841818 - icons missing on /pub download page 1842900 - ERROR! the role 'satellite-receptor' was not found in ... 1842943 - ~foreman-proxy/.ssh is a symlink to /usr/com/foreman-proxy/ssh/ 1843406 - In 6.8, Receptor installation playbook's inputs are visible again 1843561 - Report templates duplicated 1843846 - Host - Registered Content Hosts report: "Safemode doesn't allow to access 'report_hraders' on #<Safemode::ScopeObject>" 1843867 - Satellite-installer failed with argument error while upgrading the satellite from 6.7 to 6.8 1843926 - satellite-change-hostname fails when running nsupdate 1844142 - [RFE] Drop a subsription-manager fact with the satellite version 1845112 - Installer deploys outdated version of pxegrub2 mac template to TFTP 1845486 - [RFE] Able to select 'HTTP Proxy' during Compute Resource create for 'GCE' as similar to EC2 1845860 - hammer org add-provisioning-template command returns Error: undefined method <code>[]' for nil:NilClass 1845978 - CVE-2020-7663 rubygem-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser 1846254 - need to restart services after enabling leapp plugin 1846313 - Add index on locks for resource type and task id 1846317 - undefined method</code>klass' for nil:NilClass 1846421 - build pxe default do not work when more than 1 provider 1846593 - Satellite-installer failed with error "Could not find a suitable provider for foreman_smartproxy" while doing upgrade from 6.7 to 6.8 1847019 - Empty applicability for non-modular repos 1847063 - Slow manifest import and/or refresh 1847407 - load_pools macro not in list of macros 1847645 - Allow override of Katello's DISTRIBUTOR_VERSION 1847784 - Error updating system data on the server, see /var/log/rhsm/rhsm.log for more details. 1847840 - Libvirt note link leads to 404 1847871 - Combined Profile Update: ArgumentError: invalid argument: nil. 1848291 - Download kernel/initram for kexec asynchronously 1848535 - Unable to create a pure IPv6 host 1848538 - Failed to resolve the packages due to tfm-runtime package dependency in fm-upgrade(6.7 to 6.8) 1848902 - ERF42-0258 [Foreman::Exception]: <uuid> is not valid, enter id or name 1848958 - CVE-2020-14195 jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory 1848962 - CVE-2020-14062 jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool 1848966 - CVE-2020-14061 jackson-databind: serialization in weblogic/oracle-aqjms 1848973 - capsule-certs-generate suggests running foreman-installer --scenario foreman-proxy-content instead of satellite-installer --scenario capsule 1849141 - CVE-2020-8184 rubygem-rack: percent-encoded cookies can be used to overwrite existing prefixed cookie names 1849656 - ERROR! You cannot use loops on 'import_tasks' statements. You should use 'include_tasks' instead. 1849680 - Task progress decimal precision discrepancy between UI, CLI, and API 1849869 - Unable to recycle the dynflow executor 1850355 - Auth Source Role Filters are not working in Satellite 6.8 1850536 - Can't add RHEV with APIv3 through Hammer 1850914 - Checksum type "sha256" is not available for all units in the repository. Make sure those units have been downloaded 1850934 - Satellite-installer failed with error "Could not evaluate: Proxy xyz..com cannot be retrieved: unknown error (response 502)" 1851017 - Position of text cursor in ace-editor wrong and hence unable to edit templates 1851030 - [RFE] Upgrade Ansible used from RHEL to be 2.9 1851167 - Autoattach -> "undefined" subscription added 1851176 - Subscriptions do not provide any repository sets 1851952 - "candlepin_events FAIL Not running" and wont restart 1852371 - Allow http proxy ports by default 1852723 - Broken link for documentation on installation media page 1852733 - Inventory upload documentation redirects to default location 1852735 - New version of the plugin is available: 2.0.8 1853076 - large capsule syncs cause slow processing of dynflow tasks/steps 1853200 - foreman-rake-db:migrate Fails on "No indexes found on foreman_tasks_locks with the options provided" 1853280 - Content view filter is excluding modules and Packages when published after upgrading the Satellite from 6.6 to 6.7 1853463 - Plugin does not upload inventory - Permission denied /var/lib/foreman/red_hat_inventory/uploads/uploader.sh 1853504 - [Regression] Hammer export-legacy Fails with Composite Content Views 1853572 - Broken documentation link for 'RHV' in Compute Resource 1854138 - System purpose status should show as 'disabled' when Satellite is in Simple Content Access mode. 1854397 - Compliance reports are not being uploaded to satellite. 1854530 - PG::NotNullViolation when syncing hosts from cloud 1855008 - Host parameters are set after the host is created. 1855254 - Links to documentation broken in HTTP Proxies setup 1855348 - katello_applicability accidentally set to true at install 1855710 - 'Ensure RPM repository is configured and enabled' task says 'FIXME' 1856370 - Clicking on any other tab other than overview while on capsule synchronizing page, redirects to overview page. 1856379 - Add missing VM creation tests 1856401 - [RFE] Add module to create HTTP Proxy 1856831 - New version of the plugin is available: 2.0.9 1856837 - undefined method '#httpboot' for NilClass::Jail (NilClass) when creating an IPv6 only host 1857124 - Attempting to attach a subscription to an unregistered host results in ISE 500 1857146 - Unable to build a host bootdisk image due to missing dosfstools package - Failed to format the ESP image via mkfs.msdos 1857184 - selinux is preventing to build a bootdisk iso - Failed to format the ESP image via mkfs.msdos 1857377 - Capsule Upgrade Playbook fails with "Failed to initialize: NoMethodError - undefined method <code>default_capsule' for Katello:Module" 1857506 - Capsule Upgrade Fail: satellite-installer --scenario capsule --upgrade throws NameError 1857572 - tailoring-file and scap-content command of hammer downloads file with wrong filename. 1857726 - Warnings are shown during the satellite package installation on RHEL 7.9 1858237 - Upgraded Satellite has duplicated katello_pools indexes 1858284 - CVE-2020-14334 foreman: unauthorized cache read on RPM-based installations through local user 1858819 - katello-certs-check output print foreman-installer--scenario katello instead satellite-installer --scenario satellite 1858855 - Creating compute resources on IPV6 network does not fail gracefully 1859158 - Unknown HTTPBoot EFI hosts are not directed to the grubx64.efi with a default grub conf 1859194 - load_hosts macro duplicated in a list of macros 1859276 - Need to update the deprecation warning message on Statistics and Trends page. 1859705 - Tomcat is not running on fresh Capsule installation 1859929 - User can perform other manifest actions while the first one starts 1860351 - 'Host - compare content hosts packages' report fails with error 'undefined method '#first' for NilClass' 1860407 - remote job-status table should not be re-loaded every second even if a job is running or completed 1860422 - Host with remediations can't be removed 1860430 - 'Host - compare content hosts packages' report: Safemode doesn't allow to access 'version'... 1860444 - After the system reboot, capsule setup(upgraded or newly installed 6.8 capsule) fails to start the tomcat service 1860519 - Browsing capsule /pub directory with https fails with forbidden don't have permission to access /pub/ error. 1860585 - Content Host Registration page showing version 6.7 for repos instead 6.8 1860587 - Documentation link in Administer -> About pointing to 6.6 document. 1860835 - Installed Packages not displayed on About page 1860957 - Unable to select an organization for sync management 1861367 - Import Template sync never completes 1861397 - UI dialog for Capsule Upgrade Playbook job doesn't state whitelist_options is required 1861422 - Error encountered while handling the response, replying with an error message ('plugin_config') 1861656 - smart-proxy-openscap-send command fails to upload reports to satellite. 1861724 - ipv6: host form in interfaces are showing Error generating IP: Bad Request 1861766 - Add ability to list traces by host with hammer 1861807 - Cancel/Abort button should be disabled once REX job is finish 1861816 - Error only on production builds: The Dynflow world was not initialized yet. If your plugin uses it, make sure to call Rails.application.dynflow.require! in some initializer 1861831 - satellite-change-hostname cannot change the satellite hostname after failing. 1861890 - Recommended repos do not match Satellite version 1861970 - Content -> Product doesn't work when no organization is selected 1862135 - updating hosts policy using bulk action fails with sql error 1862445 - compliance policy creation fails for ansible deployment option on upgraded satellite. 1862772 - Default repositories are not enabled, after registering a client with an Activation Key, to an org with Simple Content Access Mode in Red Hat Satellite 6 1865871 - Obfuscated hosts do not have domain reported 1865872 - Templates doc - examples on onepage.html are not processed 1865874 - Add inventory status to host 1865876 - Make recommendations count in hosts index a link 1865879 - Add automatic scheduler for insights sync 1865880 - Add an explanation how to enable insights sync 1865928 - Templates documentation help page has hard-coded Satellite setting value 1865943 - dynflow-sidekiq results in messages logs getting filled up more frequently 1866029 - Templates DSL documentation: Parts of description are put in <pre> tag 1866436 - host search filter does not work in job invocation page 1866461 - Run action is missing in job templates page 1866515 - ForemanVirtWhoConfigure::AuthSourceHiddenWithAuthentication is displayed on auth sources page 1866700 - Hammer CLI is missing "resolve" (traces) option for katello-tracer 1866710 - Wrong API endpoint path referenced for resolving host traces 1867239 - hammer content-view version incremental-update fails with ISE 1867287 - Error Row was updated or deleted by another transaction when deleting docker repository 1867311 - Upgrade fails when checkpoint_segments postgres parameter configured 1867399 - Receptor-satellite isn't able to deal with jobs where all the hosts are unknown to satellite 1867895 - API Create vmware ComputeResource fails with "Datacenter can't be blank" 1868183 - Unable to change virt-who hypervisor location. 1868971 - Receptor installation job doesn't properly escape data it puts into receptor.conf 1869640 - client-dispatcher: wrong number of arguments (given 0, expected 1..3) (ArgumentError)' messages come in upgrade and installation. 1869812 - Tasks fail to complete under load 1870657 - Make rake console run as a dynflow client to allow access to features provided by dynflow 1871016 - managercli.py:1364 - Error: Unable to retrieve service levels: HTTP error (404 - Not Found) 1871434 - theme css ".container" class rule is too generic 1871729 - ansible-runner implementation depends on third party repository for ansible-runner package. 1871815 - Satellite Ansible Collection - Provisioning a host fails with timeout 1871978 - Bug in provisioning_template Module 1872014 - Enable web console on host error in "Oops, we're sorry but something went wrong ERF42-5962 [Foreman::Exception]: No template mapped to feature Enable web console" 1872041 - Host search returns incorrect result 1873408 - Updating the CDN URL is manifest works fine but creates some tasks which remains in planned state with success result 1873926 - CVE-2020-14380 Satellite: Local user impersonation by Single sign-on (SSO) user leads to account takeover 1874143 - Red Hat Inventory Uploads does not use proxy 1874160 - Changing Content View of a Content Host needs to better inform the user around client needs 1874168 - Sync Plan fails with 'uninitialized constant Actions::Foreman::Exception' 1874171 - [RFE] Allow Subscription-manager service plugin for zypper (SLES) to set autorefresh in repo file 1874172 - [6.7] Unable to re-import subscriptions in large environment (60k+ content hosts) 1874175 - After upgrading to 6.7 and promoting content, Capsule sync is extremely slow 1874176 - Unable to search by value of certain Hostgroup parameter 1874422 - Hits Sync uses only old proxy setting 1874619 - Hostgroup tag is never reported in slice 1875357 - After upgrade server response check failed for candlepin. 1875426 - Azure VM provision fails with error</code>requests.exceptions.HTTPError: 502 Server Error: Proxy Error for url` 1875660 - Reporting Template macros host_cores is not working as expected 1875667 - Audit page list incorrect search filter 1877307 - [Authentication] External auth login using Kerberos SSO is failing for AD and IDM on Satellite 6.8 only 1877354 - [Sat6/Bug] RHEL8 systems generate false positive warnings about repo binding 1877443 - Post Satellite 6.8 Upgrade AD authentication via LDAP fails when using an A record which returns 42 entries 1877452 - content set mappings for satellite-tools-6.8-for-rhel-8 AUS repos are missing from cdn/cs_mappings-</em>.csv 1877520 - content set mappings for satellite-tools-6.8-for-rhel-8 EUS repos are missing from cdn/cs_mappings-<em>.csv 1877542 - content set mappings for rhel7 satellite-tools-6.8 EUS repos are missing from cdn/cs_mappings-</em>.csv 1878194 - In Capsule upgrade, "yum update" dump some error messages. 1878556 - PXE provisioning in satellite 6.8 requires httpboot enabled 1878693 - Unable to perform image based deployment using hosts module from Red Hat Satellite Ansible Collections 1878850 - creating host from hg doesn't resolves the user-data template 1879151 - Remote execution status not updating with large number of hosts 1879448 - Add hits details to host details page 1879451 - Stop uploading if Satellite's setting is disconnected 1879453 - Add plugin version to report metadata 1879571 - unable to kexec discovered hosts - satellite tries to reach wrong IP 1880637 - [6.8] satellite-installer always runs upgrade steps 1881066 - Safemode doesn't allow to access 'host_cores' on #<Safemode::ScopeObject> 1881078 - Use Passenger instead of Puma as the Foreman application server 1881988 - [RFE] IPv6 support for Satellite 6.8 1882276 - Satellite installation fails at execution of '/usr/sbin/foreman-rake -- config -k 'remote_execution_cockpit_url' -v '/webcon/=%{host}'' 1882389 - Search query in template for LEAPP upgrade should be pre-filled when running from pre-upgrade results 1883093 - installer-upgrade failed with error "Could not evaluate: Proxy XYZ.com cannot be retrieved: unknown error (response 500)" 1883472 - [Sat6.8/Bug] when registering more than ~240 in parallel getting this error "HTTP error (500 - Internal Server Error): Unable to register system, not all services available" 1887483 - Access insights pages refer to non-existing stylesheets, resulting in completely broken visuals 1887489 - Insights rules can't be loaded on freshly installed Satellite system 1887808 - Satellite-installer fails because of outdated RHSCL repository on DVD ISO</p> <ol> <li>Package List:</li> </ol> <p>Red Hat Satellite Capsule 6.8:</p> <p>Source: ansible-collection-redhat-satellite-1.3.0-1.el7sat.src.rpm ansible-runner-1.4.6-1.el7ar.src.rpm ansiblerole-foreman_scap_client-0.0.5-1.el7sat.src.rpm ansiblerole-insights-client-1.7.1-1.el7sat.src.rpm ansiblerole-satellite-receptor-installer-0.6.13-1.el7sat.src.rpm createrepo_c-0.7.4-1.el7sat.src.rpm foreman-2.1.2.19-1.el7sat.src.rpm foreman-bootloaders-redhat-202005201200-1.el7sat.src.rpm foreman-discovery-image-3.6.7-1.el7sat.src.rpm foreman-discovery-image-service-1.0.0-3.el7sat.src.rpm foreman-installer-2.1.2.8-1.el7sat.src.rpm foreman-proxy-2.1.2-2.el7sat.src.rpm future-0.16.0-11.el7sat.src.rpm gofer-2.12.5-7.el7sat.src.rpm hfsplus-tools-332.14-12.el7.src.rpm katello-3.16.0-1.el7sat.src.rpm katello-certs-tools-2.7.1-1.el7sat.src.rpm katello-client-bootstrap-1.7.5-1.el7sat.src.rpm katello-selinux-3.4.0-1.el7sat.src.rpm kobo-0.5.1-1.el7sat.src.rpm libmodulemd-1.7.0-1.pulp.el7sat.src.rpm libsolv-0.7.4-4.pulp.el7sat.src.rpm libwebsockets-2.4.2-2.el7.src.rpm livecd-tools-20.4-1.6.el7sat.src.rpm mod_xsendfile-0.12-11.el7sat.src.rpm ostree-2017.1-2.atomic.el7.src.rpm pulp-2.21.3-1.el7sat.src.rpm pulp-docker-3.2.7-1.el7sat.src.rpm pulp-katello-1.0.3-1.el7sat.src.rpm pulp-ostree-1.3.1-2.el7sat.src.rpm pulp-puppet-2.21.3-2.el7sat.src.rpm pulp-rpm-2.21.3-2.el7sat.src.rpm puppet-agent-6.14.0-2.el7sat.src.rpm puppet-agent-oauth-0.5.1-3.el7sat.src.rpm puppet-foreman_scap_client-0.4.0-1.el7sat.src.rpm puppetlabs-stdlib-4.25.1-2.el7sat.src.rpm puppetserver-6.13.0-1.el7sat.src.rpm pycairo-1.16.3-9.el7sat.src.rpm pygobject3-3.28.3-2.el7sat.src.rpm python-amqp-2.2.2-5.el7sat.src.rpm python-anyjson-0.3.3-11.el7sat.src.rpm python-apypie-0.2.2-1.el7sat.src.rpm python-billiard-3.5.0.3-3.el7sat.src.rpm python-blinker-1.3-2.el7sat.src.rpm python-celery-4.0.2-9.el7sat.src.rpm python-click-6.7-9.el7sat.src.rpm python-crane-3.3.1-9.el7sat.src.rpm python-daemon-2.1.2-7.el7at.src.rpm python-django-1.11.29-1.el7sat.src.rpm python-flask-0.12.2-4.el7sat.src.rpm python-gnupg-0.3.7-1.el7ui.src.rpm python-isodate-0.5.4-12.el7sat.src.rpm python-itsdangerous-0.24-15.el7sat.src.rpm python-jinja2-2.10-10.el7sat.src.rpm python-jmespath-0.9.0-6.el7_7.src.rpm python-kid-0.9.6-11.el7sat.src.rpm python-kombu-4.0.2-13.el7sat.src.rpm python-lockfile-0.11.0-10.el7ar.src.rpm python-markupsafe-0.23-21.el7sat.src.rpm python-mongoengine-0.10.5-2.el7sat.src.rpm python-nectar-1.6.2-1.el7sat.src.rpm python-oauth2-1.5.211-8.el7sat.src.rpm python-okaara-1.0.37-2.el7sat.src.rpm python-pexpect-4.6-1.el7at.src.rpm python-psutil-5.0.1-3.el7sat.src.rpm python-ptyprocess-0.5.2-3.el7at.src.rpm python-pycurl-7.43.0.2-4.el7sat.src.rpm python-pymongo-3.2-2.el7sat.src.rpm python-qpid-1.35.0-5.el7.src.rpm python-semantic_version-2.2.0-6.el7sat.src.rpm python-simplejson-3.2.0-1.el7sat.src.rpm python-twisted-16.4.1-12.el7sat.src.rpm python-vine-1.1.3-6.el7sat.src.rpm python-werkzeug-0.12.2-5.el7sat.src.rpm python-zope-interface-4.0.5-4.el7.src.rpm qpid-cpp-1.36.0-28.el7amq.src.rpm qpid-dispatch-1.5.0-4.el7.src.rpm qpid-proton-0.28.0-3.el7.src.rpm redhat-access-insights-puppet-1.0.1-1.el7sat.src.rpm repoview-0.6.6-11.el7sat.src.rpm rubygem-fast_gettext-1.1.0-4.el7sat.src.rpm rubygem-highline-1.7.8-3.el7sat.src.rpm rubygem-newt-0.9.6-3.el7sat.src.rpm rubygem-oauth-0.5.4-2.el7sat.src.rpm saslwrapper-0.22-5.el7sat.src.rpm satellite-6.8.0-1.el7sat.src.rpm satellite-installer-6.8.0.11-1.el7sat.src.rpm tfm-6.1-1.el7sat.src.rpm tfm-rubygem-algebrick-0.7.3-6.el7sat.src.rpm tfm-rubygem-ansi-1.5.0-2.el7sat.src.rpm tfm-rubygem-apipie-params-0.0.5-5.el7sat.src.rpm tfm-rubygem-bundler_ext-0.4.1-4.el7sat.src.rpm tfm-rubygem-clamp-1.1.2-5.el7sat.src.rpm tfm-rubygem-concurrent-ruby-1.1.6-2.el7sat.src.rpm tfm-rubygem-concurrent-ruby-edge-0.6.0-2.el7sat.src.rpm tfm-rubygem-domain_name-0.5.20160310-4.el7sat.src.rpm tfm-rubygem-dynflow-1.4.7-1.fm2_1.el7sat.src.rpm tfm-rubygem-faraday-0.15.4-1.el7sat.src.rpm tfm-rubygem-faraday_middleware-0.13.1-2.el7sat.src.rpm tfm-rubygem-ffi-1.12.2-1.el7sat.src.rpm tfm-rubygem-foreman-tasks-core-0.3.4-1.el7sat.src.rpm tfm-rubygem-foreman_ansible_core-3.0.4-1.el7sat.src.rpm tfm-rubygem-foreman_remote_execution_core-1.3.0-1.el7sat.src.rpm tfm-rubygem-gssapi-1.2.0-6.el7sat.src.rpm tfm-rubygem-hashie-3.6.0-1.el7sat.src.rpm tfm-rubygem-highline-1.7.8-4.el7sat.src.rpm tfm-rubygem-http-cookie-1.0.2-5.el7sat.src.rpm tfm-rubygem-infoblox-3.0.0-3.el7sat.src.rpm tfm-rubygem-journald-logger-2.0.4-2.el7sat.src.rpm tfm-rubygem-journald-native-1.0.11-2.el7sat.src.rpm tfm-rubygem-jwt-2.2.1-1.el7sat.src.rpm tfm-rubygem-kafo-4.1.0-3.el7sat.src.rpm tfm-rubygem-kafo_parsers-1.1.0-3.el7sat.src.rpm tfm-rubygem-kafo_wizards-0.0.1-4.el7sat.src.rpm tfm-rubygem-little-plugger-1.1.4-1.el7sat.src.rpm tfm-rubygem-logging-2.2.2-6.el7sat.src.rpm tfm-rubygem-logging-journald-2.0.0-2.el7sat.src.rpm tfm-rubygem-mime-types-3.2.2-4.el7sat.src.rpm tfm-rubygem-mime-types-data-3.2018.0812-4.el7sat.src.rpm tfm-rubygem-multi_json-1.14.1-1.el7sat.src.rpm tfm-rubygem-multipart-post-2.0.0-1.el7sat.src.rpm tfm-rubygem-mustermann-1.0.2-4.el7sat.src.rpm tfm-rubygem-net-ssh-4.2.0-1.el7sat.src.rpm tfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.src.rpm tfm-rubygem-netrc-0.11.0-3.el7sat.src.rpm tfm-rubygem-openscap-0.4.9-3.el7sat.src.rpm tfm-rubygem-powerbar-2.0.1-2.el7sat.src.rpm tfm-rubygem-rack-2.2.3-1.el7sat.src.rpm tfm-rubygem-rack-protection-2.0.3-4.el7sat.src.rpm tfm-rubygem-rb-inotify-0.9.7-5.el7sat.src.rpm tfm-rubygem-rest-client-2.0.2-3.el7sat.src.rpm tfm-rubygem-rkerberos-0.1.5-18.el7sat.src.rpm tfm-rubygem-rsec-0.4.3-4.el7sat.src.rpm tfm-rubygem-ruby-libvirt-0.7.0-4.el7sat.src.rpm tfm-rubygem-rubyipmi-0.10.0-6.el7sat.src.rpm tfm-rubygem-sequel-5.7.1-2.el7sat.src.rpm tfm-rubygem-sinatra-2.0.3-4.el7sat.src.rpm tfm-rubygem-smart_proxy_ansible-3.0.1-5.el7sat.src.rpm tfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-3.el7sat.src.rpm tfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-2.el7sat.src.rpm tfm-rubygem-smart_proxy_discovery-1.0.5-5.el7sat.src.rpm tfm-rubygem-smart_proxy_discovery_image-1.2.1-1.fm2_1.el7sat.src.rpm tfm-rubygem-smart_proxy_dns_infoblox-1.0.0-7.fm2_1.el7sat.src.rpm tfm-rubygem-smart_proxy_dynflow-0.2.4-5.el7sat.src.rpm tfm-rubygem-smart_proxy_dynflow_core-0.2.6-1.fm2_1.el7sat.src.rpm tfm-rubygem-smart_proxy_openscap-0.7.3-1.fm2_1.el7sat.src.rpm tfm-rubygem-smart_proxy_pulp-2.1.0-2.el7sat.src.rpm tfm-rubygem-smart_proxy_remote_execution_ssh-0.3.0-3.el7sat.src.rpm tfm-rubygem-sqlite3-1.3.13-5.el7sat.src.rpm tfm-rubygem-statsd-instrument-2.1.4-2.el7sat.src.rpm tfm-rubygem-tilt-2.0.8-4.el7sat.src.rpm tfm-rubygem-unf-0.1.3-7.el7sat.src.rpm tfm-rubygem-unf_ext-0.0.7.2-1.el7sat.src.rpm tfm-rubygem-xmlrpc-0.3.0-2.el7sat.src.rpm</p> <p>noarch: ansible-collection-redhat-satellite-1.3.0-1.el7sat.noarch.rpm ansible-runner-1.4.6-1.el7ar.noarch.rpm ansiblerole-foreman_scap_client-0.0.5-1.el7sat.noarch.rpm ansiblerole-insights-client-1.7.1-1.el7sat.noarch.rpm ansiblerole-satellite-receptor-installer-0.6.13-1.el7sat.noarch.rpm crane-selinux-3.4.0-1.el7sat.noarch.rpm foreman-bootloaders-redhat-202005201200-1.el7sat.noarch.rpm foreman-bootloaders-redhat-tftpboot-202005201200-1.el7sat.noarch.rpm foreman-debug-2.1.2.19-1.el7sat.noarch.rpm foreman-discovery-image-3.6.7-1.el7sat.noarch.rpm foreman-installer-2.1.2.8-1.el7sat.noarch.rpm foreman-installer-katello-2.1.2.8-1.el7sat.noarch.rpm foreman-proxy-2.1.2-2.el7sat.noarch.rpm foreman-proxy-content-3.16.0-1.el7sat.noarch.rpm foreman-proxy-journald-2.1.2-2.el7sat.noarch.rpm katello-certs-tools-2.7.1-1.el7sat.noarch.rpm katello-client-bootstrap-1.7.5-1.el7sat.noarch.rpm katello-common-3.16.0-1.el7sat.noarch.rpm katello-debug-3.16.0-1.el7sat.noarch.rpm kobo-0.5.1-1.el7sat.noarch.rpm pulp-admin-client-2.21.3-1.el7sat.noarch.rpm pulp-docker-admin-extensions-3.2.7-1.el7sat.noarch.rpm pulp-docker-plugins-3.2.7-1.el7sat.noarch.rpm pulp-katello-1.0.3-1.el7sat.noarch.rpm pulp-maintenance-2.21.3-1.el7sat.noarch.rpm pulp-nodes-child-2.21.3-1.el7sat.noarch.rpm pulp-nodes-common-2.21.3-1.el7sat.noarch.rpm pulp-nodes-parent-2.21.3-1.el7sat.noarch.rpm pulp-ostree-admin-extensions-1.3.1-2.el7sat.noarch.rpm pulp-ostree-plugins-1.3.1-2.el7sat.noarch.rpm pulp-puppet-admin-extensions-2.21.3-2.el7sat.noarch.rpm pulp-puppet-plugins-2.21.3-2.el7sat.noarch.rpm pulp-rpm-admin-extensions-2.21.3-2.el7sat.noarch.rpm pulp-rpm-plugins-2.21.3-2.el7sat.noarch.rpm pulp-selinux-2.21.3-1.el7sat.noarch.rpm pulp-server-2.21.3-1.el7sat.noarch.rpm puppet-agent-oauth-0.5.1-3.el7sat.noarch.rpm puppet-foreman_scap_client-0.4.0-1.el7sat.noarch.rpm puppetlabs-stdlib-4.25.1-2.el7sat.noarch.rpm puppetserver-6.13.0-1.el7sat.noarch.rpm python-blinker-1.3-2.el7sat.noarch.rpm python-gnupg-0.3.7-1.el7ui.noarch.rpm python-gofer-2.12.5-7.el7sat.noarch.rpm python-gofer-qpid-2.12.5-7.el7sat.noarch.rpm python-kid-0.9.6-11.el7sat.noarch.rpm python-mongoengine-0.10.5-2.el7sat.noarch.rpm python-nectar-1.6.2-1.el7sat.noarch.rpm python-oauth2-1.5.211-8.el7sat.noarch.rpm python-pulp-agent-lib-2.21.3-1.el7sat.noarch.rpm python-pulp-bindings-2.21.3-1.el7sat.noarch.rpm python-pulp-client-lib-2.21.3-1.el7sat.noarch.rpm python-pulp-common-2.21.3-1.el7sat.noarch.rpm python-pulp-docker-common-3.2.7-1.el7sat.noarch.rpm python-pulp-integrity-2.21.3-2.el7sat.noarch.rpm python-pulp-oid_validation-2.21.3-1.el7sat.noarch.rpm python-pulp-ostree-common-1.3.1-2.el7sat.noarch.rpm python-pulp-puppet-common-2.21.3-2.el7sat.noarch.rpm python-pulp-repoauth-2.21.3-1.el7sat.noarch.rpm python-pulp-rpm-common-2.21.3-2.el7sat.noarch.rpm python-pulp-streamer-2.21.3-1.el7sat.noarch.rpm python-qpid-1.35.0-5.el7.noarch.rpm python-semantic_version-2.2.0-6.el7sat.noarch.rpm python2-amqp-2.2.2-5.el7sat.noarch.rpm python2-ansible-runner-1.4.6-1.el7ar.noarch.rpm python2-anyjson-0.3.3-11.el7sat.noarch.rpm python2-apypie-0.2.2-1.el7sat.noarch.rpm python2-celery-4.0.2-9.el7sat.noarch.rpm python2-click-6.7-9.el7sat.noarch.rpm python2-crane-3.3.1-9.el7sat.noarch.rpm python2-daemon-2.1.2-7.el7at.noarch.rpm python2-django-1.11.29-1.el7sat.noarch.rpm python2-flask-0.12.2-4.el7sat.noarch.rpm python2-future-0.16.0-11.el7sat.noarch.rpm python2-isodate-0.5.4-12.el7sat.noarch.rpm python2-itsdangerous-0.24-15.el7sat.noarch.rpm python2-jinja2-2.10-10.el7sat.noarch.rpm python2-jmespath-0.9.0-6.el7_7.noarch.rpm python2-kombu-4.0.2-13.el7sat.noarch.rpm python2-lockfile-0.11.0-10.el7ar.noarch.rpm python2-okaara-1.0.37-2.el7sat.noarch.rpm python2-pexpect-4.6-1.el7at.noarch.rpm python2-ptyprocess-0.5.2-3.el7at.noarch.rpm python2-vine-1.1.3-6.el7sat.noarch.rpm python2-werkzeug-0.12.2-5.el7sat.noarch.rpm qpid-dispatch-tools-1.5.0-4.el7.noarch.rpm qpid-tools-1.36.0-28.el7amq.noarch.rpm redhat-access-insights-puppet-1.0.1-1.el7sat.noarch.rpm repoview-0.6.6-11.el7sat.noarch.rpm rubygem-fast_gettext-1.1.0-4.el7sat.noarch.rpm rubygem-highline-1.7.8-3.el7sat.noarch.rpm rubygem-oauth-0.5.4-2.el7sat.noarch.rpm satellite-capsule-6.8.0-1.el7sat.noarch.rpm satellite-common-6.8.0-1.el7sat.noarch.rpm satellite-debug-tools-6.8.0-1.el7sat.noarch.rpm satellite-installer-6.8.0.11-1.el7sat.noarch.rpm tfm-rubygem-algebrick-0.7.3-6.el7sat.noarch.rpm tfm-rubygem-ansi-1.5.0-2.el7sat.noarch.rpm tfm-rubygem-apipie-params-0.0.5-5.el7sat.noarch.rpm tfm-rubygem-bundler_ext-0.4.1-4.el7sat.noarch.rpm tfm-rubygem-clamp-1.1.2-5.el7sat.noarch.rpm tfm-rubygem-concurrent-ruby-1.1.6-2.el7sat.noarch.rpm tfm-rubygem-concurrent-ruby-edge-0.6.0-2.el7sat.noarch.rpm tfm-rubygem-domain_name-0.5.20160310-4.el7sat.noarch.rpm tfm-rubygem-dynflow-1.4.7-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-faraday-0.15.4-1.el7sat.noarch.rpm tfm-rubygem-faraday_middleware-0.13.1-2.el7sat.noarch.rpm tfm-rubygem-foreman-tasks-core-0.3.4-1.el7sat.noarch.rpm tfm-rubygem-foreman_ansible_core-3.0.4-1.el7sat.noarch.rpm tfm-rubygem-foreman_remote_execution_core-1.3.0-1.el7sat.noarch.rpm tfm-rubygem-gssapi-1.2.0-6.el7sat.noarch.rpm tfm-rubygem-hashie-3.6.0-1.el7sat.noarch.rpm tfm-rubygem-highline-1.7.8-4.el7sat.noarch.rpm tfm-rubygem-http-cookie-1.0.2-5.el7sat.noarch.rpm tfm-rubygem-infoblox-3.0.0-3.el7sat.noarch.rpm tfm-rubygem-journald-logger-2.0.4-2.el7sat.noarch.rpm tfm-rubygem-jwt-2.2.1-1.el7sat.noarch.rpm tfm-rubygem-kafo-4.1.0-3.el7sat.noarch.rpm tfm-rubygem-kafo_parsers-1.1.0-3.el7sat.noarch.rpm tfm-rubygem-kafo_wizards-0.0.1-4.el7sat.noarch.rpm tfm-rubygem-little-plugger-1.1.4-1.el7sat.noarch.rpm tfm-rubygem-logging-2.2.2-6.el7sat.noarch.rpm tfm-rubygem-logging-journald-2.0.0-2.el7sat.noarch.rpm tfm-rubygem-mime-types-3.2.2-4.el7sat.noarch.rpm tfm-rubygem-mime-types-data-3.2018.0812-4.el7sat.noarch.rpm tfm-rubygem-multi_json-1.14.1-1.el7sat.noarch.rpm tfm-rubygem-multipart-post-2.0.0-1.el7sat.noarch.rpm tfm-rubygem-mustermann-1.0.2-4.el7sat.noarch.rpm tfm-rubygem-net-ssh-4.2.0-1.el7sat.noarch.rpm tfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.noarch.rpm tfm-rubygem-netrc-0.11.0-3.el7sat.noarch.rpm tfm-rubygem-openscap-0.4.9-3.el7sat.noarch.rpm tfm-rubygem-powerbar-2.0.1-2.el7sat.noarch.rpm tfm-rubygem-rack-2.2.3-1.el7sat.noarch.rpm tfm-rubygem-rack-protection-2.0.3-4.el7sat.noarch.rpm tfm-rubygem-rb-inotify-0.9.7-5.el7sat.noarch.rpm tfm-rubygem-rest-client-2.0.2-3.el7sat.noarch.rpm tfm-rubygem-rsec-0.4.3-4.el7sat.noarch.rpm tfm-rubygem-rubyipmi-0.10.0-6.el7sat.noarch.rpm tfm-rubygem-sequel-5.7.1-2.el7sat.noarch.rpm tfm-rubygem-sinatra-2.0.3-4.el7sat.noarch.rpm tfm-rubygem-smart_proxy_ansible-3.0.1-5.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-3.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-2.el7sat.noarch.rpm tfm-rubygem-smart_proxy_discovery-1.0.5-5.el7sat.noarch.rpm tfm-rubygem-smart_proxy_discovery_image-1.2.1-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dns_infoblox-1.0.0-7.fm2_1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dynflow-0.2.4-5.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dynflow_core-0.2.6-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_openscap-0.7.3-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_pulp-2.1.0-2.el7sat.noarch.rpm tfm-rubygem-smart_proxy_remote_execution_ssh-0.3.0-3.el7sat.noarch.rpm tfm-rubygem-statsd-instrument-2.1.4-2.el7sat.noarch.rpm tfm-rubygem-tilt-2.0.8-4.el7sat.noarch.rpm tfm-rubygem-unf-0.1.3-7.el7sat.noarch.rpm tfm-rubygem-xmlrpc-0.3.0-2.el7sat.noarch.rpm</p> <p>x86_64: createrepo_c-0.7.4-1.el7sat.x86_64.rpm createrepo_c-debuginfo-0.7.4-1.el7sat.x86_64.rpm createrepo_c-libs-0.7.4-1.el7sat.x86_64.rpm foreman-discovery-image-service-1.0.0-3.el7sat.x86_64.rpm foreman-discovery-image-service-tui-1.0.0-3.el7sat.x86_64.rpm hfsplus-tools-332.14-12.el7.x86_64.rpm hfsplus-tools-debuginfo-332.14-12.el7.x86_64.rpm libmodulemd-1.7.0-1.pulp.el7sat.x86_64.rpm libmodulemd-debuginfo-1.7.0-1.pulp.el7sat.x86_64.rpm libsolv-0.7.4-4.pulp.el7sat.x86_64.rpm libsolv-debuginfo-0.7.4-4.pulp.el7sat.x86_64.rpm libwebsockets-2.4.2-2.el7.x86_64.rpm libwebsockets-debuginfo-2.4.2-2.el7.x86_64.rpm livecd-tools-20.4-1.6.el7sat.x86_64.rpm mod_xsendfile-0.12-11.el7sat.x86_64.rpm mod_xsendfile-debuginfo-0.12-11.el7sat.x86_64.rpm ostree-2017.1-2.atomic.el7.x86_64.rpm ostree-debuginfo-2017.1-2.atomic.el7.x86_64.rpm puppet-agent-6.14.0-2.el7sat.x86_64.rpm pycairo-1.16.3-9.el7sat.x86_64.rpm pycairo-debuginfo-1.16.3-9.el7sat.x86_64.rpm pygobject3-debuginfo-3.28.3-2.el7sat.x86_64.rpm python-billiard-debuginfo-3.5.0.3-3.el7sat.x86_64.rpm python-bson-3.2-2.el7sat.x86_64.rpm python-imgcreate-20.4-1.6.el7sat.x86_64.rpm python-markupsafe-debuginfo-0.23-21.el7sat.x86_64.rpm python-psutil-5.0.1-3.el7sat.x86_64.rpm python-psutil-debuginfo-5.0.1-3.el7sat.x86_64.rpm python-pycurl-debuginfo-7.43.0.2-4.el7sat.x86_64.rpm python-pymongo-3.2-2.el7sat.x86_64.rpm python-pymongo-debuginfo-3.2-2.el7sat.x86_64.rpm python-pymongo-gridfs-3.2-2.el7sat.x86_64.rpm python-qpid-proton-0.28.0-3.el7.x86_64.rpm python-qpid-qmf-1.36.0-28.el7amq.x86_64.rpm python-saslwrapper-0.22-5.el7sat.x86_64.rpm python-simplejson-3.2.0-1.el7sat.x86_64.rpm python-simplejson-debuginfo-3.2.0-1.el7sat.x86_64.rpm python-twisted-debuginfo-16.4.1-12.el7sat.x86_64.rpm python-zope-interface-4.0.5-4.el7.x86_64.rpm python-zope-interface-debuginfo-4.0.5-4.el7.x86_64.rpm python2-billiard-3.5.0.3-3.el7sat.x86_64.rpm python2-gobject-3.28.3-2.el7sat.x86_64.rpm python2-gobject-base-3.28.3-2.el7sat.x86_64.rpm python2-markupsafe-0.23-21.el7sat.x86_64.rpm python2-pycurl-7.43.0.2-4.el7sat.x86_64.rpm python2-solv-0.7.4-4.pulp.el7sat.x86_64.rpm python2-twisted-16.4.1-12.el7sat.x86_64.rpm qpid-cpp-client-1.36.0-28.el7amq.x86_64.rpm qpid-cpp-debuginfo-1.36.0-28.el7amq.x86_64.rpm qpid-cpp-server-1.36.0-28.el7amq.x86_64.rpm qpid-cpp-server-linearstore-1.36.0-28.el7amq.x86_64.rpm qpid-dispatch-debuginfo-1.5.0-4.el7.x86_64.rpm qpid-dispatch-router-1.5.0-4.el7.x86_64.rpm qpid-proton-c-0.28.0-3.el7.x86_64.rpm qpid-proton-debuginfo-0.28.0-3.el7.x86_64.rpm qpid-qmf-1.36.0-28.el7amq.x86_64.rpm rubygem-newt-0.9.6-3.el7sat.x86_64.rpm rubygem-newt-debuginfo-0.9.6-3.el7sat.x86_64.rpm saslwrapper-0.22-5.el7sat.x86_64.rpm saslwrapper-debuginfo-0.22-5.el7sat.x86_64.rpm tfm-rubygem-ffi-1.12.2-1.el7sat.x86_64.rpm tfm-rubygem-ffi-debuginfo-1.12.2-1.el7sat.x86_64.rpm tfm-rubygem-journald-native-1.0.11-2.el7sat.x86_64.rpm tfm-rubygem-journald-native-debuginfo-1.0.11-2.el7sat.x86_64.rpm tfm-rubygem-rkerberos-0.1.5-18.el7sat.x86_64.rpm tfm-rubygem-rkerberos-debuginfo-0.1.5-18.el7sat.x86_64.rpm tfm-rubygem-ruby-libvirt-0.7.0-4.el7sat.x86_64.rpm tfm-rubygem-ruby-libvirt-debuginfo-0.7.0-4.el7sat.x86_64.rpm tfm-rubygem-sqlite3-1.3.13-5.el7sat.x86_64.rpm tfm-rubygem-sqlite3-debuginfo-1.3.13-5.el7sat.x86_64.rpm tfm-rubygem-unf_ext-0.0.7.2-1.el7sat.x86_64.rpm tfm-rubygem-unf_ext-debuginfo-0.0.7.2-1.el7sat.x86_64.rpm tfm-runtime-6.1-1.el7sat.x86_64.rpm</p> <p>Red Hat Satellite 6.7:</p> <p>Source: ansible-collection-redhat-satellite-1.3.0-1.el7sat.src.rpm ansible-runner-1.4.6-1.el7ar.src.rpm ansiblerole-foreman_scap_client-0.0.5-1.el7sat.src.rpm ansiblerole-insights-client-1.7.1-1.el7sat.src.rpm ansiblerole-satellite-receptor-installer-0.6.13-1.el7sat.src.rpm candlepin-3.1.21-1.el7sat.src.rpm createrepo_c-0.7.4-1.el7sat.src.rpm foreman-2.1.2.19-1.el7sat.src.rpm foreman-bootloaders-redhat-202005201200-1.el7sat.src.rpm foreman-discovery-image-3.6.7-1.el7sat.src.rpm foreman-discovery-image-service-1.0.0-3.el7sat.src.rpm foreman-installer-2.1.2.8-1.el7sat.src.rpm foreman-proxy-2.1.2-2.el7sat.src.rpm foreman-selinux-2.1.2.3-1.el7sat.src.rpm future-0.16.0-11.el7sat.src.rpm gofer-2.12.5-7.el7sat.src.rpm hfsplus-tools-332.14-12.el7.src.rpm katello-3.16.0-1.el7sat.src.rpm katello-certs-tools-2.7.1-1.el7sat.src.rpm katello-client-bootstrap-1.7.5-1.el7sat.src.rpm katello-selinux-3.4.0-1.el7sat.src.rpm keycloak-httpd-client-install-1.2.2-1.el7sat.src.rpm kobo-0.5.1-1.el7sat.src.rpm libmodulemd-1.7.0-1.pulp.el7sat.src.rpm libsolv-0.7.4-4.pulp.el7sat.src.rpm libwebsockets-2.4.2-2.el7.src.rpm livecd-tools-20.4-1.6.el7sat.src.rpm mod_xsendfile-0.12-11.el7sat.src.rpm ostree-2017.1-2.atomic.el7.src.rpm pcp-mmvstatsd-0.4-2.el7sat.src.rpm pulp-2.21.3-1.el7sat.src.rpm pulp-docker-3.2.7-1.el7sat.src.rpm pulp-katello-1.0.3-1.el7sat.src.rpm pulp-ostree-1.3.1-2.el7sat.src.rpm pulp-puppet-2.21.3-2.el7sat.src.rpm pulp-rpm-2.21.3-2.el7sat.src.rpm puppet-agent-6.14.0-2.el7sat.src.rpm puppet-agent-oauth-0.5.1-3.el7sat.src.rpm puppet-foreman_scap_client-0.4.0-1.el7sat.src.rpm puppetlabs-stdlib-4.25.1-2.el7sat.src.rpm puppetserver-6.13.0-1.el7sat.src.rpm pycairo-1.16.3-9.el7sat.src.rpm pygobject3-3.28.3-2.el7sat.src.rpm python-aiohttp-3.6.2-4.el7ar.src.rpm python-amqp-2.2.2-5.el7sat.src.rpm python-anyjson-0.3.3-11.el7sat.src.rpm python-apypie-0.2.2-1.el7sat.src.rpm python-async-timeout-3.0.1-2.el7ar.src.rpm python-attrs-19.3.0-3.el7ar.src.rpm python-billiard-3.5.0.3-3.el7sat.src.rpm python-blinker-1.3-2.el7sat.src.rpm python-celery-4.0.2-9.el7sat.src.rpm python-chardet-3.0.4-10.el7ar.src.rpm python-click-6.7-9.el7sat.src.rpm python-crane-3.3.1-9.el7sat.src.rpm python-daemon-2.1.2-7.el7at.src.rpm python-dateutil-2.8.1-2.el7ar.src.rpm python-django-1.11.29-1.el7sat.src.rpm python-flask-0.12.2-4.el7sat.src.rpm python-gnupg-0.3.7-1.el7ui.src.rpm python-idna-2.4-2.el7ar.src.rpm python-idna-ssl-1.1.0-2.el7ar.src.rpm python-isodate-0.5.4-12.el7sat.src.rpm python-itsdangerous-0.24-15.el7sat.src.rpm python-jinja2-2.10-10.el7sat.src.rpm python-jmespath-0.9.0-6.el7_7.src.rpm python-kid-0.9.6-11.el7sat.src.rpm python-kombu-4.0.2-13.el7sat.src.rpm python-lockfile-0.11.0-10.el7ar.src.rpm python-markupsafe-0.23-21.el7sat.src.rpm python-mongoengine-0.10.5-2.el7sat.src.rpm python-multidict-4.7.4-2.el7ar.src.rpm python-nectar-1.6.2-1.el7sat.src.rpm python-oauth2-1.5.211-8.el7sat.src.rpm python-okaara-1.0.37-2.el7sat.src.rpm python-pexpect-4.6-1.el7at.src.rpm python-prometheus-client-0.7.1-2.el7ar.src.rpm python-psutil-5.0.1-3.el7sat.src.rpm python-ptyprocess-0.5.2-3.el7at.src.rpm python-pycurl-7.43.0.2-4.el7sat.src.rpm python-pymongo-3.2-2.el7sat.src.rpm python-qpid-1.35.0-5.el7.src.rpm python-receptor-satellite-1.2.0-1.el7sat.src.rpm python-semantic_version-2.2.0-6.el7sat.src.rpm python-simplejson-3.2.0-1.el7sat.src.rpm python-six-1.11.0-8.el7ar.src.rpm python-twisted-16.4.1-12.el7sat.src.rpm python-typing-extensions-3.7.4.1-2.el7ar.src.rpm python-vine-1.1.3-6.el7sat.src.rpm python-werkzeug-0.12.2-5.el7sat.src.rpm python-yarl-1.4.2-2.el7ar.src.rpm python-zope-interface-4.0.5-4.el7.src.rpm qpid-cpp-1.36.0-28.el7amq.src.rpm qpid-dispatch-1.5.0-4.el7.src.rpm qpid-proton-0.28.0-3.el7.src.rpm receptor-0.6.3-1.el7ar.src.rpm redhat-access-insights-puppet-1.0.1-1.el7sat.src.rpm repoview-0.6.6-11.el7sat.src.rpm rh-postgresql12-postgresql-evr-0.0.2-1.el7sat.src.rpm rhel8-kickstart-setup-0.0.2-1.el7sat.src.rpm rubygem-facter-2.4.1-2.el7sat.src.rpm rubygem-fast_gettext-1.1.0-4.el7sat.src.rpm rubygem-foreman_scap_client-0.4.6-1.el7sat.src.rpm rubygem-highline-1.7.8-3.el7sat.src.rpm rubygem-newt-0.9.6-3.el7sat.src.rpm rubygem-oauth-0.5.4-2.el7sat.src.rpm rubygem-passenger-4.0.18-24.el7sat.src.rpm rubygem-rack-1.6.12-1.el7sat.src.rpm rubygem-rake-0.9.2.2-41.el7sat.src.rpm saslwrapper-0.22-5.el7sat.src.rpm satellite-6.8.0-1.el7sat.src.rpm satellite-installer-6.8.0.11-1.el7sat.src.rpm tfm-6.1-1.el7sat.src.rpm tfm-rubygem-actioncable-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-actionmailbox-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-actionmailer-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-actionpack-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-actiontext-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-actionview-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-activejob-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-activemodel-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-activerecord-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-activerecord-import-1.0.0-6.el7sat.src.rpm tfm-rubygem-activerecord-session_store-1.1.1-4.el7sat.src.rpm tfm-rubygem-activestorage-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-activesupport-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-addressable-2.6.0-1.el7sat.src.rpm tfm-rubygem-algebrick-0.7.3-6.el7sat.src.rpm tfm-rubygem-amazing_print-1.1.0-1.el7sat.src.rpm tfm-rubygem-ancestry-3.0.7-1.el7sat.src.rpm tfm-rubygem-anemone-0.7.2-22.el7sat.src.rpm tfm-rubygem-angular-rails-templates-1.1.0-1.el7sat.src.rpm tfm-rubygem-ansi-1.5.0-2.el7sat.src.rpm tfm-rubygem-apipie-bindings-0.3.0-1.el7sat.src.rpm tfm-rubygem-apipie-dsl-2.2.2-2.el7sat.src.rpm tfm-rubygem-apipie-params-0.0.5-5.el7sat.src.rpm tfm-rubygem-apipie-rails-0.5.17-3.el7sat.src.rpm tfm-rubygem-audited-4.9.0-3.el7sat.src.rpm tfm-rubygem-azure_mgmt_compute-0.18.7-1.el7sat.src.rpm tfm-rubygem-azure_mgmt_network-0.19.0-1.el7sat.src.rpm tfm-rubygem-azure_mgmt_resources-0.17.6-1.el7sat.src.rpm tfm-rubygem-azure_mgmt_storage-0.17.10-1.el7sat.src.rpm tfm-rubygem-azure_mgmt_subscriptions-0.18.2-1.el7sat.src.rpm tfm-rubygem-bcrypt-3.1.12-1.el7sat.src.rpm tfm-rubygem-builder-3.2.4-1.el7sat.src.rpm tfm-rubygem-bundler_ext-0.4.1-4.el7sat.src.rpm tfm-rubygem-clamp-1.1.2-5.el7sat.src.rpm tfm-rubygem-coffee-rails-5.0.0-1.el7sat.src.rpm tfm-rubygem-coffee-script-2.4.1-4.el7sat.src.rpm tfm-rubygem-coffee-script-source-1.12.2-4.el7sat.src.rpm tfm-rubygem-concurrent-ruby-1.1.6-2.el7sat.src.rpm tfm-rubygem-concurrent-ruby-edge-0.6.0-2.el7sat.src.rpm tfm-rubygem-connection_pool-2.2.2-2.el7sat.src.rpm tfm-rubygem-crass-1.0.6-1.el7sat.src.rpm tfm-rubygem-css_parser-1.4.7-3.el7sat.src.rpm tfm-rubygem-daemons-1.2.3-7.el7sat.src.rpm tfm-rubygem-deacon-1.0.0-4.el7sat.src.rpm tfm-rubygem-declarative-0.0.10-1.el7sat.src.rpm tfm-rubygem-declarative-option-0.1.0-1.el7sat.src.rpm tfm-rubygem-deep_cloneable-3.0.0-3.el7sat.src.rpm tfm-rubygem-deface-1.5.3-2.el7sat.src.rpm tfm-rubygem-diffy-3.0.1-6.el7sat.src.rpm tfm-rubygem-domain_name-0.5.20160310-4.el7sat.src.rpm tfm-rubygem-dynflow-1.4.7-1.fm2_1.el7sat.src.rpm tfm-rubygem-erubi-1.9.0-1.el7sat.src.rpm tfm-rubygem-excon-0.58.0-3.el7sat.src.rpm tfm-rubygem-execjs-2.7.0-4.el7sat.src.rpm tfm-rubygem-facter-2.4.0-6.el7sat.src.rpm tfm-rubygem-faraday-0.15.4-1.el7sat.src.rpm tfm-rubygem-faraday-cookie_jar-0.0.6-1.el7sat.src.rpm tfm-rubygem-faraday_middleware-0.13.1-2.el7sat.src.rpm tfm-rubygem-fast_gettext-1.4.1-3.el7sat.src.rpm tfm-rubygem-ffi-1.12.2-1.el7sat.src.rpm tfm-rubygem-fog-aws-3.6.5-1.el7sat.src.rpm tfm-rubygem-fog-core-2.1.0-3.el7sat.src.rpm tfm-rubygem-fog-google-1.8.2-1.el7sat.src.rpm tfm-rubygem-fog-json-1.2.0-3.el7sat.src.rpm tfm-rubygem-fog-kubevirt-1.3.3-1.el7sat.src.rpm tfm-rubygem-fog-libvirt-0.7.0-1.el7sat.src.rpm tfm-rubygem-fog-openstack-1.0.8-2.el7sat.src.rpm tfm-rubygem-fog-ovirt-1.2.5-1.el7sat.src.rpm tfm-rubygem-fog-vsphere-3.3.1-1.el7sat.src.rpm tfm-rubygem-fog-xml-0.1.2-8.el7sat.src.rpm tfm-rubygem-foreman-tasks-2.0.2-1.fm2_1.el7sat.src.rpm tfm-rubygem-foreman-tasks-core-0.3.4-1.el7sat.src.rpm tfm-rubygem-foreman_ansible-5.1.3-1.el7sat.src.rpm tfm-rubygem-foreman_ansible_core-3.0.4-1.el7sat.src.rpm tfm-rubygem-foreman_azure_rm-2.1.2-1.fm2_1.el7sat.src.rpm tfm-rubygem-foreman_bootdisk-17.0.2-2.fm2_1.el7sat.src.rpm tfm-rubygem-foreman_discovery-16.1.2-1.el7sat.src.rpm tfm-rubygem-foreman_hooks-0.3.16-2.el7sat.src.rpm tfm-rubygem-foreman_kubevirt-0.1.7-1.el7sat.src.rpm tfm-rubygem-foreman_leapp-0.1.6-1.el7sat.src.rpm tfm-rubygem-foreman_openscap-4.0.3-1.fm2_1.el7sat.src.rpm tfm-rubygem-foreman_remote_execution-3.3.7-1.el7sat.src.rpm tfm-rubygem-foreman_remote_execution_core-1.3.0-1.el7sat.src.rpm tfm-rubygem-foreman_rh_cloud-2.0.12-1.el7sat.src.rpm tfm-rubygem-foreman_templates-9.0.1-1.fm2_1.el7sat.src.rpm tfm-rubygem-foreman_theme_satellite-6.0.1.7-1.el7sat.src.rpm tfm-rubygem-foreman_virt_who_configure-0.5.2-1.el7sat.src.rpm tfm-rubygem-formatador-0.2.1-11.el7sat.src.rpm tfm-rubygem-friendly_id-5.3.0-1.el7sat.src.rpm tfm-rubygem-fx-0.5.0-1.el7sat.src.rpm tfm-rubygem-get_process_mem-0.2.1-3.el7sat.src.rpm tfm-rubygem-gettext-3.1.4-10.el7sat.src.rpm tfm-rubygem-gettext_i18n_rails-1.8.0-1.el7sat.src.rpm tfm-rubygem-git-1.5.0-1.el7sat.src.rpm tfm-rubygem-gitlab-sidekiq-fetcher-0.5.2-2.el7sat.src.rpm tfm-rubygem-globalid-0.4.2-1.el7sat.src.rpm tfm-rubygem-google-api-client-0.23.9-3.el7sat.src.rpm tfm-rubygem-googleauth-0.6.7-3.el7sat.src.rpm tfm-rubygem-graphql-1.8.14-1.el7sat.src.rpm tfm-rubygem-graphql-batch-0.3.10-1.el7sat.src.rpm tfm-rubygem-gssapi-1.2.0-6.el7sat.src.rpm tfm-rubygem-hammer_cli-2.1.2-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman-2.1.2.1-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_admin-0.0.9-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_ansible-0.3.2-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_azure_rm-0.2.0-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_bootdisk-0.3.0-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_discovery-1.0.2-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_docker-0.0.6.4-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_kubevirt-0.1.4-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_leapp-0.1.0-2.fm2_1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_openscap-0.1.11-1.fm2_1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_remote_execution-0.1.2-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_tasks-0.0.14-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_templates-0.2.0-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_virt_who_configure-0.0.6-1.el7sat.src.rpm tfm-rubygem-hammer_cli_katello-0.22.2.2-1.el7sat.src.rpm tfm-rubygem-hashie-3.6.0-1.el7sat.src.rpm tfm-rubygem-highline-1.7.8-4.el7sat.src.rpm tfm-rubygem-http-3.3.0-1.el7sat.src.rpm tfm-rubygem-http-cookie-1.0.2-5.el7sat.src.rpm tfm-rubygem-http-form_data-2.1.1-1.el7sat.src.rpm tfm-rubygem-http_parser.rb-0.6.0-1.el7sat.src.rpm tfm-rubygem-httpclient-2.8.3-1.el7sat.src.rpm tfm-rubygem-i18n-1.8.2-1.el7sat.src.rpm tfm-rubygem-infoblox-3.0.0-3.el7sat.src.rpm tfm-rubygem-ipaddress-0.8.0-11.el7sat.src.rpm tfm-rubygem-jgrep-1.3.3-12.el7sat.src.rpm tfm-rubygem-journald-logger-2.0.4-2.el7sat.src.rpm tfm-rubygem-journald-native-1.0.11-2.el7sat.src.rpm tfm-rubygem-jwt-2.2.1-1.el7sat.src.rpm tfm-rubygem-kafo-4.1.0-3.el7sat.src.rpm tfm-rubygem-kafo_parsers-1.1.0-3.el7sat.src.rpm tfm-rubygem-kafo_wizards-0.0.1-4.el7sat.src.rpm tfm-rubygem-katello-3.16.0.11-1.el7sat.src.rpm tfm-rubygem-kubeclient-4.3.0-1.el7sat.src.rpm tfm-rubygem-ldap_fluff-0.4.7-5.el7sat.src.rpm tfm-rubygem-little-plugger-1.1.4-1.el7sat.src.rpm tfm-rubygem-locale-2.0.9-13.el7sat.src.rpm tfm-rubygem-logging-2.2.2-6.el7sat.src.rpm tfm-rubygem-logging-journald-2.0.0-2.el7sat.src.rpm tfm-rubygem-loofah-2.4.0-1.el7sat.src.rpm tfm-rubygem-mail-2.7.1-1.el7sat.src.rpm tfm-rubygem-marcel-0.3.3-1.el7sat.src.rpm tfm-rubygem-memoist-0.16.0-1.el7sat.src.rpm tfm-rubygem-method_source-0.9.2-2.el7sat.src.rpm tfm-rubygem-mime-types-3.2.2-4.el7sat.src.rpm tfm-rubygem-mime-types-data-3.2018.0812-4.el7sat.src.rpm tfm-rubygem-mimemagic-0.3.5-1.el7sat.src.rpm tfm-rubygem-mini_mime-1.0.2-1.el7sat.src.rpm tfm-rubygem-mini_portile2-2.4.0-1.el7sat.src.rpm tfm-rubygem-ms_rest-0.7.4-2.el7sat.src.rpm tfm-rubygem-ms_rest_azure-0.11.1-2.el7sat.src.rpm tfm-rubygem-multi_json-1.14.1-1.el7sat.src.rpm tfm-rubygem-multipart-post-2.0.0-1.el7sat.src.rpm tfm-rubygem-mustermann-1.0.2-4.el7sat.src.rpm tfm-rubygem-net-ldap-0.16.1-1.el7sat.src.rpm tfm-rubygem-net-ping-2.0.1-3.el7sat.src.rpm tfm-rubygem-net-scp-1.2.1-3.el7sat.src.rpm tfm-rubygem-net-ssh-4.2.0-1.el7sat.src.rpm tfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.src.rpm tfm-rubygem-netrc-0.11.0-3.el7sat.src.rpm tfm-rubygem-nio4r-2.5.2-2.el7sat.src.rpm tfm-rubygem-nokogiri-1.10.9-1.el7sat.src.rpm tfm-rubygem-oauth-0.5.4-3.el7sat.src.rpm tfm-rubygem-openscap-0.4.9-3.el7sat.src.rpm tfm-rubygem-optimist-3.0.0-1.el7sat.src.rpm tfm-rubygem-os-1.0.0-1.el7sat.src.rpm tfm-rubygem-ovirt-engine-sdk-4.2.3-3.el7sat.src.rpm tfm-rubygem-ovirt_provision_plugin-2.0.3-1.el7sat.src.rpm tfm-rubygem-parse-cron-0.1.4-4.el7sat.src.rpm tfm-rubygem-passenger-4.0.18-26.el7sat.src.rpm tfm-rubygem-pg-1.1.4-2.el7sat.src.rpm tfm-rubygem-polyglot-0.3.5-3.el7sat.src.rpm tfm-rubygem-powerbar-2.0.1-2.el7sat.src.rpm tfm-rubygem-prometheus-client-1.0.0-1.el7sat.src.rpm tfm-rubygem-promise.rb-0.7.4-1.el7sat.src.rpm tfm-rubygem-public_suffix-3.0.3-1.el7sat.src.rpm tfm-rubygem-pulp_2to3_migration_client-0.2.0-0.1.b6.el7sat.src.rpm tfm-rubygem-pulp_ansible_client-0.2.0b13.dev01588546902-1.el7sat.src.rpm tfm-rubygem-pulp_certguard_client-0.1.0rc5-1.el7sat.src.rpm tfm-rubygem-pulp_container_client-1.4.1-1.el7sat.src.rpm tfm-rubygem-pulp_file_client-1.0.1-1.el7sat.src.rpm tfm-rubygem-pulp_rpm_client-3.5.0-1.el7sat.src.rpm tfm-rubygem-pulpcore_client-3.4.1-1.el7sat.src.rpm tfm-rubygem-puma-4.3.3-4.el7sat.src.rpm tfm-rubygem-puma-plugin-systemd-0.1.5-1.el7sat.src.rpm tfm-rubygem-quantile-0.2.0-3.el7sat.src.rpm tfm-rubygem-rabl-0.14.3-1.el7sat.src.rpm tfm-rubygem-rack-2.2.3-1.el7sat.src.rpm tfm-rubygem-rack-cors-1.0.2-1.el7sat.src.rpm tfm-rubygem-rack-jsonp-1.3.1-9.el7sat.src.rpm tfm-rubygem-rack-protection-2.0.3-4.el7sat.src.rpm tfm-rubygem-rack-test-1.1.0-4.el7sat.src.rpm tfm-rubygem-rails-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-rails-dom-testing-2.0.3-6.el7sat.src.rpm tfm-rubygem-rails-html-sanitizer-1.3.0-1.el7sat.src.rpm tfm-rubygem-rails-i18n-6.0.0-2.el7sat.src.rpm tfm-rubygem-railties-6.0.3.1-1.el7sat.src.rpm tfm-rubygem-rainbow-2.2.1-5.el7sat.src.rpm tfm-rubygem-rb-inotify-0.9.7-5.el7sat.src.rpm tfm-rubygem-rbovirt-0.1.7-4.el7sat.src.rpm tfm-rubygem-rbvmomi-2.2.0-3.el7sat.src.rpm tfm-rubygem-record_tag_helper-1.0.1-3.el7sat.src.rpm tfm-rubygem-recursive-open-struct-1.1.0-1.el7sat.src.rpm tfm-rubygem-redhat_access-2.2.18-1.el7sat.src.rpm tfm-rubygem-redhat_access_lib-1.1.5-1.el7sat.src.rpm tfm-rubygem-redis-4.1.2-2.el7sat.src.rpm tfm-rubygem-representable-3.0.4-1.el7sat.src.rpm tfm-rubygem-responders-3.0.0-3.el7sat.src.rpm tfm-rubygem-rest-client-2.0.2-3.el7sat.src.rpm tfm-rubygem-retriable-3.1.2-1.el7sat.src.rpm tfm-rubygem-rkerberos-0.1.5-18.el7sat.src.rpm tfm-rubygem-roadie-3.4.0-3.el7sat.src.rpm tfm-rubygem-roadie-rails-2.1.1-2.el7sat.src.rpm tfm-rubygem-robotex-1.0.0-21.el7sat.src.rpm tfm-rubygem-rsec-0.4.3-4.el7sat.src.rpm tfm-rubygem-ruby-libvirt-0.7.0-4.el7sat.src.rpm tfm-rubygem-ruby2ruby-2.4.2-3.el7sat.src.rpm tfm-rubygem-ruby_parser-3.10.1-2.el7sat.src.rpm tfm-rubygem-rubyipmi-0.10.0-6.el7sat.src.rpm tfm-rubygem-runcible-2.13.0-2.el7sat.src.rpm tfm-rubygem-safemode-1.3.5-2.el7sat.src.rpm tfm-rubygem-scoped_search-4.1.9-1.el7sat.src.rpm tfm-rubygem-secure_headers-6.3.0-2.el7sat.src.rpm tfm-rubygem-sequel-5.7.1-2.el7sat.src.rpm tfm-rubygem-sexp_processor-4.10.0-5.el7sat.src.rpm tfm-rubygem-sidekiq-5.2.7-3.el7sat.src.rpm tfm-rubygem-signet-0.11.0-3.el7sat.src.rpm tfm-rubygem-sinatra-2.0.3-4.el7sat.src.rpm tfm-rubygem-smart_proxy_ansible-3.0.1-5.el7sat.src.rpm tfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-3.el7sat.src.rpm tfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-2.el7sat.src.rpm tfm-rubygem-smart_proxy_discovery-1.0.5-5.el7sat.src.rpm tfm-rubygem-smart_proxy_discovery_image-1.2.1-1.fm2_1.el7sat.src.rpm tfm-rubygem-smart_proxy_dns_infoblox-1.0.0-7.fm2_1.el7sat.src.rpm tfm-rubygem-smart_proxy_dynflow-0.2.4-5.el7sat.src.rpm tfm-rubygem-smart_proxy_dynflow_core-0.2.6-1.fm2_1.el7sat.src.rpm tfm-rubygem-smart_proxy_openscap-0.7.3-1.fm2_1.el7sat.src.rpm tfm-rubygem-smart_proxy_pulp-2.1.0-2.el7sat.src.rpm tfm-rubygem-smart_proxy_remote_execution_ssh-0.3.0-3.el7sat.src.rpm tfm-rubygem-sprockets-3.7.2-6.el7sat.src.rpm tfm-rubygem-sprockets-rails-3.2.1-6.el7sat.src.rpm tfm-rubygem-sqlite3-1.3.13-5.el7sat.src.rpm tfm-rubygem-sshkey-1.9.0-3.el7sat.src.rpm tfm-rubygem-statsd-instrument-2.1.4-2.el7sat.src.rpm tfm-rubygem-stomp-1.4.9-1.el7sat.src.rpm tfm-rubygem-text-1.3.0-7.el7sat.src.rpm tfm-rubygem-thor-1.0.1-2.el7sat.src.rpm tfm-rubygem-thread_safe-0.3.6-5.el7sat.src.rpm tfm-rubygem-tilt-2.0.8-4.el7sat.src.rpm tfm-rubygem-timeliness-0.3.10-1.el7sat.src.rpm tfm-rubygem-tzinfo-1.2.6-1.el7sat.src.rpm tfm-rubygem-uber-0.1.0-1.el7sat.src.rpm tfm-rubygem-unf-0.1.3-7.el7sat.src.rpm tfm-rubygem-unf_ext-0.0.7.2-1.el7sat.src.rpm tfm-rubygem-unicode-0.4.4.4-1.el7sat.src.rpm tfm-rubygem-unicode-display_width-1.0.5-5.el7sat.src.rpm tfm-rubygem-validates_lengths_from_database-0.5.0-7.el7sat.src.rpm tfm-rubygem-webpack-rails-0.9.8-6.el7sat.src.rpm tfm-rubygem-websocket-driver-0.7.1-1.el7sat.src.rpm tfm-rubygem-websocket-extensions-0.1.5-1.el7sat.src.rpm tfm-rubygem-will_paginate-3.1.7-3.el7sat.src.rpm tfm-rubygem-x-editable-rails-1.5.5-5.el7sat.src.rpm tfm-rubygem-xmlrpc-0.3.0-2.el7sat.src.rpm tfm-rubygem-zeitwerk-2.2.2-1.el7sat.src.rpm</p> <p>noarch: ansible-collection-redhat-satellite-1.3.0-1.el7sat.noarch.rpm ansible-runner-1.4.6-1.el7ar.noarch.rpm ansiblerole-foreman_scap_client-0.0.5-1.el7sat.noarch.rpm ansiblerole-insights-client-1.7.1-1.el7sat.noarch.rpm ansiblerole-satellite-receptor-installer-0.6.13-1.el7sat.noarch.rpm candlepin-3.1.21-1.el7sat.noarch.rpm candlepin-selinux-3.1.21-1.el7sat.noarch.rpm crane-selinux-3.4.0-1.el7sat.noarch.rpm foreman-2.1.2.19-1.el7sat.noarch.rpm foreman-bootloaders-redhat-202005201200-1.el7sat.noarch.rpm foreman-bootloaders-redhat-tftpboot-202005201200-1.el7sat.noarch.rpm foreman-cli-2.1.2.19-1.el7sat.noarch.rpm foreman-debug-2.1.2.19-1.el7sat.noarch.rpm foreman-discovery-image-3.6.7-1.el7sat.noarch.rpm foreman-dynflow-sidekiq-2.1.2.19-1.el7sat.noarch.rpm foreman-ec2-2.1.2.19-1.el7sat.noarch.rpm foreman-gce-2.1.2.19-1.el7sat.noarch.rpm foreman-installer-2.1.2.8-1.el7sat.noarch.rpm foreman-installer-katello-2.1.2.8-1.el7sat.noarch.rpm foreman-journald-2.1.2.19-1.el7sat.noarch.rpm foreman-libvirt-2.1.2.19-1.el7sat.noarch.rpm foreman-openstack-2.1.2.19-1.el7sat.noarch.rpm foreman-ovirt-2.1.2.19-1.el7sat.noarch.rpm foreman-postgresql-2.1.2.19-1.el7sat.noarch.rpm foreman-proxy-2.1.2-2.el7sat.noarch.rpm foreman-proxy-content-3.16.0-1.el7sat.noarch.rpm foreman-proxy-journald-2.1.2-2.el7sat.noarch.rpm foreman-selinux-2.1.2.3-1.el7sat.noarch.rpm foreman-service-2.1.2.19-1.el7sat.noarch.rpm foreman-telemetry-2.1.2.19-1.el7sat.noarch.rpm foreman-vmware-2.1.2.19-1.el7sat.noarch.rpm katello-3.16.0-1.el7sat.noarch.rpm katello-certs-tools-2.7.1-1.el7sat.noarch.rpm katello-client-bootstrap-1.7.5-1.el7sat.noarch.rpm katello-common-3.16.0-1.el7sat.noarch.rpm katello-debug-3.16.0-1.el7sat.noarch.rpm katello-selinux-3.4.0-1.el7sat.noarch.rpm keycloak-httpd-client-install-1.2.2-1.el7sat.noarch.rpm kobo-0.5.1-1.el7sat.noarch.rpm pulp-admin-client-2.21.3-1.el7sat.noarch.rpm pulp-docker-admin-extensions-3.2.7-1.el7sat.noarch.rpm pulp-docker-plugins-3.2.7-1.el7sat.noarch.rpm pulp-katello-1.0.3-1.el7sat.noarch.rpm pulp-maintenance-2.21.3-1.el7sat.noarch.rpm pulp-ostree-admin-extensions-1.3.1-2.el7sat.noarch.rpm pulp-ostree-plugins-1.3.1-2.el7sat.noarch.rpm pulp-puppet-admin-extensions-2.21.3-2.el7sat.noarch.rpm pulp-puppet-plugins-2.21.3-2.el7sat.noarch.rpm pulp-puppet-tools-2.21.3-2.el7sat.noarch.rpm pulp-rpm-admin-extensions-2.21.3-2.el7sat.noarch.rpm pulp-rpm-plugins-2.21.3-2.el7sat.noarch.rpm pulp-selinux-2.21.3-1.el7sat.noarch.rpm pulp-server-2.21.3-1.el7sat.noarch.rpm puppet-agent-oauth-0.5.1-3.el7sat.noarch.rpm puppet-foreman_scap_client-0.4.0-1.el7sat.noarch.rpm puppetlabs-stdlib-4.25.1-2.el7sat.noarch.rpm puppetserver-6.13.0-1.el7sat.noarch.rpm python-blinker-1.3-2.el7sat.noarch.rpm python-gnupg-0.3.7-1.el7ui.noarch.rpm python-gofer-2.12.5-7.el7sat.noarch.rpm python-gofer-qpid-2.12.5-7.el7sat.noarch.rpm python-kid-0.9.6-11.el7sat.noarch.rpm python-mongoengine-0.10.5-2.el7sat.noarch.rpm python-nectar-1.6.2-1.el7sat.noarch.rpm python-oauth2-1.5.211-8.el7sat.noarch.rpm python-pulp-bindings-2.21.3-1.el7sat.noarch.rpm python-pulp-client-lib-2.21.3-1.el7sat.noarch.rpm python-pulp-common-2.21.3-1.el7sat.noarch.rpm python-pulp-docker-common-3.2.7-1.el7sat.noarch.rpm python-pulp-integrity-2.21.3-2.el7sat.noarch.rpm python-pulp-oid_validation-2.21.3-1.el7sat.noarch.rpm python-pulp-ostree-common-1.3.1-2.el7sat.noarch.rpm python-pulp-puppet-common-2.21.3-2.el7sat.noarch.rpm python-pulp-repoauth-2.21.3-1.el7sat.noarch.rpm python-pulp-rpm-common-2.21.3-2.el7sat.noarch.rpm python-pulp-streamer-2.21.3-1.el7sat.noarch.rpm python-qpid-1.35.0-5.el7.noarch.rpm python-semantic_version-2.2.0-6.el7sat.noarch.rpm python2-amqp-2.2.2-5.el7sat.noarch.rpm python2-ansible-runner-1.4.6-1.el7ar.noarch.rpm python2-anyjson-0.3.3-11.el7sat.noarch.rpm python2-apypie-0.2.2-1.el7sat.noarch.rpm python2-celery-4.0.2-9.el7sat.noarch.rpm python2-click-6.7-9.el7sat.noarch.rpm python2-crane-3.3.1-9.el7sat.noarch.rpm python2-daemon-2.1.2-7.el7at.noarch.rpm python2-django-1.11.29-1.el7sat.noarch.rpm python2-flask-0.12.2-4.el7sat.noarch.rpm python2-future-0.16.0-11.el7sat.noarch.rpm python2-isodate-0.5.4-12.el7sat.noarch.rpm python2-itsdangerous-0.24-15.el7sat.noarch.rpm python2-jinja2-2.10-10.el7sat.noarch.rpm python2-jmespath-0.9.0-6.el7_7.noarch.rpm python2-keycloak-httpd-client-install-1.2.2-1.el7sat.noarch.rpm python2-kombu-4.0.2-13.el7sat.noarch.rpm python2-lockfile-0.11.0-10.el7ar.noarch.rpm python2-okaara-1.0.37-2.el7sat.noarch.rpm python2-pexpect-4.6-1.el7at.noarch.rpm python2-ptyprocess-0.5.2-3.el7at.noarch.rpm python2-vine-1.1.3-6.el7sat.noarch.rpm python2-werkzeug-0.12.2-5.el7sat.noarch.rpm python3-async-timeout-3.0.1-2.el7ar.noarch.rpm python3-attrs-19.3.0-3.el7ar.noarch.rpm python3-chardet-3.0.4-10.el7ar.noarch.rpm python3-dateutil-2.8.1-2.el7ar.noarch.rpm python3-idna-2.4-2.el7ar.noarch.rpm python3-idna-ssl-1.1.0-2.el7ar.noarch.rpm python3-prometheus-client-0.7.1-2.el7ar.noarch.rpm python3-receptor-satellite-1.2.0-1.el7sat.noarch.rpm python3-six-1.11.0-8.el7ar.noarch.rpm python3-typing-extensions-3.7.4.1-2.el7ar.noarch.rpm qpid-dispatch-tools-1.5.0-4.el7.noarch.rpm qpid-tools-1.36.0-28.el7amq.noarch.rpm receptor-0.6.3-1.el7ar.noarch.rpm redhat-access-insights-puppet-1.0.1-1.el7sat.noarch.rpm repoview-0.6.6-11.el7sat.noarch.rpm rhel8-kickstart-setup-0.0.2-1.el7sat.noarch.rpm rubygem-fast_gettext-1.1.0-4.el7sat.noarch.rpm rubygem-foreman_scap_client-0.4.6-1.el7sat.noarch.rpm rubygem-highline-1.7.8-3.el7sat.noarch.rpm rubygem-oauth-0.5.4-2.el7sat.noarch.rpm rubygem-rack-1.6.12-1.el7sat.noarch.rpm rubygem-rake-0.9.2.2-41.el7sat.noarch.rpm satellite-6.8.0-1.el7sat.noarch.rpm satellite-capsule-6.8.0-1.el7sat.noarch.rpm satellite-cli-6.8.0-1.el7sat.noarch.rpm satellite-common-6.8.0-1.el7sat.noarch.rpm satellite-debug-tools-6.8.0-1.el7sat.noarch.rpm satellite-installer-6.8.0.11-1.el7sat.noarch.rpm tfm-rubygem-actioncable-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-actionmailbox-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-actionmailer-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-actionpack-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-actiontext-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-actionview-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-activejob-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-activemodel-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-activerecord-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-activerecord-import-1.0.0-6.el7sat.noarch.rpm tfm-rubygem-activerecord-session_store-1.1.1-4.el7sat.noarch.rpm tfm-rubygem-activestorage-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-activesupport-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-addressable-2.6.0-1.el7sat.noarch.rpm tfm-rubygem-algebrick-0.7.3-6.el7sat.noarch.rpm tfm-rubygem-amazing_print-1.1.0-1.el7sat.noarch.rpm tfm-rubygem-ancestry-3.0.7-1.el7sat.noarch.rpm tfm-rubygem-anemone-0.7.2-22.el7sat.noarch.rpm tfm-rubygem-angular-rails-templates-1.1.0-1.el7sat.noarch.rpm tfm-rubygem-ansi-1.5.0-2.el7sat.noarch.rpm tfm-rubygem-apipie-bindings-0.3.0-1.el7sat.noarch.rpm tfm-rubygem-apipie-dsl-2.2.2-2.el7sat.noarch.rpm tfm-rubygem-apipie-params-0.0.5-5.el7sat.noarch.rpm tfm-rubygem-apipie-rails-0.5.17-3.el7sat.noarch.rpm tfm-rubygem-audited-4.9.0-3.el7sat.noarch.rpm tfm-rubygem-azure_mgmt_compute-0.18.7-1.el7sat.noarch.rpm tfm-rubygem-azure_mgmt_network-0.19.0-1.el7sat.noarch.rpm tfm-rubygem-azure_mgmt_resources-0.17.6-1.el7sat.noarch.rpm tfm-rubygem-azure_mgmt_storage-0.17.10-1.el7sat.noarch.rpm tfm-rubygem-azure_mgmt_subscriptions-0.18.2-1.el7sat.noarch.rpm tfm-rubygem-builder-3.2.4-1.el7sat.noarch.rpm tfm-rubygem-bundler_ext-0.4.1-4.el7sat.noarch.rpm tfm-rubygem-clamp-1.1.2-5.el7sat.noarch.rpm tfm-rubygem-coffee-rails-5.0.0-1.el7sat.noarch.rpm tfm-rubygem-coffee-script-2.4.1-4.el7sat.noarch.rpm tfm-rubygem-coffee-script-source-1.12.2-4.el7sat.noarch.rpm tfm-rubygem-concurrent-ruby-1.1.6-2.el7sat.noarch.rpm tfm-rubygem-concurrent-ruby-edge-0.6.0-2.el7sat.noarch.rpm tfm-rubygem-connection_pool-2.2.2-2.el7sat.noarch.rpm tfm-rubygem-crass-1.0.6-1.el7sat.noarch.rpm tfm-rubygem-css_parser-1.4.7-3.el7sat.noarch.rpm tfm-rubygem-daemons-1.2.3-7.el7sat.noarch.rpm tfm-rubygem-deacon-1.0.0-4.el7sat.noarch.rpm tfm-rubygem-declarative-0.0.10-1.el7sat.noarch.rpm tfm-rubygem-declarative-option-0.1.0-1.el7sat.noarch.rpm tfm-rubygem-deep_cloneable-3.0.0-3.el7sat.noarch.rpm tfm-rubygem-deface-1.5.3-2.el7sat.noarch.rpm tfm-rubygem-diffy-3.0.1-6.el7sat.noarch.rpm tfm-rubygem-domain_name-0.5.20160310-4.el7sat.noarch.rpm tfm-rubygem-dynflow-1.4.7-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-erubi-1.9.0-1.el7sat.noarch.rpm tfm-rubygem-excon-0.58.0-3.el7sat.noarch.rpm tfm-rubygem-execjs-2.7.0-4.el7sat.noarch.rpm tfm-rubygem-faraday-0.15.4-1.el7sat.noarch.rpm tfm-rubygem-faraday-cookie_jar-0.0.6-1.el7sat.noarch.rpm tfm-rubygem-faraday_middleware-0.13.1-2.el7sat.noarch.rpm tfm-rubygem-fast_gettext-1.4.1-3.el7sat.noarch.rpm tfm-rubygem-fog-aws-3.6.5-1.el7sat.noarch.rpm tfm-rubygem-fog-core-2.1.0-3.el7sat.noarch.rpm tfm-rubygem-fog-google-1.8.2-1.el7sat.noarch.rpm tfm-rubygem-fog-json-1.2.0-3.el7sat.noarch.rpm tfm-rubygem-fog-kubevirt-1.3.3-1.el7sat.noarch.rpm tfm-rubygem-fog-libvirt-0.7.0-1.el7sat.noarch.rpm tfm-rubygem-fog-openstack-1.0.8-2.el7sat.noarch.rpm tfm-rubygem-fog-ovirt-1.2.5-1.el7sat.noarch.rpm tfm-rubygem-fog-vsphere-3.3.1-1.el7sat.noarch.rpm tfm-rubygem-fog-xml-0.1.2-8.el7sat.noarch.rpm tfm-rubygem-foreman-tasks-2.0.2-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-foreman-tasks-core-0.3.4-1.el7sat.noarch.rpm tfm-rubygem-foreman_ansible-5.1.3-1.el7sat.noarch.rpm tfm-rubygem-foreman_ansible_core-3.0.4-1.el7sat.noarch.rpm tfm-rubygem-foreman_azure_rm-2.1.2-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-foreman_bootdisk-17.0.2-2.fm2_1.el7sat.noarch.rpm tfm-rubygem-foreman_discovery-16.1.2-1.el7sat.noarch.rpm tfm-rubygem-foreman_hooks-0.3.16-2.el7sat.noarch.rpm tfm-rubygem-foreman_kubevirt-0.1.7-1.el7sat.noarch.rpm tfm-rubygem-foreman_leapp-0.1.6-1.el7sat.noarch.rpm tfm-rubygem-foreman_openscap-4.0.3-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-foreman_remote_execution-3.3.7-1.el7sat.noarch.rpm tfm-rubygem-foreman_remote_execution-cockpit-3.3.7-1.el7sat.noarch.rpm tfm-rubygem-foreman_remote_execution_core-1.3.0-1.el7sat.noarch.rpm tfm-rubygem-foreman_rh_cloud-2.0.12-1.el7sat.noarch.rpm tfm-rubygem-foreman_templates-9.0.1-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-foreman_theme_satellite-6.0.1.7-1.el7sat.noarch.rpm tfm-rubygem-foreman_virt_who_configure-0.5.2-1.el7sat.noarch.rpm tfm-rubygem-formatador-0.2.1-11.el7sat.noarch.rpm tfm-rubygem-friendly_id-5.3.0-1.el7sat.noarch.rpm tfm-rubygem-fx-0.5.0-1.el7sat.noarch.rpm tfm-rubygem-get_process_mem-0.2.1-3.el7sat.noarch.rpm tfm-rubygem-gettext-3.1.4-10.el7sat.noarch.rpm tfm-rubygem-gettext_i18n_rails-1.8.0-1.el7sat.noarch.rpm tfm-rubygem-git-1.5.0-1.el7sat.noarch.rpm tfm-rubygem-gitlab-sidekiq-fetcher-0.5.2-2.el7sat.noarch.rpm tfm-rubygem-globalid-0.4.2-1.el7sat.noarch.rpm tfm-rubygem-google-api-client-0.23.9-3.el7sat.noarch.rpm tfm-rubygem-googleauth-0.6.7-3.el7sat.noarch.rpm tfm-rubygem-graphql-1.8.14-1.el7sat.noarch.rpm tfm-rubygem-graphql-batch-0.3.10-1.el7sat.noarch.rpm tfm-rubygem-gssapi-1.2.0-6.el7sat.noarch.rpm tfm-rubygem-hammer_cli-2.1.2-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman-2.1.2.1-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_admin-0.0.9-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_ansible-0.3.2-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_azure_rm-0.2.0-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_bootdisk-0.3.0-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_discovery-1.0.2-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_docker-0.0.6.4-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_kubevirt-0.1.4-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_leapp-0.1.0-2.fm2_1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_openscap-0.1.11-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_remote_execution-0.1.2-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_tasks-0.0.14-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_templates-0.2.0-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_virt_who_configure-0.0.6-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_katello-0.22.2.2-1.el7sat.noarch.rpm tfm-rubygem-hashie-3.6.0-1.el7sat.noarch.rpm tfm-rubygem-highline-1.7.8-4.el7sat.noarch.rpm tfm-rubygem-http-3.3.0-1.el7sat.noarch.rpm tfm-rubygem-http-cookie-1.0.2-5.el7sat.noarch.rpm tfm-rubygem-http-form_data-2.1.1-1.el7sat.noarch.rpm tfm-rubygem-httpclient-2.8.3-1.el7sat.noarch.rpm tfm-rubygem-i18n-1.8.2-1.el7sat.noarch.rpm tfm-rubygem-infoblox-3.0.0-3.el7sat.noarch.rpm tfm-rubygem-ipaddress-0.8.0-11.el7sat.noarch.rpm tfm-rubygem-jgrep-1.3.3-12.el7sat.noarch.rpm tfm-rubygem-journald-logger-2.0.4-2.el7sat.noarch.rpm tfm-rubygem-jwt-2.2.1-1.el7sat.noarch.rpm tfm-rubygem-kafo-4.1.0-3.el7sat.noarch.rpm tfm-rubygem-kafo_parsers-1.1.0-3.el7sat.noarch.rpm tfm-rubygem-kafo_wizards-0.0.1-4.el7sat.noarch.rpm tfm-rubygem-katello-3.16.0.11-1.el7sat.noarch.rpm tfm-rubygem-kubeclient-4.3.0-1.el7sat.noarch.rpm tfm-rubygem-ldap_fluff-0.4.7-5.el7sat.noarch.rpm tfm-rubygem-little-plugger-1.1.4-1.el7sat.noarch.rpm tfm-rubygem-locale-2.0.9-13.el7sat.noarch.rpm tfm-rubygem-logging-2.2.2-6.el7sat.noarch.rpm tfm-rubygem-logging-journald-2.0.0-2.el7sat.noarch.rpm tfm-rubygem-loofah-2.4.0-1.el7sat.noarch.rpm tfm-rubygem-mail-2.7.1-1.el7sat.noarch.rpm tfm-rubygem-marcel-0.3.3-1.el7sat.noarch.rpm tfm-rubygem-memoist-0.16.0-1.el7sat.noarch.rpm tfm-rubygem-method_source-0.9.2-2.el7sat.noarch.rpm tfm-rubygem-mime-types-3.2.2-4.el7sat.noarch.rpm tfm-rubygem-mime-types-data-3.2018.0812-4.el7sat.noarch.rpm tfm-rubygem-mimemagic-0.3.5-1.el7sat.noarch.rpm tfm-rubygem-mini_mime-1.0.2-1.el7sat.noarch.rpm tfm-rubygem-mini_portile2-2.4.0-1.el7sat.noarch.rpm tfm-rubygem-ms_rest-0.7.4-2.el7sat.noarch.rpm tfm-rubygem-ms_rest_azure-0.11.1-2.el7sat.noarch.rpm tfm-rubygem-multi_json-1.14.1-1.el7sat.noarch.rpm tfm-rubygem-multipart-post-2.0.0-1.el7sat.noarch.rpm tfm-rubygem-mustermann-1.0.2-4.el7sat.noarch.rpm tfm-rubygem-net-ldap-0.16.1-1.el7sat.noarch.rpm tfm-rubygem-net-ping-2.0.1-3.el7sat.noarch.rpm tfm-rubygem-net-scp-1.2.1-3.el7sat.noarch.rpm tfm-rubygem-net-ssh-4.2.0-1.el7sat.noarch.rpm tfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.noarch.rpm tfm-rubygem-netrc-0.11.0-3.el7sat.noarch.rpm tfm-rubygem-oauth-0.5.4-3.el7sat.noarch.rpm tfm-rubygem-openscap-0.4.9-3.el7sat.noarch.rpm tfm-rubygem-optimist-3.0.0-1.el7sat.noarch.rpm tfm-rubygem-os-1.0.0-1.el7sat.noarch.rpm tfm-rubygem-ovirt_provision_plugin-2.0.3-1.el7sat.noarch.rpm tfm-rubygem-parse-cron-0.1.4-4.el7sat.noarch.rpm tfm-rubygem-polyglot-0.3.5-3.el7sat.noarch.rpm tfm-rubygem-powerbar-2.0.1-2.el7sat.noarch.rpm tfm-rubygem-prometheus-client-1.0.0-1.el7sat.noarch.rpm tfm-rubygem-promise.rb-0.7.4-1.el7sat.noarch.rpm tfm-rubygem-public_suffix-3.0.3-1.el7sat.noarch.rpm tfm-rubygem-pulp_2to3_migration_client-0.2.0-0.1.b6.el7sat.noarch.rpm tfm-rubygem-pulp_ansible_client-0.2.0b13.dev01588546902-1.el7sat.noarch.rpm tfm-rubygem-pulp_certguard_client-0.1.0rc5-1.el7sat.noarch.rpm tfm-rubygem-pulp_container_client-1.4.1-1.el7sat.noarch.rpm tfm-rubygem-pulp_file_client-1.0.1-1.el7sat.noarch.rpm tfm-rubygem-pulp_rpm_client-3.5.0-1.el7sat.noarch.rpm tfm-rubygem-pulpcore_client-3.4.1-1.el7sat.noarch.rpm tfm-rubygem-puma-plugin-systemd-0.1.5-1.el7sat.noarch.rpm tfm-rubygem-quantile-0.2.0-3.el7sat.noarch.rpm tfm-rubygem-rabl-0.14.3-1.el7sat.noarch.rpm tfm-rubygem-rack-2.2.3-1.el7sat.noarch.rpm tfm-rubygem-rack-cors-1.0.2-1.el7sat.noarch.rpm tfm-rubygem-rack-jsonp-1.3.1-9.el7sat.noarch.rpm tfm-rubygem-rack-protection-2.0.3-4.el7sat.noarch.rpm tfm-rubygem-rack-test-1.1.0-4.el7sat.noarch.rpm tfm-rubygem-rails-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-rails-dom-testing-2.0.3-6.el7sat.noarch.rpm tfm-rubygem-rails-html-sanitizer-1.3.0-1.el7sat.noarch.rpm tfm-rubygem-rails-i18n-6.0.0-2.el7sat.noarch.rpm tfm-rubygem-railties-6.0.3.1-1.el7sat.noarch.rpm tfm-rubygem-rainbow-2.2.1-5.el7sat.noarch.rpm tfm-rubygem-rb-inotify-0.9.7-5.el7sat.noarch.rpm tfm-rubygem-rbovirt-0.1.7-4.el7sat.noarch.rpm tfm-rubygem-rbvmomi-2.2.0-3.el7sat.noarch.rpm tfm-rubygem-record_tag_helper-1.0.1-3.el7sat.noarch.rpm tfm-rubygem-recursive-open-struct-1.1.0-1.el7sat.noarch.rpm tfm-rubygem-redhat_access-2.2.18-1.el7sat.noarch.rpm tfm-rubygem-redhat_access_lib-1.1.5-1.el7sat.noarch.rpm tfm-rubygem-redis-4.1.2-2.el7sat.noarch.rpm tfm-rubygem-representable-3.0.4-1.el7sat.noarch.rpm tfm-rubygem-responders-3.0.0-3.el7sat.noarch.rpm tfm-rubygem-rest-client-2.0.2-3.el7sat.noarch.rpm tfm-rubygem-retriable-3.1.2-1.el7sat.noarch.rpm tfm-rubygem-roadie-3.4.0-3.el7sat.noarch.rpm tfm-rubygem-roadie-rails-2.1.1-2.el7sat.noarch.rpm tfm-rubygem-robotex-1.0.0-21.el7sat.noarch.rpm tfm-rubygem-rsec-0.4.3-4.el7sat.noarch.rpm tfm-rubygem-ruby2ruby-2.4.2-3.el7sat.noarch.rpm tfm-rubygem-ruby_parser-3.10.1-2.el7sat.noarch.rpm tfm-rubygem-rubyipmi-0.10.0-6.el7sat.noarch.rpm tfm-rubygem-runcible-2.13.0-2.el7sat.noarch.rpm tfm-rubygem-safemode-1.3.5-2.el7sat.noarch.rpm tfm-rubygem-scoped_search-4.1.9-1.el7sat.noarch.rpm tfm-rubygem-secure_headers-6.3.0-2.el7sat.noarch.rpm tfm-rubygem-sequel-5.7.1-2.el7sat.noarch.rpm tfm-rubygem-sexp_processor-4.10.0-5.el7sat.noarch.rpm tfm-rubygem-sidekiq-5.2.7-3.el7sat.noarch.rpm tfm-rubygem-signet-0.11.0-3.el7sat.noarch.rpm tfm-rubygem-sinatra-2.0.3-4.el7sat.noarch.rpm tfm-rubygem-smart_proxy_ansible-3.0.1-5.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-3.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-2.el7sat.noarch.rpm tfm-rubygem-smart_proxy_discovery-1.0.5-5.el7sat.noarch.rpm tfm-rubygem-smart_proxy_discovery_image-1.2.1-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dns_infoblox-1.0.0-7.fm2_1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dynflow-0.2.4-5.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dynflow_core-0.2.6-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_openscap-0.7.3-1.fm2_1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_pulp-2.1.0-2.el7sat.noarch.rpm tfm-rubygem-smart_proxy_remote_execution_ssh-0.3.0-3.el7sat.noarch.rpm tfm-rubygem-sprockets-3.7.2-6.el7sat.noarch.rpm tfm-rubygem-sprockets-rails-3.2.1-6.el7sat.noarch.rpm tfm-rubygem-sshkey-1.9.0-3.el7sat.noarch.rpm tfm-rubygem-statsd-instrument-2.1.4-2.el7sat.noarch.rpm tfm-rubygem-stomp-1.4.9-1.el7sat.noarch.rpm tfm-rubygem-text-1.3.0-7.el7sat.noarch.rpm tfm-rubygem-thor-1.0.1-2.el7sat.noarch.rpm tfm-rubygem-thread_safe-0.3.6-5.el7sat.noarch.rpm tfm-rubygem-tilt-2.0.8-4.el7sat.noarch.rpm tfm-rubygem-timeliness-0.3.10-1.el7sat.noarch.rpm tfm-rubygem-tzinfo-1.2.6-1.el7sat.noarch.rpm tfm-rubygem-uber-0.1.0-1.el7sat.noarch.rpm tfm-rubygem-unf-0.1.3-7.el7sat.noarch.rpm tfm-rubygem-unicode-display_width-1.0.5-5.el7sat.noarch.rpm tfm-rubygem-validates_lengths_from_database-0.5.0-7.el7sat.noarch.rpm tfm-rubygem-webpack-rails-0.9.8-6.el7sat.noarch.rpm tfm-rubygem-websocket-extensions-0.1.5-1.el7sat.noarch.rpm tfm-rubygem-will_paginate-3.1.7-3.el7sat.noarch.rpm tfm-rubygem-x-editable-rails-1.5.5-5.el7sat.noarch.rpm tfm-rubygem-xmlrpc-0.3.0-2.el7sat.noarch.rpm tfm-rubygem-zeitwerk-2.2.2-1.el7sat.noarch.rpm</p> <p>x86_64: createrepo_c-0.7.4-1.el7sat.x86_64.rpm createrepo_c-debuginfo-0.7.4-1.el7sat.x86_64.rpm createrepo_c-libs-0.7.4-1.el7sat.x86_64.rpm foreman-discovery-image-service-1.0.0-3.el7sat.x86_64.rpm foreman-discovery-image-service-tui-1.0.0-3.el7sat.x86_64.rpm hfsplus-tools-332.14-12.el7.x86_64.rpm hfsplus-tools-debuginfo-332.14-12.el7.x86_64.rpm libmodulemd-1.7.0-1.pulp.el7sat.x86_64.rpm libmodulemd-debuginfo-1.7.0-1.pulp.el7sat.x86_64.rpm libsolv-0.7.4-4.pulp.el7sat.x86_64.rpm libsolv-debuginfo-0.7.4-4.pulp.el7sat.x86_64.rpm libwebsockets-2.4.2-2.el7.x86_64.rpm libwebsockets-debuginfo-2.4.2-2.el7.x86_64.rpm livecd-tools-20.4-1.6.el7sat.x86_64.rpm mod_passenger-4.0.18-24.el7sat.x86_64.rpm mod_xsendfile-0.12-11.el7sat.x86_64.rpm mod_xsendfile-debuginfo-0.12-11.el7sat.x86_64.rpm ostree-2017.1-2.atomic.el7.x86_64.rpm ostree-debuginfo-2017.1-2.atomic.el7.x86_64.rpm pcp-mmvstatsd-0.4-2.el7sat.x86_64.rpm puppet-agent-6.14.0-2.el7sat.x86_64.rpm pycairo-1.16.3-9.el7sat.x86_64.rpm pycairo-debuginfo-1.16.3-9.el7sat.x86_64.rpm pygobject3-debuginfo-3.28.3-2.el7sat.x86_64.rpm python-aiohttp-debuginfo-3.6.2-4.el7ar.x86_64.rpm python-billiard-debuginfo-3.5.0.3-3.el7sat.x86_64.rpm python-bson-3.2-2.el7sat.x86_64.rpm python-imgcreate-20.4-1.6.el7sat.x86_64.rpm python-markupsafe-debuginfo-0.23-21.el7sat.x86_64.rpm python-multidict-debuginfo-4.7.4-2.el7ar.x86_64.rpm python-psutil-5.0.1-3.el7sat.x86_64.rpm python-psutil-debuginfo-5.0.1-3.el7sat.x86_64.rpm python-pycurl-debuginfo-7.43.0.2-4.el7sat.x86_64.rpm python-pymongo-3.2-2.el7sat.x86_64.rpm python-pymongo-debuginfo-3.2-2.el7sat.x86_64.rpm python-pymongo-gridfs-3.2-2.el7sat.x86_64.rpm python-qpid-proton-0.28.0-3.el7.x86_64.rpm python-qpid-qmf-1.36.0-28.el7amq.x86_64.rpm python-saslwrapper-0.22-5.el7sat.x86_64.rpm python-simplejson-3.2.0-1.el7sat.x86_64.rpm python-simplejson-debuginfo-3.2.0-1.el7sat.x86_64.rpm python-twisted-debuginfo-16.4.1-12.el7sat.x86_64.rpm python-yarl-debuginfo-1.4.2-2.el7ar.x86_64.rpm python-zope-interface-4.0.5-4.el7.x86_64.rpm python-zope-interface-debuginfo-4.0.5-4.el7.x86_64.rpm python2-billiard-3.5.0.3-3.el7sat.x86_64.rpm python2-gobject-3.28.3-2.el7sat.x86_64.rpm python2-gobject-base-3.28.3-2.el7sat.x86_64.rpm python2-markupsafe-0.23-21.el7sat.x86_64.rpm python2-pycurl-7.43.0.2-4.el7sat.x86_64.rpm python2-solv-0.7.4-4.pulp.el7sat.x86_64.rpm python2-twisted-16.4.1-12.el7sat.x86_64.rpm python3-aiohttp-3.6.2-4.el7ar.x86_64.rpm python3-multidict-4.7.4-2.el7ar.x86_64.rpm python3-yarl-1.4.2-2.el7ar.x86_64.rpm qpid-cpp-client-1.36.0-28.el7amq.x86_64.rpm qpid-cpp-client-devel-1.36.0-28.el7amq.x86_64.rpm qpid-cpp-debuginfo-1.36.0-28.el7amq.x86_64.rpm qpid-cpp-server-1.36.0-28.el7amq.x86_64.rpm qpid-cpp-server-linearstore-1.36.0-28.el7amq.x86_64.rpm qpid-dispatch-debuginfo-1.5.0-4.el7.x86_64.rpm qpid-dispatch-router-1.5.0-4.el7.x86_64.rpm qpid-proton-c-0.28.0-3.el7.x86_64.rpm qpid-proton-debuginfo-0.28.0-3.el7.x86_64.rpm qpid-qmf-1.36.0-28.el7amq.x86_64.rpm rh-postgresql12-postgresql-evr-0.0.2-1.el7sat.x86_64.rpm rubygem-facter-2.4.1-2.el7sat.x86_64.rpm rubygem-newt-0.9.6-3.el7sat.x86_64.rpm rubygem-newt-debuginfo-0.9.6-3.el7sat.x86_64.rpm rubygem-passenger-4.0.18-24.el7sat.x86_64.rpm rubygem-passenger-debuginfo-4.0.18-24.el7sat.x86_64.rpm rubygem-passenger-native-4.0.18-24.el7sat.x86_64.rpm rubygem-passenger-native-libs-4.0.18-24.el7sat.x86_64.rpm saslwrapper-0.22-5.el7sat.x86_64.rpm saslwrapper-debuginfo-0.22-5.el7sat.x86_64.rpm tfm-rubygem-bcrypt-3.1.12-1.el7sat.x86_64.rpm tfm-rubygem-bcrypt-debuginfo-3.1.12-1.el7sat.x86_64.rpm tfm-rubygem-facter-2.4.0-6.el7sat.x86_64.rpm tfm-rubygem-ffi-1.12.2-1.el7sat.x86_64.rpm tfm-rubygem-ffi-debuginfo-1.12.2-1.el7sat.x86_64.rpm tfm-rubygem-http_parser.rb-0.6.0-1.el7sat.x86_64.rpm tfm-rubygem-http_parser.rb-debuginfo-0.6.0-1.el7sat.x86_64.rpm tfm-rubygem-journald-native-1.0.11-2.el7sat.x86_64.rpm tfm-rubygem-journald-native-debuginfo-1.0.11-2.el7sat.x86_64.rpm tfm-rubygem-nio4r-2.5.2-2.el7sat.x86_64.rpm tfm-rubygem-nio4r-debuginfo-2.5.2-2.el7sat.x86_64.rpm tfm-rubygem-nokogiri-1.10.9-1.el7sat.x86_64.rpm tfm-rubygem-nokogiri-debuginfo-1.10.9-1.el7sat.x86_64.rpm tfm-rubygem-ovirt-engine-sdk-4.2.3-3.el7sat.x86_64.rpm tfm-rubygem-ovirt-engine-sdk-debuginfo-4.2.3-3.el7sat.x86_64.rpm tfm-rubygem-passenger-4.0.18-26.el7sat.x86_64.rpm tfm-rubygem-passenger-debuginfo-4.0.18-26.el7sat.x86_64.rpm tfm-rubygem-passenger-native-4.0.18-26.el7sat.x86_64.rpm tfm-rubygem-passenger-native-libs-4.0.18-26.el7sat.x86_64.rpm tfm-rubygem-pg-1.1.4-2.el7sat.x86_64.rpm tfm-rubygem-pg-debuginfo-1.1.4-2.el7sat.x86_64.rpm tfm-rubygem-puma-4.3.3-4.el7sat.x86_64.rpm tfm-rubygem-puma-debuginfo-4.3.3-4.el7sat.x86_64.rpm tfm-rubygem-rkerberos-0.1.5-18.el7sat.x86_64.rpm tfm-rubygem-rkerberos-debuginfo-0.1.5-18.el7sat.x86_64.rpm tfm-rubygem-ruby-libvirt-0.7.0-4.el7sat.x86_64.rpm tfm-rubygem-ruby-libvirt-debuginfo-0.7.0-4.el7sat.x86_64.rpm tfm-rubygem-sqlite3-1.3.13-5.el7sat.x86_64.rpm tfm-rubygem-sqlite3-debuginfo-1.3.13-5.el7sat.x86_64.rpm tfm-rubygem-unf_ext-0.0.7.2-1.el7sat.x86_64.rpm tfm-rubygem-unf_ext-debuginfo-0.0.7.2-1.el7sat.x86_64.rpm tfm-rubygem-unicode-0.4.4.4-1.el7sat.x86_64.rpm tfm-rubygem-unicode-debuginfo-0.4.4.4-1.el7sat.x86_64.rpm tfm-rubygem-websocket-driver-0.7.1-1.el7sat.x86_64.rpm tfm-rubygem-websocket-driver-debuginfo-0.7.1-1.el7sat.x86_64.rpm tfm-runtime-6.1-1.el7sat.x86_64.rpm</p> <p>These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/</p> <ol> <li>References:</li> </ol> <p>https://access.redhat.com/security/cve/CVE-2018-3258 https://access.redhat.com/security/cve/CVE-2018-11751 https://access.redhat.com/security/cve/CVE-2019-12781 https://access.redhat.com/security/cve/CVE-2019-16782 https://access.redhat.com/security/cve/CVE-2020-5216 https://access.redhat.com/security/cve/CVE-2020-5217 https://access.redhat.com/security/cve/CVE-2020-5267 https://access.redhat.com/security/cve/CVE-2020-7238 https://access.redhat.com/security/cve/CVE-2020-7663 https://access.redhat.com/security/cve/CVE-2020-7942 https://access.redhat.com/security/cve/CVE-2020-7943 https://access.redhat.com/security/cve/CVE-2020-8161 https://access.redhat.com/security/cve/CVE-2020-8184 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548 https://access.redhat.com/security/cve/CVE-2020-10693 https://access.redhat.com/security/cve/CVE-2020-10968 https://access.redhat.com/security/cve/CVE-2020-10969 https://access.redhat.com/security/cve/CVE-2020-11619 https://access.redhat.com/security/cve/CVE-2020-14061 https://access.redhat.com/security/cve/CVE-2020-14062 https://access.redhat.com/security/cve/CVE-2020-14195 https://access.redhat.com/security/cve/CVE-2020-14334 https://access.redhat.com/security/cve/CVE-2020-14380 https://access.redhat.com/security/updates/classification/#important</p> <ol> <li>Contact:</li> </ol> <p>The Red Hat security contact is <a href="mailto:secalert@redhat.com">secalert@redhat.com</a>. More contact details at https://access.redhat.com/security/team/contact/</p> <p>Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1</p> <p>iQIVAwUBX5gpEdzjgjWX9erEAQgmXRAAjIzb5ngtDgGHNv75R+NwkGD3jzRe/GfK 1DDrOBxGaminKY9q+hGwwJOGrMbr2gcfu+VtuFgUTaxFjbfml6Lsju9czOPSL+Wa 5vIcvaUObLQEwmW5hP7ZIqzZvm0UlbSgHEsv7tYwIWkITIg54p2fQzRUuSH8nRhr oomd60Mv8Ayv6IdogtiNDdv8B7avsNQrbtzf60HGtyZlX8Rro2Wy8gosbfsGl10f Z8Nc+tVwWdkdpFjcMtwmYIDtecgwxMmo3FMJRtkSrQ2VldZB9mjFj/WyfZOfV3Io OhoAiLFzi52dC68an5/VFnzZWxdOmYjqm4rBZ2MLnw/wn4jH2WOgjK5VBJUW+nmX k9pQLGrKlLQeYSVY9Je9Maxz1POajFEV1u+ByAVDBm1xBJMhlTEcTwbHt1X0jLzG C2CSzCY8Urz2j1SvYrcrBdNGSqK1wvMwDL7V7lEpaFd/dGE+JwbrOB6z2iYr3de5 /6nh/jeWFi16C0Z8FbYe021edVuzbzCITbz+UdThAITmROcE7Q6ysDPcvToANfta D2gChuqVhmTWJ9YDeQTWiErQLY4OJfklPd/5L/sIZqoZpV8B+5bTHTKsCiisyj1a f4PVZiu+CQoxHuj45rTwRLLfP9+SmJpFz+JsId6rKQ2hrzZ4DzB9srzyewd2TfvG 1yK/tAm1KBU=osSG -----END PGP SIGNATURE-----</p> <p>-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . The purpose of this text-only errata is to inform you about the security issues fixed in this release. </p> <p>Security Fix(es):</p> <ul> <li> <p>netty (CVE-2016-4970 CVE-2020-7238 CVE-2019-20444 CVE-2019-20445)</p> </li> <li> <p>dom4j (CVE-2018-1000632)</p> </li> <li> <p>elasticsearch (CVE-2018-3831)</p> </li> <li> <p>pdfbox (CVE-2018-11797)</p> </li> <li> <p>vertx (CVE-2018-12541)</p> </li> <li> <p>spring-data-jpa (CVE-2019-3797)</p> </li> <li> <p>mina-core (CVE-2019-0231)</p> </li> <li> <p>jackson-databind (CVE-2019-12086 CVE-2019-16335 CVE-2019-14540 CVE-2019-17267 CVE-2019-14892 CVE-2019-14893 CVE-2019-16942 CVE-2019-16943 CVE-2019-17531 CVE-2019-20330 CVE-2020-10673 CVE-2020-10672 CVE-2020-8840 CVE-2020-9546 CVE-2020-9547 CVE-2020-9548 CVE-2020-10968 CVE-2020-10969 CVE-2020-11111 CVE-2020-11112 CVE-2020-11113 CVE-2020-11620 CVE-2020-11619 CVE-2020-14195 CVE-2020-14060 CVE-2020-14061 CVE-2020-14062)</p> </li> <li> <p>jackson-mapper-asl (CVE-2019-10172)</p> </li> <li> <p>hawtio (CVE-2019-9827)</p> </li> <li> <p>undertow (CVE-2019-9511 CVE-2020-1757 CVE-2019-14888 CVE-2020-1745)</p> </li> <li> <p>santuario (CVE-2019-12400)</p> </li> <li> <p>apache-commons-beanutils (CVE-2019-10086)</p> </li> <li> <p>cxf (CVE-2019-17573)</p> </li> <li> <p>apache-commons-configuration (CVE-2020-1953)</p> </li> </ul> <p>For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Solution:</p> <p>Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. </p> <p>Installation instructions are available from the Fuse 7.7.0 product documentation page: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.7/</p> <ol> <li>Bugs fixed (https://bugzilla.redhat.com/):</li> </ol> <p>1343616 - CVE-2016-4970 netty: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl 1620529 - CVE-2018-1000632 dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents 1632452 - CVE-2018-3831 elasticsearch: Information exposure via _cluster/settings API 1637492 - CVE-2018-11797 pdfbox: unbounded computation in parser resulting in a denial of service 1638391 - CVE-2018-12541 vertx: WebSocket HTTP upgrade implementation holds the entire http request in memory before the handshake 1697598 - CVE-2019-3797 spring-data-jpa: Additional information exposure with Spring Data JPA derived queries 1700016 - CVE-2019-0231 mina-core: Retaining an open socket in close_notify SSL-TLS leading to Information disclosure. 1713468 - CVE-2019-12086 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. 1715075 - CVE-2019-10172 jackson-mapper-asl: XML external entity similar to CVE-2016-3720 1728604 - CVE-2019-9827 hawtio: server side request forgery via initial /proxy/ substring of a URI 1741860 - CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service 1752770 - CVE-2020-1757 undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass 1755831 - CVE-2019-16335 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource 1755849 - CVE-2019-14540 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig 1758167 - CVE-2019-17267 jackson-databind: Serialization gadgets in classes of the ehcache package 1758171 - CVE-2019-14892 jackson-databind: Serialization gadgets in classes of the commons-configuration package 1758182 - CVE-2019-14893 jackson-databind: Serialization gadgets in classes of the xalan package 1758187 - CVE-2019-16942 jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.<em> 1758191 - CVE-2019-16943 jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource 1764658 - CVE-2019-12400 xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source 1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default 1772464 - CVE-2019-14888 undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS 1775293 - CVE-2019-17531 jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.</em> 1793154 - CVE-2019-20330 jackson-databind: lacks certain net.sf.ehcache blocking 1796225 - CVE-2020-7238 netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling 1797011 - CVE-2019-17573 cxf: reflected XSS in the services listing page 1798509 - CVE-2019-20445 netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header 1798524 - CVE-2019-20444 netty: HTTP request smuggling 1807305 - CVE-2020-1745 undertow: AJP File Read/Inclusion Vulnerability 1815212 - CVE-2020-1953 apache-commons-configuration: uncontrolled class instantiation when loading YAML files 1815470 - CVE-2020-10673 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution 1815495 - CVE-2020-10672 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution 1816330 - CVE-2020-8840 jackson-databind: Lacks certain xbean-reflect/JNDI blocking 1816332 - CVE-2020-9546 jackson-databind: Serialization gadgets in shaded-hikari-config 1816337 - CVE-2020-9547 jackson-databind: Serialization gadgets in ibatis-sqlmap 1816340 - CVE-2020-9548 jackson-databind: Serialization gadgets in anteros-core 1819208 - CVE-2020-10968 jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider 1819212 - CVE-2020-10969 jackson-databind: Serialization gadgets in javax.swing.JEditorPane 1821304 - CVE-2020-11111 jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory 1821311 - CVE-2020-11112 jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider 1821315 - CVE-2020-11113 jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime 1826798 - CVE-2020-11620 jackson-databind: Serialization gadgets in commons-jelly:commons-jelly 1826805 - CVE-2020-11619 jackson-databind: Serialization gadgets in org.springframework:spring-aop 1848958 - CVE-2020-14195 jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory 1848960 - CVE-2020-14060 jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool 1848962 - CVE-2020-14062 jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool 1848966 - CVE-2020-14061 jackson-databind: serialization in weblogic/oracle-aqjms</p> <p>5</p></p> <a href="https://www.variotdbs.pl/vuln/VAR-202006-1825" class="card-link" rel="noreferrer" target="_blank">Show details on source website</a> <br /><br /> <div class="btn-group" role="group"> <a role="button" class="btn btn-primary" data-bs-toggle="collapse" data-bs-target="#collapseJsonvar-202006-1825" aria-expanded="false" aria-controls="collapseJsonvar-202006-1825"> JSON <svg class="bi" width="1em" height="1em" fill="currentColor"> <use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/> </svg> </a> <div class="btn-group" role="group"> <button id="btnGroupDropShare" type="button" class="btn btn-primary" data-bs-toggle="dropdown" aria-expanded="false"> Share <svg class="bi" width="1em" height="1em" fill="currentColor"> <use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/> </svg> </button> <ul class="dropdown-menu" aria-labelledby="btnGroupDropShare"> <li><a class="dropdown-item" href="https://news.ycombinator.com/submitlink?u=https://vulnerability.circl.lu/vuln/var-202006-1825&t=Vulnerability var-202006-1825" target="_blank" title="Share on Hacker News">Hacker News</a></li> <li><a class="dropdown-item" href="https://www.linkedin.com/shareArticle?mini=true&url=https://vulnerability.circl.lu/vuln/var-202006-1825&title=Vulnerability var-202006-1825" target="_blank" title="Share on LinkedIn">LinkedIn</a></li> <li><a class="dropdown-item" href="https://mastodonshare.com/?text=Vulnerability var-202006-1825&url=https://vulnerability.circl.lu/vuln/var-202006-1825" target="_blank" title="Share on Mastodon">Mastodon</a></li> <li><a class="dropdown-item" href="https://www.newspipe.org/bookmark/bookmarklet?href=https://vulnerability.circl.lu/vuln/var-202006-1825&title=Vulnerability var-202006-1825" target="_blank" title="Share on Newspipe">Newspipe</a></li> <li><a class="dropdown-item" href="https://api.pinboard.in/v1/posts/add?url=https://vulnerability.circl.lu/vuln/var-202006-1825&description=Vulnerability var-202006-1825" target="_blank" title="Share on Pinboard">Pinboard</a></li> <li><a class="dropdown-item" href="https://reddit.com/submit?link=https://vulnerability.circl.lu/vuln/var-202006-1825&title=Vulnerability var-202006-1825" target="_blank" title="Share on Reddit">Reddit</a></li> </ul> </div> <a type="button" class="btn btn-primary" title="Copy to clipboard" aria-label="Copy to clipboard" onclick="copyToClipboard('var-202006-1825')" vuln-id="var-202006-1825" href="#">To clipboard</a> </div> <div class="collapse" id="collapseJsonvar-202006-1825"> <br /> <div class="card card-body"> <pre class="json-container" id="containervar-202006-1825">{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1825", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "communications element manager", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.2.2" }, { "model": "active iq unified manager", "scope": "gte", "trust": 1.0, "vendor": "netapp", "version": "9.5" }, { "model": "banking digital experience", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "18.3" }, { "model": "banking digital experience", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "20.1" }, { "model": "communications evolved communications application server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "7.1" }, { "model": "agile plm", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "9.3.6" }, { "model": "communications diameter signaling router", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.2.2" }, { "model": "communications diameter signaling router", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.0.0" }, { "model": "communications instant messaging server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "10.0.1.4.0" }, { "model": "steelstore cloud integrated storage", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "communications session report manager", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.2.2" }, { "model": "banking digital experience", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "18.2" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "banking digital experience", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "19.2" }, { "model": "active iq unified manager", "scope": "gte", "trust": 1.0, "vendor": "netapp", "version": "7.3" }, { "model": "jackson-databind", "scope": "gte", "trust": 1.0, "vendor": "fasterxml", "version": "2.9.0" }, { "model": "banking digital experience", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "19.1" }, { "model": "communications session route manager", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "8.2.2" }, { "model": "banking digital experience", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "18.1" }, { "model": "communications contacts server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.0.0.5.0" }, { "model": "communications element manager", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.2.0" }, { "model": "communications session report manager", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.2.0" }, { "model": "communications session route manager", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "8.2.0" }, { "model": "communications calendar server", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8.0.0.4.0" }, { "model": "jackson-databind", "scope": "lt", "trust": 1.0, "vendor": "fasterxml", "version": "2.9.10.5" }, { "model": "jackson-databind", "scope": "eq", "trust": 0.8, "vendor": "fasterxml", "version": "2.9.10.5" }, { "model": "ops center common services", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "(\u6d77\u5916\u8ca9\u58f2\u306e\u307f)" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007015" }, { "db": "NVD", "id": "CVE-2020-14195" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.9.10.5", "versionStartIncluding": "2.9.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*", "cpe_name": [], "versionStartIncluding": "7.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe_name": [], "versionStartIncluding": "7.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "versionStartIncluding": "9.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.2", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.2", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.2", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.2", "versionStartIncluding": "8.2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-14195" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "159724" }, { "db": "PACKETSTORM", "id": "158636" }, { "db": "CNNVD", "id": "CNNVD-202006-1070" } ], "trust": 0.8 }, "cve": "CVE-2020-14195", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-007015", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-167049", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-14195", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-007015", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-14195", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-007015", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202006-1070", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-167049", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-14195", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-167049" }, { "db": "VULMON", "id": "CVE-2020-14195" }, { "db": "JVNDB", "id": "JVNDB-2020-007015" }, { "db": "NVD", "id": "CVE-2020-14195" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202006-1070" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity). FasterXML jackson-databind Exists in an unreliable data deserialization vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. FasterXML Jackson is a data processing tool for Java developed by American FasterXML Company. jackson-databind is one of the components with data binding function. A security vulnerability exists in FasterXML jackson-databind 2.x versions prior to 2.9.10.5. An attacker could exploit this vulnerability to execute arbitrary code on the system by sending specially crafted input. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: Satellite 6.8 release\nAdvisory ID: RHSA-2020:4366-01\nProduct: Red Hat Satellite 6\nAdvisory URL: https://access.redhat.com/errata/RHSA-2020:4366\nIssue date: 2020-10-27\nCVE Names: CVE-2018-3258 CVE-2018-11751 CVE-2019-12781\n CVE-2019-16782 CVE-2020-5216 CVE-2020-5217\n CVE-2020-5267 CVE-2020-7238 CVE-2020-7663\n CVE-2020-7942 CVE-2020-7943 CVE-2020-8161\n CVE-2020-8184 CVE-2020-8840 CVE-2020-9546\n CVE-2020-9547 CVE-2020-9548 CVE-2020-10693\n CVE-2020-10968 CVE-2020-10969 CVE-2020-11619\n CVE-2020-14061 CVE-2020-14062 CVE-2020-14195\n CVE-2020-14334 CVE-2020-14380\n====================================================================\n1. Summary:\n\nAn update is now available for Red Hat Satellite 6.8 for RHEL 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Satellite 6.7 - noarch, x86_64\nRed Hat Satellite Capsule 6.8 - noarch, x86_64\n\n3. Description:\n\nRed Hat Satellite is a systems management tool for Linux-based\ninfrastructure. It allows for provisioning, remote management, and\nmonitoring of multiple Linux deployments with a single centralized tool. \n\nSecurity Fix(es):\n\n* mysql-connector-java: Connector/J unspecified vulnerability (CPU October\n2018) (CVE-2018-3258)\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace\nmishandling (CVE-2020-7238)\n* rubygem-websocket-extensions: ReDoS vulnerability in\nSec-WebSocket-Extensions parser (CVE-2020-7663)\n* puppet: puppet server and puppetDB may leak sensitive information via\nmetrics API (CVE-2020-7943)\n* jackson-databind: multiple serialization gadgets (CVE-2020-8840\nCVE-2020-9546 CVE-2020-9547 CVE-2020-9548 CVE-2020-10968 CVE-2020-10969\nCVE-2020-11619 CVE-2020-14061 CVE-2020-14062 CVE-2020-14195)\n* foreman: unauthorized cache read on RPM-based installations through local\nuser (CVE-2020-14334)\n* Satellite: Local user impersonation by Single sign-on (SSO) user leads to\naccount takeover (CVE-2020-14380)\n* Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS\n(CVE-2019-12781)\n* rubygem-rack: hijack sessions by using timing attacks targeting the\nsession id (CVE-2019-16782)\n* rubygem-secure_headers: limited header injection when using dynamic\noverrides with user input (CVE-2020-5216)\n* rubygem-secure_headers: directive injection when using dynamic overrides\nwith user input (CVE-2020-5217)\n* rubygem-actionview: views that use the `j` or `escape_javascript` methods\nare susceptible to XSS attacks (CVE-2020-5267)\n* puppet: Arbitrary catalog retrieval (CVE-2020-7942)\n* rubygem-rack: directory traversal in Rack::Directory (CVE-2020-8161)\n* rubygem-rack: percent-encoded cookies can be used to overwrite existing\nprefixed cookie names (CVE-2020-8184)\n* hibernate-validator: Improper input validation in the interpolation of\nconstraint error messages (CVE-2020-10693)\n* puppet-agent: Puppet Agent does not properly verify SSL connection when\ndownloading a CRL (CVE-2018-11751)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nAdditional Changes:\n\n* Provides the Satellite Ansible Modules that allow for full automation of\nyour Satellite configuration and deployment. \n\n* Adds ability to install Satellite and Capsules and manage hosts in a IPv6\nnetwork environment\n\n* Ansible based Capsule Upgrade automation: Ability to centrally upgrade\nall of your Capsule servers with a single job execution. \n\n* Platform upgrades to Postgres 12, Ansible 2.9, Ruby on Rails and latest\nversion of Puppet\n\n* Support for HTTP UEFI provisioning\n\n* Support for CAC card authentication with Keycloak integration\n\n* Add ability to upgrade Red Hat Enterprise Linux 7 hosts to version 8\nusing the LEAPP based tooling. \n\n* Support for Red Hat Enterprise Linux Traces integration\n\n* satellite-maintain \u0026 foreman-maintain are now self updating\n\n* Notifications in the UI to warn users when subscriptions are expiring. \n\nThe items above are not a complete list of changes. This update also fixes\nseveral bugs and adds various enhancements. Documentation for these changes\nis available from the Release Notes document linked to in the References\nsection. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1160344 - [RFE] Satellite support for cname as alternate cname for satellite server\n1261802 - [RFE] Make the foreman bootdisk full-host image work on UEFI systems\n1300211 - capsule-certs-generate failed to increment release number when generating certificate rpm for foreman-proxy\n1332702 - smart-proxy-openscap-send with additional features - alert if file corrupt\n1398317 - For the vms built by Satellite 6 using \"Network Based\" installation mode on VMWare, unable to change the boot sequence via BIOS\n1410616 - [RFE] Prominent notification of expiring subscriptions. \n1410916 - Should only be able to add repositories you have access to\n1429033 - Host provisioned with RHEL Workstation OS, after provisioning displayed as generic RedHat 7.3\n1461781 - [RFE]A button should be available in the GUI to clear the recurring logics. \n1469267 - need updated rubygem-rake\n1486446 - Content view versions list has slow query for package count\n1486696 - \u0027hammer host update\u0027 removes existing host parameters\n1494180 - Sorting by network address for subnet doesn\u0027t work properly\n1501499 - tomcat listens to 0.0.0.0 for serving requests but just needs localhost\n1503037 - [RFE] Cancelled future/recurring job invocations should not get the status \"failed\" but rather \"cancelled\"\n1505842 - Remote Execution engine: Error initializing command: Net::SSH::HostKeyMismatch - fingerprint 20:a9:b7:45:1a:b7:d6:42:1e:03:d1:1f:06:20:4c:e2 does not match for \"172.17.0.101\"\n1531674 - Operating System Templates are ordered inconsistently in UI. \n1537320 - [RFE] Support for Capsules at 1 version lower than Satellite\n1543316 - Satellite 6.2 Upgrade Fails with error \"rake aborted! NoMethodError: undefined method `first\u0027 for nil:NilClass\" when there are custom bookmarks created\n1563270 - Sync status information is lost after cleaning up old tasks related to sync. \n1569324 - Webrick is unable to use 2 supported TLS v1.2 ciphers (\u0027ECDHE-RSA-AES128-GCM-SHA256\u0027, \u0027ECDHE-RSA-AES256-GCM-SHA384\u0027)\n1571907 - Passenger threads throwing tracebacks on API jobs after spawning\n1576859 - [RFE] Implement automatic assigning subnets through data provided by facter\n1584184 - [RFE] The locked template is getting overridden by default\n1601101 - [RFE] Add autofill functionality to the Job invocation Search query box, copy from Hosts search box\n1607706 - [RFE] Add support for --vlanid in Satellite Kickstart Default provisioning template\n1608001 - Rearrange search/filter options on Red Hat Repositories page. \n1613391 - race condition on removing multiple organizations simultaneously\n1619274 - [RFE] Red Hat Satellite should now be able to discover and provision bare metal machines via UEFI HTTP boot\n1619422 - User Agent for Downstream RSS feed still says Foreman and Foreman Version\n1620214 - Page should auto-refresh after subscriptions have been modified on the Satellite webui\n1624049 - Changing the organization in the Satellite WebUI does not change the sync plan page information from the previous organization\n1625258 - Having empty \"Allocation (GB)\" when creating a new Host, nil:NilClass returned on creating the Host\n1627066 - Unable to revert to the original version of the provisioning template\n1630433 - [RFE] Include Ansible Satellite modules with Ansible Core modules\n1630536 - yum repos password stored as cleartext\n1632577 - Audit log show \u0027missing\u0027 for adding/removing repository to a CV\n1640615 - CVE-2018-3258 mysql-connector-java: Connector/J unspecified vulnerability (CPU October 2018)\n1645062 - host_collection controller responds with 200 instead of 201 to a POST request\n1645749 - repositories controller responds with 200 instead of 201 to a POST request\n1647216 - Lack of edit_smart_proxies permission causes error when setting host to Build\n1647364 - [RFE] Extend the audits by the http request id\n1647781 - Audits contain no data (Added foo to Missing(ID: x))\n1651297 - Very slow query when using facts on user roles as filters\n1653217 - [RFE] More evocative name for Play Ansible Roles option?\n1654347 - Satellite may create duplicate CreateRssNotifications tasks after restarting foreman tasks\n1654375 - [RFE] Mention specifically uder the admin chexbox for AD LDAP user if its created with admin role,\n1659418 - katello-tracer-upload failing with error \"ImportError: No module named katello\"\n1665277 - subscription manager register activation key with special character failed\n1665893 - candlepin refuses to start or hangs periodically when having too many messages in ActiveMQ journal\n1666693 - Command \"hammer subscription list\" is not correctly showing the comment \"Guests of \" in the \"Type\" field in the output. \n1677907 - Ansible API endpoints return 404\n1680157 - [RFE] Puppet \u0027package\u0027 provider type does not support selecting modularity streams\n1680458 - Locked Report Templates are getting removed. \n1680567 - Reporting Engine API to list report template per organization/location returns 404 error\n1681619 - [RFE] Disable the option to enter a MAC address after selecting a compute resource while creating new hosts through Satellite\n1685949 - [RFE] Support passing of attribute name instead of Id\u0027s in RHV workflow\n1687116 - kernel version checks should not use /lib/modules to determine running version\n1688886 - subscription-manager not attaching the right quantity per the cpu core\n1691416 - Delays when many clients upload tracer data simultaneously\n1697476 - [RFE] To be able to see the name of the provisioning template being used to build a host from the host itself\n1702434 - foreman-bootloaders-redhat-tftpboot expected file permissions in package don\u0027t match runtime permissions\n1705097 - An empty report file doesn\u0027t show any headers\n1709557 - [RFE] warn the user if they have done a select all and it includes the restart|reboot service\n1709842 - Tracer shows the machines needs rebooting even after reboot if kernel-debug is installed\n1710511 - Filter by os_minor includes unexpected values on the Satellite web UI. \n1715999 - Use Infoblox API for DNS conflict check and not system resolver\n1716423 - Nonexistent quota can be set\n1717403 - Broken breadcrumbs link to compute resource VM list on VM detail page\n1718012 - [RFE] Add a hard limit of 100 items to restrict any fact child-hash/array\n1718954 - [RFE] When the contentAccessMode is set to org_environment for an owner, we should disable auto-attach globally\n1719509 - [RFE] \"hammer host list\" including erratas information\n1719516 - [RFE] \"hammer host-collection hosts\" including erratas information\n1720725 - [RFE] Ability to override DHCP options and wait_after_restart option for race condition\n1721419 - SSH key cannot be added when FIPS enabled\n1722954 - Slow performance when running \"hammer host list\" with a high number of Content Hosts (15k+ for example)\n1723313 - foreman_tasks:cleanup description contain inconsistent information\n1724494 - [Capsule][smart_proxy_dynflow_core] \"PID file /var/run/foreman-proxy/smart_proxy_dynflow_core.pid not readable (yet?) after start\"\n1724497 - CVE-2019-12781 Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS\n1726768 - [RFE] Red Hat Satellite 6 GUI, Tasks should show Full name\n1729968 - Editing disk size of a Compute Profile for a VMware Compute Resource makes the whole Storage section disappear\n1730083 - [RFE] Add Jobs button to host detail page\n1731155 - Cloud init template missing snippet compared to Kickstart default user data\n1731229 - podman search against Red Hat Satellite 6 fails. \n1731235 - [RFE] Create Report Template to list inactive hosts\n1733241 - [RFE] hammer does not inherit parent location information\n1733650 - Satellite receives RPM1004 pulp error and 403 Forbidden http error retrieving packages from CDN\n1736809 - undefined method `split\u0027 for nil:NilClass when viewing the host info with hammer\n1737135 - Content Hosts loses subscriptions after Vmotion and auto attach is unable to assigned the subscriptions if any other subscription is already attached to the host. \n1737564 - [RFE] Support custom images on Azure\n1738548 - Parameter --openscap-proxy-id is missing in hammer host create command. \n1740943 - Increasing Ansible verbosity level does not increase the verbosity of output\n1743056 - While creating a host for a particular location, all the domains are in the pull down list, even if only one domain is selected for that location. \n1743776 - Error while deleting the content view version. \n1745516 - Multiple duplicate index entries are present in candlepin database\n1746936 - satellite6 is not using remote execution by default even after setting remote execution by default from satellite web-UI. \n1749692 - Default Rhel8 scap content does not get populated on the Satellite\n1749916 - [RFE] Satellite should support certificates with \u003e 2048 Key size\n1751981 - Parent object properties are not propagated to Child objects in Location and Host Group\n1752880 - katello-host-tools-tracer stats paths abusively, leading to a hang or slowness of yum command\n1753551 - Traces output from Satellite GUI has mismatches with client tracer output\n1756991 - 2 inputs with same name -\u003e uninitialized constant #\u003cClass:0x000000000b894c38\u003e::NonUniqueInputsError\n1757317 - [RFE] Dynflow workers extraction\n1757394 - [BUG] Non-admin users always get \"Missing one of the required permissions\" message while accessing their own table_preferences via Satellite 6 API\n1759160 - Rake task for cleaning up DHCP records on proxy\n1761872 - Disabled buttons are still working\n1763178 - [RFE] Unnecessary call to userhelp and therefore log entries\n1763816 - [RFE] Report which users access the API\n1766613 - Fact search bar broken and resets to only searching hostname\n1766906 - Associating more than 10 Ansible roles to a Host only sets based on the per-page setting\n1767497 - Compute Resource filter does not correctly allow Refresh Cache\n1767635 - [RFE] Enable Organization and Location to be entered not just selected\n1770366 - [RFE] Improve upgrade efficiency by moving RPM post-installation scripts to the installer. \n1770544 - Puppet run job notification do not populate \"%{puppet_options}\"\u0027 value\n1770777 - Changing concurrency level while executing Ansible jobs fail with NoMethodError: undefined method `[]\u0027 for nil:NilClass\n1771367 - undefined method `request_uri\u0027 when Openidc Provider Token Endpoint is none\n1771428 - Openscap documentation link on Satellite 6 webui is broke\n1771484 - Client side documentation links are not branded\n1771693 - \u0027Deployed on\u0027 parameter is not listed in API output\n1772381 - Incorrect example to use multiple attributes as a matcher key in the tooltip for Order\n1772517 - login with the user name as same as existing user group gives 500 ISE and wont allow user to login again\n1772544 - Use APIv4 is not the default when creating a new compute resource in ovirt\n1773298 - GET /katello/api/srpms/compare always fails with error: Missing template katello/api/v2/common/compare\n1774710 - UI: When selecting the server type in ldap authentication, \"attribute mappings\" fields could be populated automatically\n1778396 - exporting/importing report template process is causing a different report during the visualization (blank lines)\n1778503 - Prepended text on OS name creation\n1778681 - Some pages are missing title in html head\n1779638 - Unable to filter/search http-proxies using Organization/Location for Satellite UI. \n1781671 - While using concurrency_level in remote execution, job progress in WebUI is not being updated properly\n1782352 - [RHEL 8.1 client] All packages are not getting updated after click on \"Update All Packages\"\n1782426 - Viewing errata from a repository returns incorrect unfiltered results\n1783568 - [RFE] - Bulk Tracer Remediation\n1783882 - Ldap refresh failed with \"Validation failed: Adding would cause a cycle!\"\n1784012 - Default kickstart places log to /mnt/sysimage/root/install.post.log\n1784341 - disable CertificateRevocationListTask job in candlepin.conf by default\n1785117 - [RFE] Add functionality in foreman logging to hash-out or mark as [FILTERED] the password in /var/log/foreman-maintain/foreman-maintain.log and /var/log/foreman-installer/satellite.log file\n1785231 - Ansible Variable override to false does not gets reflected on client machine on Red Hat Satellite 6. \n1785624 - [UI] Importing templates with associate \u0027never\u0027 is not resulting as expected\n1785683 - Does not load datacenter when multiple compute resources are created for same VCenter\n1785902 - Ansible RunHostJob tasks failed with \"Failed to initialize: NoMethodError - undefined method `[]\u0027 for nil:NilClass\"\n1785940 - [RFE] Reporting template should allow host filtering based on applicable errata issue date\n1787329 - change filename in initrd live CPIO archive to fdi.iso\n1788261 - CVE-2018-11751 puppet-agent: Puppet Agent does not properly verify SSL connection when downloading a CRL\n1788958 - [RFE] add \"elapsed time\" column to export and hammer, make it filterable in WebUI\n1789006 - Smart proxy dynflow core listens on 0.0.0.0\n1789100 - CVE-2019-16782 rubygem-rack: hijack sessions by using timing attacks targeting the session id\n1789434 - Template editor not always allows refreshing of the preview pane\n1789522 - On unhealthy Satellite, dynflow_envelopes table might grow indefinitely\n1789686 - Non-admin user with enough permissions can\u0027t generate report of applicable errata\n1789815 - The \"start\" parameter should be mentioned inside \"--compute-attributes:\" in hammer_cli for Satellite 6\n1789911 - \"foreman-rake katello:publish_unpublished_repositories\" is referring to column which no longer exists in katello_repositories table. \n1789924 - [RFE] As user I want to see a \"disabled\" status for Simple Content Access (Golden Ticketed) Orgs\n1791654 - drop config_templates api endpoints and parameters\n1791656 - drop deprecated host status endpoint\n1791658 - drop reports api endpoint\n1791659 - Remove `use_puppet_default` api params\n1791663 - remove deprecated permissions api parameters\n1791665 - drop deprecated compute resource uuid parameter\n1792131 - [UI] Could not specify organization/location for users that come from keycloak\n1792135 - Not able to login again if session expired from keycloak\n1792174 - [RFE] Subscription report template\n1792304 - When generating custom report, leave output format field empty\n1792378 - [RFE] Long role names are cut off in the roles UI\n1793951 - [RFE] Display request UUID on audits page\n1794015 - When using boot disk based provisioning, sometimes foreman tries to recreate folder foreman_isos in the datastore even when the folder already exists\n1794346 - Change the label for the flashing eye icon during user impersonation\n1794641 - Sync status page\u0027s content are not being displayed properly. \n1795809 - HTML tags visible on paused task page\n1796155 - [RFE] host_collections not available in reporting engine unless safe mode disabled\n1796205 - iso upload: correctly check if upload directory exists\n1796225 - CVE-2020-7238 netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling\n1796259 - loading subscriptions page is very slow\n1796697 - Unable to list/enable EUS repositories on the RHEL clients registered in the satellite server with org_environment contentAccessMode\n1798489 - [RHSSO] - If Access Token Lifespan is set to 5 mins then the user is getting sign out instead after idle SSO timeout\n1798668 - Configure default MongoDB WiredTiger cache to be 20% of RAM in the Satellite server\n1799480 - CLI - hammer repository info shows blank sync status if the repository sync is in warning/error state. \n1800503 - In Hammer, it is not possible to set default keyboard layout for a RHEV host\n1801264 - CVE-2020-5217 rubygem-secure_headers: directive injection when using dynamic overrides with user input\n1801286 - CVE-2020-5216 rubygem-secure_headers: limited header injection when using dynamic overrides with user input\n1802529 - Repository sync in tasks page shows percentage in 17 decimal points\n1802631 - Importing Ansible variables yields NoMethodError: undefined method `map\u0027 for nil:NilClass (initialize_variables) [variables_importer.rb]\n1803846 - Red Hat Insights Risk Summary shows systems at risk while there are none\n1804496 - While performing bulk actions, unable to select all tasks under Monitor --\u003e Tasks page. \n1804651 - Missing information about \"Create Capsule\" via webUI\n1805501 - CVE-2020-10693 hibernate-validator: Improper input validation in the interpolation of constraint error messages\n1805727 - Default Custom Repository download policy setting refers to old name (Default Repository download policy) in satellite 6.7\n1806713 - hypervisor checkin fails with cp_consumer_hypervisor_ukey error\n1806842 - Disabling dynflow_enable_console from setting should hide \"Dynflow console\" in Tasks\n1806897 - Red Hat Inventory Uploads fail with NoMethodError: undefined method `mtu\u0027\n1807042 - [RFE] Support additional disks for VM on Azure Compute Resource\n1807321 - A non-admin users with view recurring_logics permissions are unable to list recurring logics. \n1807829 - Generated inventory file doesn\u0027t exist\n1807946 - Multiple duplicate index entries are present in foreman database\n1808843 - Satellite lists unrelated RHV storage domains using v4 API\n1810250 - Unable to delete repository - Content with ID could not be found\n1810549 - dropping packets to qdrouterd triggers a memory leak in qpid-proton 0.28.0-2 libraries used by goferd\n1810774 - Applying errata via Host Collection the errata are trying to be applied to all hosts associated with the host collection\n1811390 - Links to an errata list of a repository lack repositoryId in URI and points to generic \"errata\" page instead\n1812031 - Improve regenerate applicability tasks performance by querying NEVRA only data from repo_content_units\n1812858 - Satellite Inventory Plugin does not appear to make reports which match yupana\u0027s API specification\n1812904 - \u0027Hypervisors\u0027 task fails with \u0027undefined method `[]\u0027 for nil:NilClass\u0027 error\n1813005 - Prevent --tuning option to be applied in Capsule servers\n1813313 - [Tracker] Test HTTP UEFI on IPv6 (QA only tracker)\n1814095 - Applicable errata not showing up for module stream errata\n1815104 - Locked provisioning template should not be allowed to add audit comment\n1815135 - hammer does not support description for custom repositories\n1815146 - Backslash escapes when downloading a JSON-formatted report multiple times\n1815608 - Content Hosts has Access to Content View from Different Organization\n1816330 - CVE-2020-8840 jackson-databind: Lacks certain xbean-reflect/JNDI blocking\n1816332 - CVE-2020-9546 jackson-databind: Serialization gadgets in shaded-hikari-config\n1816337 - CVE-2020-9547 jackson-databind: Serialization gadgets in ibatis-sqlmap\n1816340 - CVE-2020-9548 jackson-databind: Serialization gadgets in anteros-core\n1816699 - Satellite Receptor Installer role can miss accounts under certain conditions\n1816720 - CVE-2020-7942 puppet: Arbitrary catalog retrieval\n1816853 - Report generated by Red Hat Inventory Uploads is empty. \n1817215 - Admin must be able to provide all the client ids involved inside Satellite settings. \n1817224 - Loading one org\u0027s content view when switching to a different org\n1817481 - Plugin does not set page \u003ctitle\u003e\n1817728 - Default task polling is too frequent at scale\n1817874 - After data upload from satellite UI it is not visible on cloud.redhat.com. \n1818062 - Deprecated message about katello agent being shown on content host registration page\n1818816 - Web console should open in a new tab/window\n1819145 - [RFE] Incorporate apipie-dsl to document template macros, provided as one-time generated HTML document\n1819208 - CVE-2020-10968 jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider\n1819212 - CVE-2020-10969 jackson-databind: Serialization gadgets in javax.swing.JEditorPane\n1820193 - Deleted Global Http Proxy is still being used during repository sync. \n1820245 - reports in JSON format can\u0027t handle unicode characters\n1821182 - [Repository] - Packages are not getting synced with rpm-with-sha-512\n1821335 - Inventory plugin captures information for systems with any entitlement\n1821457 - [RFE] Capsules shouldn\u0027t update hosts\u0027 \"Registered through\" facts on the Satellite server in a load-balanced configuration. \n1821629 - Eager zero seems to do nothing\n1821651 - Manifest import task progress remains at 0. \n1821752 - New version of the plugin is available: 1.0.5\n1822039 - Get HTTP error when deploying the virt-who configure plugin\n1822560 - Unable to sync large openshift docker repos\n1823905 - Update distributor version to sat-6.7\n1823991 - [RFE] Add a more performant way to sort reports\n1824183 - Virtual host get counted as physical hosts on cloud.redhat.com\n1824931 - After upgrading to Satellite 6.7 the Tasks page in WebUI goes \"Blank\"\n1825760 - schedule inventory plugin sync failed due to \u0027organization_id\u0027 typecasting issue. \n1825930 - [Regression] RedHat Insights client proxying stopped working due to missing proxy\n1825978 - Manifest refresh failed with \u0027Katello::Errors::CandlepinError Invalid credentials.\u0027 error\n1826298 - even when I cancel ReX job, remediation still shows it as running\n1826340 - [RFE] Ability to provision a VM using Red Hat Gold BYOS images\n1826515 - [RFE] Consume Candlepin events via STOMP\n1826625 - Improve performance of externalNodes\n1826678 - New version of the plugin is available: 2.0.6\n1826734 - Tasks uses wrong controller name for bookmarks\n1826805 - CVE-2020-11619 jackson-databind: Serialization gadgets in org.springframework:spring-aop\n1827389 - Manifest import and delete calls Actions::Pulp::Repository::Refresh for non-Library repositories\n1827583 - Installing dhcp_isc and dhcp_remote_isc fails with \"You cannot specify the same gem twice with different version requirements.....You specified: rsec (\u003c 1) and rsec (\u003e= 0)\"\n1828257 - Receptor init file missing [Install] section, receptor service won\u0027t run after restart\n1828486 - CVE-2020-7943 puppet: puppet server and puppetDB may leak sensitive information via metrics API\n1828549 - Manifest Certificate Exposed by Unprivileged User\n1828682 - Create compute resource shows console error \u0027Cannot read property \u0027aDataSort\u0027 of undefined\u0027\n1828789 - [RFE] Satellite installer should support installing the Satellite Inventory Provider by default\n1828868 - Add keep alive option in Receptor node\n1829487 - Ansible verbosity level does not work\n1829766 - undefined method `tr\u0027 for nil:NilClass when trying to get a new DHCP lease from infoblox\n1830253 - Default job templates are not locked\n1830403 - Capsule sync fails when promoting a content view to more than one lifecyle env at the same time\n1830834 - Unable to update default value of a smart class parameter (Sql query error). \n1830860 - Refactor loading regions based on subscription dynamically\n1830882 - Red Hat Satellite brand icon is missing\n1830884 - bootstrap.py script tries to yum install puppet package that is not in rhel-7-server-satellite-tools-6.7-rpms repo\n1831528 - CVE-2020-5267 rubygem-actionview: views that use the `j` or `escape_javascript` methods are susceptible to XSS attacks\n1833031 - Improve RH account ID fetching in cloud connector playbook\n1833035 - Add remediation bulk ack message (i.e. all hosts for a given run has finished)\n1833039 - Introduce error code to playbook_run_finished response type\n1833311 - \"Failed to save: Failed to save when overriding parameters for ansible, cause: Default value is invalid\" while creating scap policy with ansible deployment option. \n1834302 - --enable-foreman-plugin-rh-cloud fails: Execution of \u0027/bin/yum -d 0 -e 0 -y install tfm-rubygem-foreman_rh_cloud\u0027 returned 1: Error: Nothing to do\n1834377 - Disable mongo FTDC\n1834866 - Missing macro for \"registered_at\" host subscription facet\n1834898 - Login Page background got centralized and cropped\n1835189 - Missing macro for \"host_redhat_subscriptions\" in host subscription facet\n1835241 - Some applicability of the consumers are not recalculated after syncing a repository\n1835882 - While executing \"Configure Cloud Connector\" playbook on Satellite 6.7 server it does not honour HTTP Proxy setting\n1836155 - Support follow on rails, travis and i18n work for AzureRm plugin\n1836771 - In satellite installation summary report, satellite should be mentioned instead of foreman. \n1836774 - Some foreman services failed to start (pulp_streamer)\n1836845 - \"Generate at\" in report template should be current date\n1837951 - \"invalid Unicode Property \\p: /\\b\\perform various actions through those proxies\\b(?!-)/\" warning messages appears in dynflow-sidekiq@worker-hosts-queue\n1838160 - \u0027Registered hosts\u0027 report does not list kernel release for rhsm clients\n1838191 - Arrow position is on left rather in the middle under \"Start Time\"\n1838281 - CVE-2020-8161 rubygem-rack: directory traversal in Rack::Directory\n1838917 - Repositories are not showing their available Release versions due to a low default db pool size\n1838963 - Hypervisors from Satellite, never makes their way to HBI\n1838965 - Product name link is not working on the activation keys \"Repository Sets\" tab. \n1839025 - Configure Cloud Connector relies on information which is no longer provided by the API\n1839649 - satellite-installer --reset returns a traceback\n1839726 - Bring tfm-rubygem-foreman_leapp to downstream builds\n1839779 - undefined local variable or method `implicit_order_column\u0027 for #\u003cActiveRecord::Associations::CollectionProxy\u003e on GET request to /discovery_rules endpoint\n1839966 - New version of the plugin is available: 2.0.7\n1840166 - ERF42-4995 [Foreman::Exception]: Invalid authenticity token message displayed with traceback, If re-login the machine after session timed-out . \n1840191 - Validate parameters passed by receptor to the receptor-satellite plugin\n1840218 - ArgumentError: wrong number of arguments\n1840525 - Content host list doesn\u0027t update after the successful deletion of content host. \n1840635 - Proxy has failed to load one or more features (Realm)\n1840723 - Selected scenario is DISABLED, can not continue\n1840745 - Satellite installation failed with puppet error \" No Puppet module parser is installed\"\n1841098 - Failed to resolve package dependency while doing satellite upgrade. \n1841143 - Known hosts key removal may fail hard, preventing host from being provisioned\n1841573 - Clicking breadcrumb \"Auth Source Ldaps\" on Create LDAP Auth Source results in \"The page you were looking for doesn\u0027t exist.\"\n1841818 - icons missing on /pub download page\n1842900 - ERROR! the role \u0027satellite-receptor\u0027 was not found in ... \n1842943 - ~foreman-proxy/.ssh is a symlink to /usr/com/foreman-proxy/ssh/\n1843406 - In 6.8, Receptor installation playbook\u0027s inputs are visible again\n1843561 - Report templates duplicated\n1843846 - Host - Registered Content Hosts report: \"Safemode doesn\u0027t allow to access \u0027report_hraders\u0027 on #\u003cSafemode::ScopeObject\u003e\"\n1843867 - Satellite-installer failed with argument error while upgrading the satellite from 6.7 to 6.8\n1843926 - satellite-change-hostname fails when running nsupdate\n1844142 - [RFE] Drop a subsription-manager fact with the satellite version\n1845112 - Installer deploys outdated version of pxegrub2 mac template to TFTP\n1845486 - [RFE] Able to select \u0027HTTP Proxy\u0027 during Compute Resource create for \u0027GCE\u0027 as similar to EC2\n1845860 - hammer org add-provisioning-template command returns Error: undefined method `[]\u0027 for nil:NilClass\n1845978 - CVE-2020-7663 rubygem-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser\n1846254 - need to restart services after enabling leapp plugin\n1846313 - Add index on locks for resource type and task id\n1846317 - undefined method `klass\u0027 for nil:NilClass\n1846421 - build pxe default do not work when more than 1 provider\n1846593 - Satellite-installer failed with error \"Could not find a suitable provider for foreman_smartproxy\" while doing upgrade from 6.7 to 6.8\n1847019 - Empty applicability for non-modular repos\n1847063 - Slow manifest import and/or refresh\n1847407 - load_pools macro not in list of macros\n1847645 - Allow override of Katello\u0027s DISTRIBUTOR_VERSION\n1847784 - Error updating system data on the server, see /var/log/rhsm/rhsm.log for more details. \n1847840 - Libvirt note link leads to 404\n1847871 - Combined Profile Update: ArgumentError: invalid argument: nil. \n1848291 - Download kernel/initram for kexec asynchronously\n1848535 - Unable to create a pure IPv6 host\n1848538 - Failed to resolve the packages due to tfm-runtime package dependency in fm-upgrade(6.7 to 6.8)\n1848902 - ERF42-0258 [Foreman::Exception]: \u003cuuid\u003e is not valid, enter id or name\n1848958 - CVE-2020-14195 jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory\n1848962 - CVE-2020-14062 jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool\n1848966 - CVE-2020-14061 jackson-databind: serialization in weblogic/oracle-aqjms\n1848973 - capsule-certs-generate suggests running foreman-installer --scenario foreman-proxy-content instead of satellite-installer --scenario capsule\n1849141 - CVE-2020-8184 rubygem-rack: percent-encoded cookies can be used to overwrite existing prefixed cookie names\n1849656 - ERROR! You cannot use loops on \u0027import_tasks\u0027 statements. You should use \u0027include_tasks\u0027 instead. \n1849680 - Task progress decimal precision discrepancy between UI, CLI, and API\n1849869 - Unable to recycle the dynflow executor\n1850355 - Auth Source Role Filters are not working in Satellite 6.8\n1850536 - Can\u0027t add RHEV with APIv3 through Hammer\n1850914 - Checksum type \"sha256\" is not available for all units in the repository. Make sure those units have been downloaded\n1850934 - Satellite-installer failed with error \"Could not evaluate: Proxy xyz..com cannot be retrieved: unknown error (response 502)\"\n1851017 - Position of text cursor in ace-editor wrong and hence unable to edit templates\n1851030 - [RFE] Upgrade Ansible used from RHEL to be 2.9\n1851167 - Autoattach -\u003e \"undefined\" subscription added\n1851176 - Subscriptions do not provide any repository sets\n1851952 - \"candlepin_events FAIL Not running\" and wont restart\n1852371 - Allow http proxy ports by default\n1852723 - Broken link for documentation on installation media page\n1852733 - Inventory upload documentation redirects to default location\n1852735 - New version of the plugin is available: 2.0.8\n1853076 - large capsule syncs cause slow processing of dynflow tasks/steps\n1853200 - foreman-rake-db:migrate Fails on \"No indexes found on foreman_tasks_locks with the options provided\"\n1853280 - Content view filter is excluding modules and Packages when published after upgrading the Satellite from 6.6 to 6.7\n1853463 - Plugin does not upload inventory - Permission denied /var/lib/foreman/red_hat_inventory/uploads/uploader.sh\n1853504 - [Regression] Hammer export-legacy Fails with Composite Content Views\n1853572 - Broken documentation link for \u0027RHV\u0027 in Compute Resource\n1854138 - System purpose status should show as \u0027disabled\u0027 when Satellite is in Simple Content Access mode. \n1854397 - Compliance reports are not being uploaded to satellite. \n1854530 - PG::NotNullViolation when syncing hosts from cloud\n1855008 - Host parameters are set after the host is created. \n1855254 - Links to documentation broken in HTTP Proxies setup\n1855348 - katello_applicability accidentally set to true at install\n1855710 - \u0027Ensure RPM repository is configured and enabled\u0027 task says \u0027FIXME\u0027\n1856370 - Clicking on any other tab other than overview while on capsule synchronizing page, redirects to overview page. \n1856379 - Add missing VM creation tests\n1856401 - [RFE] Add module to create HTTP Proxy\n1856831 - New version of the plugin is available: 2.0.9\n1856837 - undefined method \u0027#httpboot\u0027 for NilClass::Jail (NilClass) when creating an IPv6 only host\n1857124 - Attempting to attach a subscription to an unregistered host results in ISE 500\n1857146 - Unable to build a host bootdisk image due to missing dosfstools package - Failed to format the ESP image via mkfs.msdos\n1857184 - selinux is preventing to build a bootdisk iso - Failed to format the ESP image via mkfs.msdos\n1857377 - Capsule Upgrade Playbook fails with \"Failed to initialize: NoMethodError - undefined method `default_capsule\u0027 for Katello:Module\"\n1857506 - Capsule Upgrade Fail: satellite-installer --scenario capsule --upgrade throws NameError\n1857572 - tailoring-file and scap-content command of hammer downloads file with wrong filename. \n1857726 - Warnings are shown during the satellite package installation on RHEL 7.9\n1858237 - Upgraded Satellite has duplicated katello_pools indexes\n1858284 - CVE-2020-14334 foreman: unauthorized cache read on RPM-based installations through local user\n1858819 - katello-certs-check output print foreman-installer--scenario katello instead satellite-installer --scenario satellite\n1858855 - Creating compute resources on IPV6 network does not fail gracefully\n1859158 - Unknown HTTPBoot EFI hosts are not directed to the grubx64.efi with a default grub conf\n1859194 - load_hosts macro duplicated in a list of macros\n1859276 - Need to update the deprecation warning message on Statistics and Trends page. \n1859705 - Tomcat is not running on fresh Capsule installation\n1859929 - User can perform other manifest actions while the first one starts\n1860351 - \u0027Host - compare content hosts packages\u0027 report fails with error \u0027undefined method \u0027#first\u0027 for NilClass\u0027\n1860407 - remote job-status table should not be re-loaded every second even if a job is running or completed\n1860422 - Host with remediations can\u0027t be removed\n1860430 - \u0027Host - compare content hosts packages\u0027 report: Safemode doesn\u0027t allow to access \u0027version\u0027... \n1860444 - After the system reboot, capsule setup(upgraded or newly installed 6.8 capsule) fails to start the tomcat service\n1860519 - Browsing capsule /pub directory with https fails with forbidden don\u0027t have permission to access /pub/ error. \n1860585 - Content Host Registration page showing version 6.7 for repos instead 6.8\n1860587 - Documentation link in Administer -\u003e About pointing to 6.6 document. \n1860835 - Installed Packages not displayed on About page\n1860957 - Unable to select an organization for sync management\n1861367 - Import Template sync never completes\n1861397 - UI dialog for Capsule Upgrade Playbook job doesn\u0027t state whitelist_options is required\n1861422 - Error encountered while handling the response, replying with an error message (\u0027plugin_config\u0027)\n1861656 - smart-proxy-openscap-send command fails to upload reports to satellite. \n1861724 - ipv6: host form in interfaces are showing Error generating IP: Bad Request\n1861766 - Add ability to list traces by host with hammer\n1861807 - Cancel/Abort button should be disabled once REX job is finish\n1861816 - Error only on production builds: The Dynflow world was not initialized yet. If your plugin uses it, make sure to call Rails.application.dynflow.require! in some initializer\n1861831 - satellite-change-hostname cannot change the satellite hostname after failing. \n1861890 - Recommended repos do not match Satellite version\n1861970 - Content -\u003e Product doesn\u0027t work when no organization is selected\n1862135 - updating hosts policy using bulk action fails with sql error\n1862445 - compliance policy creation fails for ansible deployment option on upgraded satellite. \n1862772 - Default repositories are not enabled, after registering a client with an Activation Key, to an org with Simple Content Access Mode in Red Hat Satellite 6\n1865871 - Obfuscated hosts do not have domain reported\n1865872 - Templates doc - examples on onepage.html are not processed\n1865874 - Add inventory status to host\n1865876 - Make recommendations count in hosts index a link\n1865879 - Add automatic scheduler for insights sync\n1865880 - Add an explanation how to enable insights sync\n1865928 - Templates documentation help page has hard-coded Satellite setting value\n1865943 - dynflow-sidekiq results in messages logs getting filled up more frequently\n1866029 - Templates DSL documentation: Parts of description are put in \u003cpre\u003e tag\n1866436 - host search filter does not work in job invocation page\n1866461 - Run action is missing in job templates page\n1866515 - ForemanVirtWhoConfigure::AuthSourceHiddenWithAuthentication is displayed on auth sources page\n1866700 - Hammer CLI is missing \"resolve\" (traces) option for katello-tracer\n1866710 - Wrong API endpoint path referenced for resolving host traces\n1867239 - hammer content-view version incremental-update fails with ISE\n1867287 - Error Row was updated or deleted by another transaction when deleting docker repository\n1867311 - Upgrade fails when checkpoint_segments postgres parameter configured\n1867399 - Receptor-satellite isn\u0027t able to deal with jobs where all the hosts are unknown to satellite\n1867895 - API Create vmware ComputeResource fails with \"Datacenter can\u0027t be blank\"\n1868183 - Unable to change virt-who hypervisor location. \n1868971 - Receptor installation job doesn\u0027t properly escape data it puts into receptor.conf\n1869640 - client-dispatcher: wrong number of arguments (given 0, expected 1..3) (ArgumentError)\u0027 messages come in upgrade and installation. \n1869812 - Tasks fail to complete under load\n1870657 - Make rake console run as a dynflow client to allow access to features provided by dynflow\n1871016 - managercli.py:1364 - Error: Unable to retrieve service levels: HTTP error (404 - Not Found)\n1871434 - theme css \".container\" class rule is too generic\n1871729 - ansible-runner implementation depends on third party repository for ansible-runner package. \n1871815 - Satellite Ansible Collection - Provisioning a host fails with timeout\n1871978 - Bug in provisioning_template Module\n1872014 - Enable web console on host error in \"Oops, we\u0027re sorry but something went wrong ERF42-5962 [Foreman::Exception]: No template mapped to feature Enable web console\"\n1872041 - Host search returns incorrect result\n1873408 - Updating the CDN URL is manifest works fine but creates some tasks which remains in planned state with success result\n1873926 - CVE-2020-14380 Satellite: Local user impersonation by Single sign-on (SSO) user leads to account takeover\n1874143 - Red Hat Inventory Uploads does not use proxy\n1874160 - Changing Content View of a Content Host needs to better inform the user around client needs\n1874168 - Sync Plan fails with \u0027uninitialized constant Actions::Foreman::Exception\u0027\n1874171 - [RFE] Allow Subscription-manager service plugin for zypper (SLES) to set autorefresh in repo file\n1874172 - [6.7] Unable to re-import subscriptions in large environment (60k+ content hosts)\n1874175 - After upgrading to 6.7 and promoting content, Capsule sync is extremely slow\n1874176 - Unable to search by value of certain Hostgroup parameter\n1874422 - Hits Sync uses only old proxy setting\n1874619 - Hostgroup tag is never reported in slice\n1875357 - After upgrade server response check failed for candlepin. \n1875426 - Azure VM provision fails with error `requests.exceptions.HTTPError: 502 Server Error: Proxy Error for url`\n1875660 - Reporting Template macros host_cores is not working as expected\n1875667 - Audit page list incorrect search filter\n1877307 - [Authentication] External auth login using Kerberos SSO is failing for AD and IDM on Satellite 6.8 only\n1877354 - [Sat6/Bug] RHEL8 systems generate false positive warnings about repo binding\n1877443 - Post Satellite 6.8 Upgrade AD authentication via LDAP fails when using an A record which returns 42 entries\n1877452 - content set mappings for satellite-tools-6.8-for-rhel-8 AUS repos are missing from cdn/cs_mappings-*.csv\n1877520 - content set mappings for satellite-tools-6.8-for-rhel-8 EUS repos are missing from cdn/cs_mappings-*.csv\n1877542 - content set mappings for rhel7 satellite-tools-6.8 EUS repos are missing from cdn/cs_mappings-*.csv\n1878194 - In Capsule upgrade, \"yum update\" dump some error messages. \n1878556 - PXE provisioning in satellite 6.8 requires httpboot enabled\n1878693 - Unable to perform image based deployment using hosts module from Red Hat Satellite Ansible Collections\n1878850 - creating host from hg doesn\u0027t resolves the user-data template\n1879151 - Remote execution status not updating with large number of hosts\n1879448 - Add hits details to host details page\n1879451 - Stop uploading if Satellite\u0027s setting is disconnected\n1879453 - Add plugin version to report metadata\n1879571 - unable to kexec discovered hosts - satellite tries to reach wrong IP\n1880637 - [6.8] satellite-installer always runs upgrade steps\n1881066 - Safemode doesn\u0027t allow to access \u0027host_cores\u0027 on #\u003cSafemode::ScopeObject\u003e\n1881078 - Use Passenger instead of Puma as the Foreman application server\n1881988 - [RFE] IPv6 support for Satellite 6.8\n1882276 - Satellite installation fails at execution of \u0027/usr/sbin/foreman-rake -- config -k \u0027remote_execution_cockpit_url\u0027 -v \u0027/webcon/=%{host}\u0027\u0027\n1882389 - Search query in template for LEAPP upgrade should be pre-filled when running from pre-upgrade results\n1883093 - installer-upgrade failed with error \"Could not evaluate: Proxy XYZ.com cannot be retrieved: unknown error (response 500)\"\n1883472 - [Sat6.8/Bug] when registering more than ~240 in parallel getting this error \"HTTP error (500 - Internal Server Error): Unable to register system, not all services available\"\n1887483 - Access insights pages refer to non-existing stylesheets, resulting in completely broken visuals\n1887489 - Insights rules can\u0027t be loaded on freshly installed Satellite system\n1887808 - Satellite-installer fails because of outdated RHSCL repository on DVD ISO\n\n6. Package List:\n\nRed Hat Satellite Capsule 6.8:\n\nSource:\nansible-collection-redhat-satellite-1.3.0-1.el7sat.src.rpm\nansible-runner-1.4.6-1.el7ar.src.rpm\nansiblerole-foreman_scap_client-0.0.5-1.el7sat.src.rpm\nansiblerole-insights-client-1.7.1-1.el7sat.src.rpm\nansiblerole-satellite-receptor-installer-0.6.13-1.el7sat.src.rpm\ncreaterepo_c-0.7.4-1.el7sat.src.rpm\nforeman-2.1.2.19-1.el7sat.src.rpm\nforeman-bootloaders-redhat-202005201200-1.el7sat.src.rpm\nforeman-discovery-image-3.6.7-1.el7sat.src.rpm\nforeman-discovery-image-service-1.0.0-3.el7sat.src.rpm\nforeman-installer-2.1.2.8-1.el7sat.src.rpm\nforeman-proxy-2.1.2-2.el7sat.src.rpm\nfuture-0.16.0-11.el7sat.src.rpm\ngofer-2.12.5-7.el7sat.src.rpm\nhfsplus-tools-332.14-12.el7.src.rpm\nkatello-3.16.0-1.el7sat.src.rpm\nkatello-certs-tools-2.7.1-1.el7sat.src.rpm\nkatello-client-bootstrap-1.7.5-1.el7sat.src.rpm\nkatello-selinux-3.4.0-1.el7sat.src.rpm\nkobo-0.5.1-1.el7sat.src.rpm\nlibmodulemd-1.7.0-1.pulp.el7sat.src.rpm\nlibsolv-0.7.4-4.pulp.el7sat.src.rpm\nlibwebsockets-2.4.2-2.el7.src.rpm\nlivecd-tools-20.4-1.6.el7sat.src.rpm\nmod_xsendfile-0.12-11.el7sat.src.rpm\nostree-2017.1-2.atomic.el7.src.rpm\npulp-2.21.3-1.el7sat.src.rpm\npulp-docker-3.2.7-1.el7sat.src.rpm\npulp-katello-1.0.3-1.el7sat.src.rpm\npulp-ostree-1.3.1-2.el7sat.src.rpm\npulp-puppet-2.21.3-2.el7sat.src.rpm\npulp-rpm-2.21.3-2.el7sat.src.rpm\npuppet-agent-6.14.0-2.el7sat.src.rpm\npuppet-agent-oauth-0.5.1-3.el7sat.src.rpm\npuppet-foreman_scap_client-0.4.0-1.el7sat.src.rpm\npuppetlabs-stdlib-4.25.1-2.el7sat.src.rpm\npuppetserver-6.13.0-1.el7sat.src.rpm\npycairo-1.16.3-9.el7sat.src.rpm\npygobject3-3.28.3-2.el7sat.src.rpm\npython-amqp-2.2.2-5.el7sat.src.rpm\npython-anyjson-0.3.3-11.el7sat.src.rpm\npython-apypie-0.2.2-1.el7sat.src.rpm\npython-billiard-3.5.0.3-3.el7sat.src.rpm\npython-blinker-1.3-2.el7sat.src.rpm\npython-celery-4.0.2-9.el7sat.src.rpm\npython-click-6.7-9.el7sat.src.rpm\npython-crane-3.3.1-9.el7sat.src.rpm\npython-daemon-2.1.2-7.el7at.src.rpm\npython-django-1.11.29-1.el7sat.src.rpm\npython-flask-0.12.2-4.el7sat.src.rpm\npython-gnupg-0.3.7-1.el7ui.src.rpm\npython-isodate-0.5.4-12.el7sat.src.rpm\npython-itsdangerous-0.24-15.el7sat.src.rpm\npython-jinja2-2.10-10.el7sat.src.rpm\npython-jmespath-0.9.0-6.el7_7.src.rpm\npython-kid-0.9.6-11.el7sat.src.rpm\npython-kombu-4.0.2-13.el7sat.src.rpm\npython-lockfile-0.11.0-10.el7ar.src.rpm\npython-markupsafe-0.23-21.el7sat.src.rpm\npython-mongoengine-0.10.5-2.el7sat.src.rpm\npython-nectar-1.6.2-1.el7sat.src.rpm\npython-oauth2-1.5.211-8.el7sat.src.rpm\npython-okaara-1.0.37-2.el7sat.src.rpm\npython-pexpect-4.6-1.el7at.src.rpm\npython-psutil-5.0.1-3.el7sat.src.rpm\npython-ptyprocess-0.5.2-3.el7at.src.rpm\npython-pycurl-7.43.0.2-4.el7sat.src.rpm\npython-pymongo-3.2-2.el7sat.src.rpm\npython-qpid-1.35.0-5.el7.src.rpm\npython-semantic_version-2.2.0-6.el7sat.src.rpm\npython-simplejson-3.2.0-1.el7sat.src.rpm\npython-twisted-16.4.1-12.el7sat.src.rpm\npython-vine-1.1.3-6.el7sat.src.rpm\npython-werkzeug-0.12.2-5.el7sat.src.rpm\npython-zope-interface-4.0.5-4.el7.src.rpm\nqpid-cpp-1.36.0-28.el7amq.src.rpm\nqpid-dispatch-1.5.0-4.el7.src.rpm\nqpid-proton-0.28.0-3.el7.src.rpm\nredhat-access-insights-puppet-1.0.1-1.el7sat.src.rpm\nrepoview-0.6.6-11.el7sat.src.rpm\nrubygem-fast_gettext-1.1.0-4.el7sat.src.rpm\nrubygem-highline-1.7.8-3.el7sat.src.rpm\nrubygem-newt-0.9.6-3.el7sat.src.rpm\nrubygem-oauth-0.5.4-2.el7sat.src.rpm\nsaslwrapper-0.22-5.el7sat.src.rpm\nsatellite-6.8.0-1.el7sat.src.rpm\nsatellite-installer-6.8.0.11-1.el7sat.src.rpm\ntfm-6.1-1.el7sat.src.rpm\ntfm-rubygem-algebrick-0.7.3-6.el7sat.src.rpm\ntfm-rubygem-ansi-1.5.0-2.el7sat.src.rpm\ntfm-rubygem-apipie-params-0.0.5-5.el7sat.src.rpm\ntfm-rubygem-bundler_ext-0.4.1-4.el7sat.src.rpm\ntfm-rubygem-clamp-1.1.2-5.el7sat.src.rpm\ntfm-rubygem-concurrent-ruby-1.1.6-2.el7sat.src.rpm\ntfm-rubygem-concurrent-ruby-edge-0.6.0-2.el7sat.src.rpm\ntfm-rubygem-domain_name-0.5.20160310-4.el7sat.src.rpm\ntfm-rubygem-dynflow-1.4.7-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-faraday-0.15.4-1.el7sat.src.rpm\ntfm-rubygem-faraday_middleware-0.13.1-2.el7sat.src.rpm\ntfm-rubygem-ffi-1.12.2-1.el7sat.src.rpm\ntfm-rubygem-foreman-tasks-core-0.3.4-1.el7sat.src.rpm\ntfm-rubygem-foreman_ansible_core-3.0.4-1.el7sat.src.rpm\ntfm-rubygem-foreman_remote_execution_core-1.3.0-1.el7sat.src.rpm\ntfm-rubygem-gssapi-1.2.0-6.el7sat.src.rpm\ntfm-rubygem-hashie-3.6.0-1.el7sat.src.rpm\ntfm-rubygem-highline-1.7.8-4.el7sat.src.rpm\ntfm-rubygem-http-cookie-1.0.2-5.el7sat.src.rpm\ntfm-rubygem-infoblox-3.0.0-3.el7sat.src.rpm\ntfm-rubygem-journald-logger-2.0.4-2.el7sat.src.rpm\ntfm-rubygem-journald-native-1.0.11-2.el7sat.src.rpm\ntfm-rubygem-jwt-2.2.1-1.el7sat.src.rpm\ntfm-rubygem-kafo-4.1.0-3.el7sat.src.rpm\ntfm-rubygem-kafo_parsers-1.1.0-3.el7sat.src.rpm\ntfm-rubygem-kafo_wizards-0.0.1-4.el7sat.src.rpm\ntfm-rubygem-little-plugger-1.1.4-1.el7sat.src.rpm\ntfm-rubygem-logging-2.2.2-6.el7sat.src.rpm\ntfm-rubygem-logging-journald-2.0.0-2.el7sat.src.rpm\ntfm-rubygem-mime-types-3.2.2-4.el7sat.src.rpm\ntfm-rubygem-mime-types-data-3.2018.0812-4.el7sat.src.rpm\ntfm-rubygem-multi_json-1.14.1-1.el7sat.src.rpm\ntfm-rubygem-multipart-post-2.0.0-1.el7sat.src.rpm\ntfm-rubygem-mustermann-1.0.2-4.el7sat.src.rpm\ntfm-rubygem-net-ssh-4.2.0-1.el7sat.src.rpm\ntfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.src.rpm\ntfm-rubygem-netrc-0.11.0-3.el7sat.src.rpm\ntfm-rubygem-openscap-0.4.9-3.el7sat.src.rpm\ntfm-rubygem-powerbar-2.0.1-2.el7sat.src.rpm\ntfm-rubygem-rack-2.2.3-1.el7sat.src.rpm\ntfm-rubygem-rack-protection-2.0.3-4.el7sat.src.rpm\ntfm-rubygem-rb-inotify-0.9.7-5.el7sat.src.rpm\ntfm-rubygem-rest-client-2.0.2-3.el7sat.src.rpm\ntfm-rubygem-rkerberos-0.1.5-18.el7sat.src.rpm\ntfm-rubygem-rsec-0.4.3-4.el7sat.src.rpm\ntfm-rubygem-ruby-libvirt-0.7.0-4.el7sat.src.rpm\ntfm-rubygem-rubyipmi-0.10.0-6.el7sat.src.rpm\ntfm-rubygem-sequel-5.7.1-2.el7sat.src.rpm\ntfm-rubygem-sinatra-2.0.3-4.el7sat.src.rpm\ntfm-rubygem-smart_proxy_ansible-3.0.1-5.el7sat.src.rpm\ntfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-3.el7sat.src.rpm\ntfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-2.el7sat.src.rpm\ntfm-rubygem-smart_proxy_discovery-1.0.5-5.el7sat.src.rpm\ntfm-rubygem-smart_proxy_discovery_image-1.2.1-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-smart_proxy_dns_infoblox-1.0.0-7.fm2_1.el7sat.src.rpm\ntfm-rubygem-smart_proxy_dynflow-0.2.4-5.el7sat.src.rpm\ntfm-rubygem-smart_proxy_dynflow_core-0.2.6-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-smart_proxy_openscap-0.7.3-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-smart_proxy_pulp-2.1.0-2.el7sat.src.rpm\ntfm-rubygem-smart_proxy_remote_execution_ssh-0.3.0-3.el7sat.src.rpm\ntfm-rubygem-sqlite3-1.3.13-5.el7sat.src.rpm\ntfm-rubygem-statsd-instrument-2.1.4-2.el7sat.src.rpm\ntfm-rubygem-tilt-2.0.8-4.el7sat.src.rpm\ntfm-rubygem-unf-0.1.3-7.el7sat.src.rpm\ntfm-rubygem-unf_ext-0.0.7.2-1.el7sat.src.rpm\ntfm-rubygem-xmlrpc-0.3.0-2.el7sat.src.rpm\n\nnoarch:\nansible-collection-redhat-satellite-1.3.0-1.el7sat.noarch.rpm\nansible-runner-1.4.6-1.el7ar.noarch.rpm\nansiblerole-foreman_scap_client-0.0.5-1.el7sat.noarch.rpm\nansiblerole-insights-client-1.7.1-1.el7sat.noarch.rpm\nansiblerole-satellite-receptor-installer-0.6.13-1.el7sat.noarch.rpm\ncrane-selinux-3.4.0-1.el7sat.noarch.rpm\nforeman-bootloaders-redhat-202005201200-1.el7sat.noarch.rpm\nforeman-bootloaders-redhat-tftpboot-202005201200-1.el7sat.noarch.rpm\nforeman-debug-2.1.2.19-1.el7sat.noarch.rpm\nforeman-discovery-image-3.6.7-1.el7sat.noarch.rpm\nforeman-installer-2.1.2.8-1.el7sat.noarch.rpm\nforeman-installer-katello-2.1.2.8-1.el7sat.noarch.rpm\nforeman-proxy-2.1.2-2.el7sat.noarch.rpm\nforeman-proxy-content-3.16.0-1.el7sat.noarch.rpm\nforeman-proxy-journald-2.1.2-2.el7sat.noarch.rpm\nkatello-certs-tools-2.7.1-1.el7sat.noarch.rpm\nkatello-client-bootstrap-1.7.5-1.el7sat.noarch.rpm\nkatello-common-3.16.0-1.el7sat.noarch.rpm\nkatello-debug-3.16.0-1.el7sat.noarch.rpm\nkobo-0.5.1-1.el7sat.noarch.rpm\npulp-admin-client-2.21.3-1.el7sat.noarch.rpm\npulp-docker-admin-extensions-3.2.7-1.el7sat.noarch.rpm\npulp-docker-plugins-3.2.7-1.el7sat.noarch.rpm\npulp-katello-1.0.3-1.el7sat.noarch.rpm\npulp-maintenance-2.21.3-1.el7sat.noarch.rpm\npulp-nodes-child-2.21.3-1.el7sat.noarch.rpm\npulp-nodes-common-2.21.3-1.el7sat.noarch.rpm\npulp-nodes-parent-2.21.3-1.el7sat.noarch.rpm\npulp-ostree-admin-extensions-1.3.1-2.el7sat.noarch.rpm\npulp-ostree-plugins-1.3.1-2.el7sat.noarch.rpm\npulp-puppet-admin-extensions-2.21.3-2.el7sat.noarch.rpm\npulp-puppet-plugins-2.21.3-2.el7sat.noarch.rpm\npulp-rpm-admin-extensions-2.21.3-2.el7sat.noarch.rpm\npulp-rpm-plugins-2.21.3-2.el7sat.noarch.rpm\npulp-selinux-2.21.3-1.el7sat.noarch.rpm\npulp-server-2.21.3-1.el7sat.noarch.rpm\npuppet-agent-oauth-0.5.1-3.el7sat.noarch.rpm\npuppet-foreman_scap_client-0.4.0-1.el7sat.noarch.rpm\npuppetlabs-stdlib-4.25.1-2.el7sat.noarch.rpm\npuppetserver-6.13.0-1.el7sat.noarch.rpm\npython-blinker-1.3-2.el7sat.noarch.rpm\npython-gnupg-0.3.7-1.el7ui.noarch.rpm\npython-gofer-2.12.5-7.el7sat.noarch.rpm\npython-gofer-qpid-2.12.5-7.el7sat.noarch.rpm\npython-kid-0.9.6-11.el7sat.noarch.rpm\npython-mongoengine-0.10.5-2.el7sat.noarch.rpm\npython-nectar-1.6.2-1.el7sat.noarch.rpm\npython-oauth2-1.5.211-8.el7sat.noarch.rpm\npython-pulp-agent-lib-2.21.3-1.el7sat.noarch.rpm\npython-pulp-bindings-2.21.3-1.el7sat.noarch.rpm\npython-pulp-client-lib-2.21.3-1.el7sat.noarch.rpm\npython-pulp-common-2.21.3-1.el7sat.noarch.rpm\npython-pulp-docker-common-3.2.7-1.el7sat.noarch.rpm\npython-pulp-integrity-2.21.3-2.el7sat.noarch.rpm\npython-pulp-oid_validation-2.21.3-1.el7sat.noarch.rpm\npython-pulp-ostree-common-1.3.1-2.el7sat.noarch.rpm\npython-pulp-puppet-common-2.21.3-2.el7sat.noarch.rpm\npython-pulp-repoauth-2.21.3-1.el7sat.noarch.rpm\npython-pulp-rpm-common-2.21.3-2.el7sat.noarch.rpm\npython-pulp-streamer-2.21.3-1.el7sat.noarch.rpm\npython-qpid-1.35.0-5.el7.noarch.rpm\npython-semantic_version-2.2.0-6.el7sat.noarch.rpm\npython2-amqp-2.2.2-5.el7sat.noarch.rpm\npython2-ansible-runner-1.4.6-1.el7ar.noarch.rpm\npython2-anyjson-0.3.3-11.el7sat.noarch.rpm\npython2-apypie-0.2.2-1.el7sat.noarch.rpm\npython2-celery-4.0.2-9.el7sat.noarch.rpm\npython2-click-6.7-9.el7sat.noarch.rpm\npython2-crane-3.3.1-9.el7sat.noarch.rpm\npython2-daemon-2.1.2-7.el7at.noarch.rpm\npython2-django-1.11.29-1.el7sat.noarch.rpm\npython2-flask-0.12.2-4.el7sat.noarch.rpm\npython2-future-0.16.0-11.el7sat.noarch.rpm\npython2-isodate-0.5.4-12.el7sat.noarch.rpm\npython2-itsdangerous-0.24-15.el7sat.noarch.rpm\npython2-jinja2-2.10-10.el7sat.noarch.rpm\npython2-jmespath-0.9.0-6.el7_7.noarch.rpm\npython2-kombu-4.0.2-13.el7sat.noarch.rpm\npython2-lockfile-0.11.0-10.el7ar.noarch.rpm\npython2-okaara-1.0.37-2.el7sat.noarch.rpm\npython2-pexpect-4.6-1.el7at.noarch.rpm\npython2-ptyprocess-0.5.2-3.el7at.noarch.rpm\npython2-vine-1.1.3-6.el7sat.noarch.rpm\npython2-werkzeug-0.12.2-5.el7sat.noarch.rpm\nqpid-dispatch-tools-1.5.0-4.el7.noarch.rpm\nqpid-tools-1.36.0-28.el7amq.noarch.rpm\nredhat-access-insights-puppet-1.0.1-1.el7sat.noarch.rpm\nrepoview-0.6.6-11.el7sat.noarch.rpm\nrubygem-fast_gettext-1.1.0-4.el7sat.noarch.rpm\nrubygem-highline-1.7.8-3.el7sat.noarch.rpm\nrubygem-oauth-0.5.4-2.el7sat.noarch.rpm\nsatellite-capsule-6.8.0-1.el7sat.noarch.rpm\nsatellite-common-6.8.0-1.el7sat.noarch.rpm\nsatellite-debug-tools-6.8.0-1.el7sat.noarch.rpm\nsatellite-installer-6.8.0.11-1.el7sat.noarch.rpm\ntfm-rubygem-algebrick-0.7.3-6.el7sat.noarch.rpm\ntfm-rubygem-ansi-1.5.0-2.el7sat.noarch.rpm\ntfm-rubygem-apipie-params-0.0.5-5.el7sat.noarch.rpm\ntfm-rubygem-bundler_ext-0.4.1-4.el7sat.noarch.rpm\ntfm-rubygem-clamp-1.1.2-5.el7sat.noarch.rpm\ntfm-rubygem-concurrent-ruby-1.1.6-2.el7sat.noarch.rpm\ntfm-rubygem-concurrent-ruby-edge-0.6.0-2.el7sat.noarch.rpm\ntfm-rubygem-domain_name-0.5.20160310-4.el7sat.noarch.rpm\ntfm-rubygem-dynflow-1.4.7-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-faraday-0.15.4-1.el7sat.noarch.rpm\ntfm-rubygem-faraday_middleware-0.13.1-2.el7sat.noarch.rpm\ntfm-rubygem-foreman-tasks-core-0.3.4-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_ansible_core-3.0.4-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_remote_execution_core-1.3.0-1.el7sat.noarch.rpm\ntfm-rubygem-gssapi-1.2.0-6.el7sat.noarch.rpm\ntfm-rubygem-hashie-3.6.0-1.el7sat.noarch.rpm\ntfm-rubygem-highline-1.7.8-4.el7sat.noarch.rpm\ntfm-rubygem-http-cookie-1.0.2-5.el7sat.noarch.rpm\ntfm-rubygem-infoblox-3.0.0-3.el7sat.noarch.rpm\ntfm-rubygem-journald-logger-2.0.4-2.el7sat.noarch.rpm\ntfm-rubygem-jwt-2.2.1-1.el7sat.noarch.rpm\ntfm-rubygem-kafo-4.1.0-3.el7sat.noarch.rpm\ntfm-rubygem-kafo_parsers-1.1.0-3.el7sat.noarch.rpm\ntfm-rubygem-kafo_wizards-0.0.1-4.el7sat.noarch.rpm\ntfm-rubygem-little-plugger-1.1.4-1.el7sat.noarch.rpm\ntfm-rubygem-logging-2.2.2-6.el7sat.noarch.rpm\ntfm-rubygem-logging-journald-2.0.0-2.el7sat.noarch.rpm\ntfm-rubygem-mime-types-3.2.2-4.el7sat.noarch.rpm\ntfm-rubygem-mime-types-data-3.2018.0812-4.el7sat.noarch.rpm\ntfm-rubygem-multi_json-1.14.1-1.el7sat.noarch.rpm\ntfm-rubygem-multipart-post-2.0.0-1.el7sat.noarch.rpm\ntfm-rubygem-mustermann-1.0.2-4.el7sat.noarch.rpm\ntfm-rubygem-net-ssh-4.2.0-1.el7sat.noarch.rpm\ntfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.noarch.rpm\ntfm-rubygem-netrc-0.11.0-3.el7sat.noarch.rpm\ntfm-rubygem-openscap-0.4.9-3.el7sat.noarch.rpm\ntfm-rubygem-powerbar-2.0.1-2.el7sat.noarch.rpm\ntfm-rubygem-rack-2.2.3-1.el7sat.noarch.rpm\ntfm-rubygem-rack-protection-2.0.3-4.el7sat.noarch.rpm\ntfm-rubygem-rb-inotify-0.9.7-5.el7sat.noarch.rpm\ntfm-rubygem-rest-client-2.0.2-3.el7sat.noarch.rpm\ntfm-rubygem-rsec-0.4.3-4.el7sat.noarch.rpm\ntfm-rubygem-rubyipmi-0.10.0-6.el7sat.noarch.rpm\ntfm-rubygem-sequel-5.7.1-2.el7sat.noarch.rpm\ntfm-rubygem-sinatra-2.0.3-4.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_ansible-3.0.1-5.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-3.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-2.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_discovery-1.0.5-5.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_discovery_image-1.2.1-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_dns_infoblox-1.0.0-7.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_dynflow-0.2.4-5.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_dynflow_core-0.2.6-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_openscap-0.7.3-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_pulp-2.1.0-2.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_remote_execution_ssh-0.3.0-3.el7sat.noarch.rpm\ntfm-rubygem-statsd-instrument-2.1.4-2.el7sat.noarch.rpm\ntfm-rubygem-tilt-2.0.8-4.el7sat.noarch.rpm\ntfm-rubygem-unf-0.1.3-7.el7sat.noarch.rpm\ntfm-rubygem-xmlrpc-0.3.0-2.el7sat.noarch.rpm\n\nx86_64:\ncreaterepo_c-0.7.4-1.el7sat.x86_64.rpm\ncreaterepo_c-debuginfo-0.7.4-1.el7sat.x86_64.rpm\ncreaterepo_c-libs-0.7.4-1.el7sat.x86_64.rpm\nforeman-discovery-image-service-1.0.0-3.el7sat.x86_64.rpm\nforeman-discovery-image-service-tui-1.0.0-3.el7sat.x86_64.rpm\nhfsplus-tools-332.14-12.el7.x86_64.rpm\nhfsplus-tools-debuginfo-332.14-12.el7.x86_64.rpm\nlibmodulemd-1.7.0-1.pulp.el7sat.x86_64.rpm\nlibmodulemd-debuginfo-1.7.0-1.pulp.el7sat.x86_64.rpm\nlibsolv-0.7.4-4.pulp.el7sat.x86_64.rpm\nlibsolv-debuginfo-0.7.4-4.pulp.el7sat.x86_64.rpm\nlibwebsockets-2.4.2-2.el7.x86_64.rpm\nlibwebsockets-debuginfo-2.4.2-2.el7.x86_64.rpm\nlivecd-tools-20.4-1.6.el7sat.x86_64.rpm\nmod_xsendfile-0.12-11.el7sat.x86_64.rpm\nmod_xsendfile-debuginfo-0.12-11.el7sat.x86_64.rpm\nostree-2017.1-2.atomic.el7.x86_64.rpm\nostree-debuginfo-2017.1-2.atomic.el7.x86_64.rpm\npuppet-agent-6.14.0-2.el7sat.x86_64.rpm\npycairo-1.16.3-9.el7sat.x86_64.rpm\npycairo-debuginfo-1.16.3-9.el7sat.x86_64.rpm\npygobject3-debuginfo-3.28.3-2.el7sat.x86_64.rpm\npython-billiard-debuginfo-3.5.0.3-3.el7sat.x86_64.rpm\npython-bson-3.2-2.el7sat.x86_64.rpm\npython-imgcreate-20.4-1.6.el7sat.x86_64.rpm\npython-markupsafe-debuginfo-0.23-21.el7sat.x86_64.rpm\npython-psutil-5.0.1-3.el7sat.x86_64.rpm\npython-psutil-debuginfo-5.0.1-3.el7sat.x86_64.rpm\npython-pycurl-debuginfo-7.43.0.2-4.el7sat.x86_64.rpm\npython-pymongo-3.2-2.el7sat.x86_64.rpm\npython-pymongo-debuginfo-3.2-2.el7sat.x86_64.rpm\npython-pymongo-gridfs-3.2-2.el7sat.x86_64.rpm\npython-qpid-proton-0.28.0-3.el7.x86_64.rpm\npython-qpid-qmf-1.36.0-28.el7amq.x86_64.rpm\npython-saslwrapper-0.22-5.el7sat.x86_64.rpm\npython-simplejson-3.2.0-1.el7sat.x86_64.rpm\npython-simplejson-debuginfo-3.2.0-1.el7sat.x86_64.rpm\npython-twisted-debuginfo-16.4.1-12.el7sat.x86_64.rpm\npython-zope-interface-4.0.5-4.el7.x86_64.rpm\npython-zope-interface-debuginfo-4.0.5-4.el7.x86_64.rpm\npython2-billiard-3.5.0.3-3.el7sat.x86_64.rpm\npython2-gobject-3.28.3-2.el7sat.x86_64.rpm\npython2-gobject-base-3.28.3-2.el7sat.x86_64.rpm\npython2-markupsafe-0.23-21.el7sat.x86_64.rpm\npython2-pycurl-7.43.0.2-4.el7sat.x86_64.rpm\npython2-solv-0.7.4-4.pulp.el7sat.x86_64.rpm\npython2-twisted-16.4.1-12.el7sat.x86_64.rpm\nqpid-cpp-client-1.36.0-28.el7amq.x86_64.rpm\nqpid-cpp-debuginfo-1.36.0-28.el7amq.x86_64.rpm\nqpid-cpp-server-1.36.0-28.el7amq.x86_64.rpm\nqpid-cpp-server-linearstore-1.36.0-28.el7amq.x86_64.rpm\nqpid-dispatch-debuginfo-1.5.0-4.el7.x86_64.rpm\nqpid-dispatch-router-1.5.0-4.el7.x86_64.rpm\nqpid-proton-c-0.28.0-3.el7.x86_64.rpm\nqpid-proton-debuginfo-0.28.0-3.el7.x86_64.rpm\nqpid-qmf-1.36.0-28.el7amq.x86_64.rpm\nrubygem-newt-0.9.6-3.el7sat.x86_64.rpm\nrubygem-newt-debuginfo-0.9.6-3.el7sat.x86_64.rpm\nsaslwrapper-0.22-5.el7sat.x86_64.rpm\nsaslwrapper-debuginfo-0.22-5.el7sat.x86_64.rpm\ntfm-rubygem-ffi-1.12.2-1.el7sat.x86_64.rpm\ntfm-rubygem-ffi-debuginfo-1.12.2-1.el7sat.x86_64.rpm\ntfm-rubygem-journald-native-1.0.11-2.el7sat.x86_64.rpm\ntfm-rubygem-journald-native-debuginfo-1.0.11-2.el7sat.x86_64.rpm\ntfm-rubygem-rkerberos-0.1.5-18.el7sat.x86_64.rpm\ntfm-rubygem-rkerberos-debuginfo-0.1.5-18.el7sat.x86_64.rpm\ntfm-rubygem-ruby-libvirt-0.7.0-4.el7sat.x86_64.rpm\ntfm-rubygem-ruby-libvirt-debuginfo-0.7.0-4.el7sat.x86_64.rpm\ntfm-rubygem-sqlite3-1.3.13-5.el7sat.x86_64.rpm\ntfm-rubygem-sqlite3-debuginfo-1.3.13-5.el7sat.x86_64.rpm\ntfm-rubygem-unf_ext-0.0.7.2-1.el7sat.x86_64.rpm\ntfm-rubygem-unf_ext-debuginfo-0.0.7.2-1.el7sat.x86_64.rpm\ntfm-runtime-6.1-1.el7sat.x86_64.rpm\n\nRed Hat Satellite 6.7:\n\nSource:\nansible-collection-redhat-satellite-1.3.0-1.el7sat.src.rpm\nansible-runner-1.4.6-1.el7ar.src.rpm\nansiblerole-foreman_scap_client-0.0.5-1.el7sat.src.rpm\nansiblerole-insights-client-1.7.1-1.el7sat.src.rpm\nansiblerole-satellite-receptor-installer-0.6.13-1.el7sat.src.rpm\ncandlepin-3.1.21-1.el7sat.src.rpm\ncreaterepo_c-0.7.4-1.el7sat.src.rpm\nforeman-2.1.2.19-1.el7sat.src.rpm\nforeman-bootloaders-redhat-202005201200-1.el7sat.src.rpm\nforeman-discovery-image-3.6.7-1.el7sat.src.rpm\nforeman-discovery-image-service-1.0.0-3.el7sat.src.rpm\nforeman-installer-2.1.2.8-1.el7sat.src.rpm\nforeman-proxy-2.1.2-2.el7sat.src.rpm\nforeman-selinux-2.1.2.3-1.el7sat.src.rpm\nfuture-0.16.0-11.el7sat.src.rpm\ngofer-2.12.5-7.el7sat.src.rpm\nhfsplus-tools-332.14-12.el7.src.rpm\nkatello-3.16.0-1.el7sat.src.rpm\nkatello-certs-tools-2.7.1-1.el7sat.src.rpm\nkatello-client-bootstrap-1.7.5-1.el7sat.src.rpm\nkatello-selinux-3.4.0-1.el7sat.src.rpm\nkeycloak-httpd-client-install-1.2.2-1.el7sat.src.rpm\nkobo-0.5.1-1.el7sat.src.rpm\nlibmodulemd-1.7.0-1.pulp.el7sat.src.rpm\nlibsolv-0.7.4-4.pulp.el7sat.src.rpm\nlibwebsockets-2.4.2-2.el7.src.rpm\nlivecd-tools-20.4-1.6.el7sat.src.rpm\nmod_xsendfile-0.12-11.el7sat.src.rpm\nostree-2017.1-2.atomic.el7.src.rpm\npcp-mmvstatsd-0.4-2.el7sat.src.rpm\npulp-2.21.3-1.el7sat.src.rpm\npulp-docker-3.2.7-1.el7sat.src.rpm\npulp-katello-1.0.3-1.el7sat.src.rpm\npulp-ostree-1.3.1-2.el7sat.src.rpm\npulp-puppet-2.21.3-2.el7sat.src.rpm\npulp-rpm-2.21.3-2.el7sat.src.rpm\npuppet-agent-6.14.0-2.el7sat.src.rpm\npuppet-agent-oauth-0.5.1-3.el7sat.src.rpm\npuppet-foreman_scap_client-0.4.0-1.el7sat.src.rpm\npuppetlabs-stdlib-4.25.1-2.el7sat.src.rpm\npuppetserver-6.13.0-1.el7sat.src.rpm\npycairo-1.16.3-9.el7sat.src.rpm\npygobject3-3.28.3-2.el7sat.src.rpm\npython-aiohttp-3.6.2-4.el7ar.src.rpm\npython-amqp-2.2.2-5.el7sat.src.rpm\npython-anyjson-0.3.3-11.el7sat.src.rpm\npython-apypie-0.2.2-1.el7sat.src.rpm\npython-async-timeout-3.0.1-2.el7ar.src.rpm\npython-attrs-19.3.0-3.el7ar.src.rpm\npython-billiard-3.5.0.3-3.el7sat.src.rpm\npython-blinker-1.3-2.el7sat.src.rpm\npython-celery-4.0.2-9.el7sat.src.rpm\npython-chardet-3.0.4-10.el7ar.src.rpm\npython-click-6.7-9.el7sat.src.rpm\npython-crane-3.3.1-9.el7sat.src.rpm\npython-daemon-2.1.2-7.el7at.src.rpm\npython-dateutil-2.8.1-2.el7ar.src.rpm\npython-django-1.11.29-1.el7sat.src.rpm\npython-flask-0.12.2-4.el7sat.src.rpm\npython-gnupg-0.3.7-1.el7ui.src.rpm\npython-idna-2.4-2.el7ar.src.rpm\npython-idna-ssl-1.1.0-2.el7ar.src.rpm\npython-isodate-0.5.4-12.el7sat.src.rpm\npython-itsdangerous-0.24-15.el7sat.src.rpm\npython-jinja2-2.10-10.el7sat.src.rpm\npython-jmespath-0.9.0-6.el7_7.src.rpm\npython-kid-0.9.6-11.el7sat.src.rpm\npython-kombu-4.0.2-13.el7sat.src.rpm\npython-lockfile-0.11.0-10.el7ar.src.rpm\npython-markupsafe-0.23-21.el7sat.src.rpm\npython-mongoengine-0.10.5-2.el7sat.src.rpm\npython-multidict-4.7.4-2.el7ar.src.rpm\npython-nectar-1.6.2-1.el7sat.src.rpm\npython-oauth2-1.5.211-8.el7sat.src.rpm\npython-okaara-1.0.37-2.el7sat.src.rpm\npython-pexpect-4.6-1.el7at.src.rpm\npython-prometheus-client-0.7.1-2.el7ar.src.rpm\npython-psutil-5.0.1-3.el7sat.src.rpm\npython-ptyprocess-0.5.2-3.el7at.src.rpm\npython-pycurl-7.43.0.2-4.el7sat.src.rpm\npython-pymongo-3.2-2.el7sat.src.rpm\npython-qpid-1.35.0-5.el7.src.rpm\npython-receptor-satellite-1.2.0-1.el7sat.src.rpm\npython-semantic_version-2.2.0-6.el7sat.src.rpm\npython-simplejson-3.2.0-1.el7sat.src.rpm\npython-six-1.11.0-8.el7ar.src.rpm\npython-twisted-16.4.1-12.el7sat.src.rpm\npython-typing-extensions-3.7.4.1-2.el7ar.src.rpm\npython-vine-1.1.3-6.el7sat.src.rpm\npython-werkzeug-0.12.2-5.el7sat.src.rpm\npython-yarl-1.4.2-2.el7ar.src.rpm\npython-zope-interface-4.0.5-4.el7.src.rpm\nqpid-cpp-1.36.0-28.el7amq.src.rpm\nqpid-dispatch-1.5.0-4.el7.src.rpm\nqpid-proton-0.28.0-3.el7.src.rpm\nreceptor-0.6.3-1.el7ar.src.rpm\nredhat-access-insights-puppet-1.0.1-1.el7sat.src.rpm\nrepoview-0.6.6-11.el7sat.src.rpm\nrh-postgresql12-postgresql-evr-0.0.2-1.el7sat.src.rpm\nrhel8-kickstart-setup-0.0.2-1.el7sat.src.rpm\nrubygem-facter-2.4.1-2.el7sat.src.rpm\nrubygem-fast_gettext-1.1.0-4.el7sat.src.rpm\nrubygem-foreman_scap_client-0.4.6-1.el7sat.src.rpm\nrubygem-highline-1.7.8-3.el7sat.src.rpm\nrubygem-newt-0.9.6-3.el7sat.src.rpm\nrubygem-oauth-0.5.4-2.el7sat.src.rpm\nrubygem-passenger-4.0.18-24.el7sat.src.rpm\nrubygem-rack-1.6.12-1.el7sat.src.rpm\nrubygem-rake-0.9.2.2-41.el7sat.src.rpm\nsaslwrapper-0.22-5.el7sat.src.rpm\nsatellite-6.8.0-1.el7sat.src.rpm\nsatellite-installer-6.8.0.11-1.el7sat.src.rpm\ntfm-6.1-1.el7sat.src.rpm\ntfm-rubygem-actioncable-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-actionmailbox-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-actionmailer-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-actionpack-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-actiontext-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-actionview-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-activejob-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-activemodel-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-activerecord-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-activerecord-import-1.0.0-6.el7sat.src.rpm\ntfm-rubygem-activerecord-session_store-1.1.1-4.el7sat.src.rpm\ntfm-rubygem-activestorage-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-activesupport-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-addressable-2.6.0-1.el7sat.src.rpm\ntfm-rubygem-algebrick-0.7.3-6.el7sat.src.rpm\ntfm-rubygem-amazing_print-1.1.0-1.el7sat.src.rpm\ntfm-rubygem-ancestry-3.0.7-1.el7sat.src.rpm\ntfm-rubygem-anemone-0.7.2-22.el7sat.src.rpm\ntfm-rubygem-angular-rails-templates-1.1.0-1.el7sat.src.rpm\ntfm-rubygem-ansi-1.5.0-2.el7sat.src.rpm\ntfm-rubygem-apipie-bindings-0.3.0-1.el7sat.src.rpm\ntfm-rubygem-apipie-dsl-2.2.2-2.el7sat.src.rpm\ntfm-rubygem-apipie-params-0.0.5-5.el7sat.src.rpm\ntfm-rubygem-apipie-rails-0.5.17-3.el7sat.src.rpm\ntfm-rubygem-audited-4.9.0-3.el7sat.src.rpm\ntfm-rubygem-azure_mgmt_compute-0.18.7-1.el7sat.src.rpm\ntfm-rubygem-azure_mgmt_network-0.19.0-1.el7sat.src.rpm\ntfm-rubygem-azure_mgmt_resources-0.17.6-1.el7sat.src.rpm\ntfm-rubygem-azure_mgmt_storage-0.17.10-1.el7sat.src.rpm\ntfm-rubygem-azure_mgmt_subscriptions-0.18.2-1.el7sat.src.rpm\ntfm-rubygem-bcrypt-3.1.12-1.el7sat.src.rpm\ntfm-rubygem-builder-3.2.4-1.el7sat.src.rpm\ntfm-rubygem-bundler_ext-0.4.1-4.el7sat.src.rpm\ntfm-rubygem-clamp-1.1.2-5.el7sat.src.rpm\ntfm-rubygem-coffee-rails-5.0.0-1.el7sat.src.rpm\ntfm-rubygem-coffee-script-2.4.1-4.el7sat.src.rpm\ntfm-rubygem-coffee-script-source-1.12.2-4.el7sat.src.rpm\ntfm-rubygem-concurrent-ruby-1.1.6-2.el7sat.src.rpm\ntfm-rubygem-concurrent-ruby-edge-0.6.0-2.el7sat.src.rpm\ntfm-rubygem-connection_pool-2.2.2-2.el7sat.src.rpm\ntfm-rubygem-crass-1.0.6-1.el7sat.src.rpm\ntfm-rubygem-css_parser-1.4.7-3.el7sat.src.rpm\ntfm-rubygem-daemons-1.2.3-7.el7sat.src.rpm\ntfm-rubygem-deacon-1.0.0-4.el7sat.src.rpm\ntfm-rubygem-declarative-0.0.10-1.el7sat.src.rpm\ntfm-rubygem-declarative-option-0.1.0-1.el7sat.src.rpm\ntfm-rubygem-deep_cloneable-3.0.0-3.el7sat.src.rpm\ntfm-rubygem-deface-1.5.3-2.el7sat.src.rpm\ntfm-rubygem-diffy-3.0.1-6.el7sat.src.rpm\ntfm-rubygem-domain_name-0.5.20160310-4.el7sat.src.rpm\ntfm-rubygem-dynflow-1.4.7-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-erubi-1.9.0-1.el7sat.src.rpm\ntfm-rubygem-excon-0.58.0-3.el7sat.src.rpm\ntfm-rubygem-execjs-2.7.0-4.el7sat.src.rpm\ntfm-rubygem-facter-2.4.0-6.el7sat.src.rpm\ntfm-rubygem-faraday-0.15.4-1.el7sat.src.rpm\ntfm-rubygem-faraday-cookie_jar-0.0.6-1.el7sat.src.rpm\ntfm-rubygem-faraday_middleware-0.13.1-2.el7sat.src.rpm\ntfm-rubygem-fast_gettext-1.4.1-3.el7sat.src.rpm\ntfm-rubygem-ffi-1.12.2-1.el7sat.src.rpm\ntfm-rubygem-fog-aws-3.6.5-1.el7sat.src.rpm\ntfm-rubygem-fog-core-2.1.0-3.el7sat.src.rpm\ntfm-rubygem-fog-google-1.8.2-1.el7sat.src.rpm\ntfm-rubygem-fog-json-1.2.0-3.el7sat.src.rpm\ntfm-rubygem-fog-kubevirt-1.3.3-1.el7sat.src.rpm\ntfm-rubygem-fog-libvirt-0.7.0-1.el7sat.src.rpm\ntfm-rubygem-fog-openstack-1.0.8-2.el7sat.src.rpm\ntfm-rubygem-fog-ovirt-1.2.5-1.el7sat.src.rpm\ntfm-rubygem-fog-vsphere-3.3.1-1.el7sat.src.rpm\ntfm-rubygem-fog-xml-0.1.2-8.el7sat.src.rpm\ntfm-rubygem-foreman-tasks-2.0.2-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-foreman-tasks-core-0.3.4-1.el7sat.src.rpm\ntfm-rubygem-foreman_ansible-5.1.3-1.el7sat.src.rpm\ntfm-rubygem-foreman_ansible_core-3.0.4-1.el7sat.src.rpm\ntfm-rubygem-foreman_azure_rm-2.1.2-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-foreman_bootdisk-17.0.2-2.fm2_1.el7sat.src.rpm\ntfm-rubygem-foreman_discovery-16.1.2-1.el7sat.src.rpm\ntfm-rubygem-foreman_hooks-0.3.16-2.el7sat.src.rpm\ntfm-rubygem-foreman_kubevirt-0.1.7-1.el7sat.src.rpm\ntfm-rubygem-foreman_leapp-0.1.6-1.el7sat.src.rpm\ntfm-rubygem-foreman_openscap-4.0.3-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-foreman_remote_execution-3.3.7-1.el7sat.src.rpm\ntfm-rubygem-foreman_remote_execution_core-1.3.0-1.el7sat.src.rpm\ntfm-rubygem-foreman_rh_cloud-2.0.12-1.el7sat.src.rpm\ntfm-rubygem-foreman_templates-9.0.1-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-foreman_theme_satellite-6.0.1.7-1.el7sat.src.rpm\ntfm-rubygem-foreman_virt_who_configure-0.5.2-1.el7sat.src.rpm\ntfm-rubygem-formatador-0.2.1-11.el7sat.src.rpm\ntfm-rubygem-friendly_id-5.3.0-1.el7sat.src.rpm\ntfm-rubygem-fx-0.5.0-1.el7sat.src.rpm\ntfm-rubygem-get_process_mem-0.2.1-3.el7sat.src.rpm\ntfm-rubygem-gettext-3.1.4-10.el7sat.src.rpm\ntfm-rubygem-gettext_i18n_rails-1.8.0-1.el7sat.src.rpm\ntfm-rubygem-git-1.5.0-1.el7sat.src.rpm\ntfm-rubygem-gitlab-sidekiq-fetcher-0.5.2-2.el7sat.src.rpm\ntfm-rubygem-globalid-0.4.2-1.el7sat.src.rpm\ntfm-rubygem-google-api-client-0.23.9-3.el7sat.src.rpm\ntfm-rubygem-googleauth-0.6.7-3.el7sat.src.rpm\ntfm-rubygem-graphql-1.8.14-1.el7sat.src.rpm\ntfm-rubygem-graphql-batch-0.3.10-1.el7sat.src.rpm\ntfm-rubygem-gssapi-1.2.0-6.el7sat.src.rpm\ntfm-rubygem-hammer_cli-2.1.2-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman-2.1.2.1-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_admin-0.0.9-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_ansible-0.3.2-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_azure_rm-0.2.0-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_bootdisk-0.3.0-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_discovery-1.0.2-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_docker-0.0.6.4-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_kubevirt-0.1.4-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_leapp-0.1.0-2.fm2_1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_openscap-0.1.11-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_remote_execution-0.1.2-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_tasks-0.0.14-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_templates-0.2.0-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_foreman_virt_who_configure-0.0.6-1.el7sat.src.rpm\ntfm-rubygem-hammer_cli_katello-0.22.2.2-1.el7sat.src.rpm\ntfm-rubygem-hashie-3.6.0-1.el7sat.src.rpm\ntfm-rubygem-highline-1.7.8-4.el7sat.src.rpm\ntfm-rubygem-http-3.3.0-1.el7sat.src.rpm\ntfm-rubygem-http-cookie-1.0.2-5.el7sat.src.rpm\ntfm-rubygem-http-form_data-2.1.1-1.el7sat.src.rpm\ntfm-rubygem-http_parser.rb-0.6.0-1.el7sat.src.rpm\ntfm-rubygem-httpclient-2.8.3-1.el7sat.src.rpm\ntfm-rubygem-i18n-1.8.2-1.el7sat.src.rpm\ntfm-rubygem-infoblox-3.0.0-3.el7sat.src.rpm\ntfm-rubygem-ipaddress-0.8.0-11.el7sat.src.rpm\ntfm-rubygem-jgrep-1.3.3-12.el7sat.src.rpm\ntfm-rubygem-journald-logger-2.0.4-2.el7sat.src.rpm\ntfm-rubygem-journald-native-1.0.11-2.el7sat.src.rpm\ntfm-rubygem-jwt-2.2.1-1.el7sat.src.rpm\ntfm-rubygem-kafo-4.1.0-3.el7sat.src.rpm\ntfm-rubygem-kafo_parsers-1.1.0-3.el7sat.src.rpm\ntfm-rubygem-kafo_wizards-0.0.1-4.el7sat.src.rpm\ntfm-rubygem-katello-3.16.0.11-1.el7sat.src.rpm\ntfm-rubygem-kubeclient-4.3.0-1.el7sat.src.rpm\ntfm-rubygem-ldap_fluff-0.4.7-5.el7sat.src.rpm\ntfm-rubygem-little-plugger-1.1.4-1.el7sat.src.rpm\ntfm-rubygem-locale-2.0.9-13.el7sat.src.rpm\ntfm-rubygem-logging-2.2.2-6.el7sat.src.rpm\ntfm-rubygem-logging-journald-2.0.0-2.el7sat.src.rpm\ntfm-rubygem-loofah-2.4.0-1.el7sat.src.rpm\ntfm-rubygem-mail-2.7.1-1.el7sat.src.rpm\ntfm-rubygem-marcel-0.3.3-1.el7sat.src.rpm\ntfm-rubygem-memoist-0.16.0-1.el7sat.src.rpm\ntfm-rubygem-method_source-0.9.2-2.el7sat.src.rpm\ntfm-rubygem-mime-types-3.2.2-4.el7sat.src.rpm\ntfm-rubygem-mime-types-data-3.2018.0812-4.el7sat.src.rpm\ntfm-rubygem-mimemagic-0.3.5-1.el7sat.src.rpm\ntfm-rubygem-mini_mime-1.0.2-1.el7sat.src.rpm\ntfm-rubygem-mini_portile2-2.4.0-1.el7sat.src.rpm\ntfm-rubygem-ms_rest-0.7.4-2.el7sat.src.rpm\ntfm-rubygem-ms_rest_azure-0.11.1-2.el7sat.src.rpm\ntfm-rubygem-multi_json-1.14.1-1.el7sat.src.rpm\ntfm-rubygem-multipart-post-2.0.0-1.el7sat.src.rpm\ntfm-rubygem-mustermann-1.0.2-4.el7sat.src.rpm\ntfm-rubygem-net-ldap-0.16.1-1.el7sat.src.rpm\ntfm-rubygem-net-ping-2.0.1-3.el7sat.src.rpm\ntfm-rubygem-net-scp-1.2.1-3.el7sat.src.rpm\ntfm-rubygem-net-ssh-4.2.0-1.el7sat.src.rpm\ntfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.src.rpm\ntfm-rubygem-netrc-0.11.0-3.el7sat.src.rpm\ntfm-rubygem-nio4r-2.5.2-2.el7sat.src.rpm\ntfm-rubygem-nokogiri-1.10.9-1.el7sat.src.rpm\ntfm-rubygem-oauth-0.5.4-3.el7sat.src.rpm\ntfm-rubygem-openscap-0.4.9-3.el7sat.src.rpm\ntfm-rubygem-optimist-3.0.0-1.el7sat.src.rpm\ntfm-rubygem-os-1.0.0-1.el7sat.src.rpm\ntfm-rubygem-ovirt-engine-sdk-4.2.3-3.el7sat.src.rpm\ntfm-rubygem-ovirt_provision_plugin-2.0.3-1.el7sat.src.rpm\ntfm-rubygem-parse-cron-0.1.4-4.el7sat.src.rpm\ntfm-rubygem-passenger-4.0.18-26.el7sat.src.rpm\ntfm-rubygem-pg-1.1.4-2.el7sat.src.rpm\ntfm-rubygem-polyglot-0.3.5-3.el7sat.src.rpm\ntfm-rubygem-powerbar-2.0.1-2.el7sat.src.rpm\ntfm-rubygem-prometheus-client-1.0.0-1.el7sat.src.rpm\ntfm-rubygem-promise.rb-0.7.4-1.el7sat.src.rpm\ntfm-rubygem-public_suffix-3.0.3-1.el7sat.src.rpm\ntfm-rubygem-pulp_2to3_migration_client-0.2.0-0.1.b6.el7sat.src.rpm\ntfm-rubygem-pulp_ansible_client-0.2.0b13.dev01588546902-1.el7sat.src.rpm\ntfm-rubygem-pulp_certguard_client-0.1.0rc5-1.el7sat.src.rpm\ntfm-rubygem-pulp_container_client-1.4.1-1.el7sat.src.rpm\ntfm-rubygem-pulp_file_client-1.0.1-1.el7sat.src.rpm\ntfm-rubygem-pulp_rpm_client-3.5.0-1.el7sat.src.rpm\ntfm-rubygem-pulpcore_client-3.4.1-1.el7sat.src.rpm\ntfm-rubygem-puma-4.3.3-4.el7sat.src.rpm\ntfm-rubygem-puma-plugin-systemd-0.1.5-1.el7sat.src.rpm\ntfm-rubygem-quantile-0.2.0-3.el7sat.src.rpm\ntfm-rubygem-rabl-0.14.3-1.el7sat.src.rpm\ntfm-rubygem-rack-2.2.3-1.el7sat.src.rpm\ntfm-rubygem-rack-cors-1.0.2-1.el7sat.src.rpm\ntfm-rubygem-rack-jsonp-1.3.1-9.el7sat.src.rpm\ntfm-rubygem-rack-protection-2.0.3-4.el7sat.src.rpm\ntfm-rubygem-rack-test-1.1.0-4.el7sat.src.rpm\ntfm-rubygem-rails-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-rails-dom-testing-2.0.3-6.el7sat.src.rpm\ntfm-rubygem-rails-html-sanitizer-1.3.0-1.el7sat.src.rpm\ntfm-rubygem-rails-i18n-6.0.0-2.el7sat.src.rpm\ntfm-rubygem-railties-6.0.3.1-1.el7sat.src.rpm\ntfm-rubygem-rainbow-2.2.1-5.el7sat.src.rpm\ntfm-rubygem-rb-inotify-0.9.7-5.el7sat.src.rpm\ntfm-rubygem-rbovirt-0.1.7-4.el7sat.src.rpm\ntfm-rubygem-rbvmomi-2.2.0-3.el7sat.src.rpm\ntfm-rubygem-record_tag_helper-1.0.1-3.el7sat.src.rpm\ntfm-rubygem-recursive-open-struct-1.1.0-1.el7sat.src.rpm\ntfm-rubygem-redhat_access-2.2.18-1.el7sat.src.rpm\ntfm-rubygem-redhat_access_lib-1.1.5-1.el7sat.src.rpm\ntfm-rubygem-redis-4.1.2-2.el7sat.src.rpm\ntfm-rubygem-representable-3.0.4-1.el7sat.src.rpm\ntfm-rubygem-responders-3.0.0-3.el7sat.src.rpm\ntfm-rubygem-rest-client-2.0.2-3.el7sat.src.rpm\ntfm-rubygem-retriable-3.1.2-1.el7sat.src.rpm\ntfm-rubygem-rkerberos-0.1.5-18.el7sat.src.rpm\ntfm-rubygem-roadie-3.4.0-3.el7sat.src.rpm\ntfm-rubygem-roadie-rails-2.1.1-2.el7sat.src.rpm\ntfm-rubygem-robotex-1.0.0-21.el7sat.src.rpm\ntfm-rubygem-rsec-0.4.3-4.el7sat.src.rpm\ntfm-rubygem-ruby-libvirt-0.7.0-4.el7sat.src.rpm\ntfm-rubygem-ruby2ruby-2.4.2-3.el7sat.src.rpm\ntfm-rubygem-ruby_parser-3.10.1-2.el7sat.src.rpm\ntfm-rubygem-rubyipmi-0.10.0-6.el7sat.src.rpm\ntfm-rubygem-runcible-2.13.0-2.el7sat.src.rpm\ntfm-rubygem-safemode-1.3.5-2.el7sat.src.rpm\ntfm-rubygem-scoped_search-4.1.9-1.el7sat.src.rpm\ntfm-rubygem-secure_headers-6.3.0-2.el7sat.src.rpm\ntfm-rubygem-sequel-5.7.1-2.el7sat.src.rpm\ntfm-rubygem-sexp_processor-4.10.0-5.el7sat.src.rpm\ntfm-rubygem-sidekiq-5.2.7-3.el7sat.src.rpm\ntfm-rubygem-signet-0.11.0-3.el7sat.src.rpm\ntfm-rubygem-sinatra-2.0.3-4.el7sat.src.rpm\ntfm-rubygem-smart_proxy_ansible-3.0.1-5.el7sat.src.rpm\ntfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-3.el7sat.src.rpm\ntfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-2.el7sat.src.rpm\ntfm-rubygem-smart_proxy_discovery-1.0.5-5.el7sat.src.rpm\ntfm-rubygem-smart_proxy_discovery_image-1.2.1-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-smart_proxy_dns_infoblox-1.0.0-7.fm2_1.el7sat.src.rpm\ntfm-rubygem-smart_proxy_dynflow-0.2.4-5.el7sat.src.rpm\ntfm-rubygem-smart_proxy_dynflow_core-0.2.6-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-smart_proxy_openscap-0.7.3-1.fm2_1.el7sat.src.rpm\ntfm-rubygem-smart_proxy_pulp-2.1.0-2.el7sat.src.rpm\ntfm-rubygem-smart_proxy_remote_execution_ssh-0.3.0-3.el7sat.src.rpm\ntfm-rubygem-sprockets-3.7.2-6.el7sat.src.rpm\ntfm-rubygem-sprockets-rails-3.2.1-6.el7sat.src.rpm\ntfm-rubygem-sqlite3-1.3.13-5.el7sat.src.rpm\ntfm-rubygem-sshkey-1.9.0-3.el7sat.src.rpm\ntfm-rubygem-statsd-instrument-2.1.4-2.el7sat.src.rpm\ntfm-rubygem-stomp-1.4.9-1.el7sat.src.rpm\ntfm-rubygem-text-1.3.0-7.el7sat.src.rpm\ntfm-rubygem-thor-1.0.1-2.el7sat.src.rpm\ntfm-rubygem-thread_safe-0.3.6-5.el7sat.src.rpm\ntfm-rubygem-tilt-2.0.8-4.el7sat.src.rpm\ntfm-rubygem-timeliness-0.3.10-1.el7sat.src.rpm\ntfm-rubygem-tzinfo-1.2.6-1.el7sat.src.rpm\ntfm-rubygem-uber-0.1.0-1.el7sat.src.rpm\ntfm-rubygem-unf-0.1.3-7.el7sat.src.rpm\ntfm-rubygem-unf_ext-0.0.7.2-1.el7sat.src.rpm\ntfm-rubygem-unicode-0.4.4.4-1.el7sat.src.rpm\ntfm-rubygem-unicode-display_width-1.0.5-5.el7sat.src.rpm\ntfm-rubygem-validates_lengths_from_database-0.5.0-7.el7sat.src.rpm\ntfm-rubygem-webpack-rails-0.9.8-6.el7sat.src.rpm\ntfm-rubygem-websocket-driver-0.7.1-1.el7sat.src.rpm\ntfm-rubygem-websocket-extensions-0.1.5-1.el7sat.src.rpm\ntfm-rubygem-will_paginate-3.1.7-3.el7sat.src.rpm\ntfm-rubygem-x-editable-rails-1.5.5-5.el7sat.src.rpm\ntfm-rubygem-xmlrpc-0.3.0-2.el7sat.src.rpm\ntfm-rubygem-zeitwerk-2.2.2-1.el7sat.src.rpm\n\nnoarch:\nansible-collection-redhat-satellite-1.3.0-1.el7sat.noarch.rpm\nansible-runner-1.4.6-1.el7ar.noarch.rpm\nansiblerole-foreman_scap_client-0.0.5-1.el7sat.noarch.rpm\nansiblerole-insights-client-1.7.1-1.el7sat.noarch.rpm\nansiblerole-satellite-receptor-installer-0.6.13-1.el7sat.noarch.rpm\ncandlepin-3.1.21-1.el7sat.noarch.rpm\ncandlepin-selinux-3.1.21-1.el7sat.noarch.rpm\ncrane-selinux-3.4.0-1.el7sat.noarch.rpm\nforeman-2.1.2.19-1.el7sat.noarch.rpm\nforeman-bootloaders-redhat-202005201200-1.el7sat.noarch.rpm\nforeman-bootloaders-redhat-tftpboot-202005201200-1.el7sat.noarch.rpm\nforeman-cli-2.1.2.19-1.el7sat.noarch.rpm\nforeman-debug-2.1.2.19-1.el7sat.noarch.rpm\nforeman-discovery-image-3.6.7-1.el7sat.noarch.rpm\nforeman-dynflow-sidekiq-2.1.2.19-1.el7sat.noarch.rpm\nforeman-ec2-2.1.2.19-1.el7sat.noarch.rpm\nforeman-gce-2.1.2.19-1.el7sat.noarch.rpm\nforeman-installer-2.1.2.8-1.el7sat.noarch.rpm\nforeman-installer-katello-2.1.2.8-1.el7sat.noarch.rpm\nforeman-journald-2.1.2.19-1.el7sat.noarch.rpm\nforeman-libvirt-2.1.2.19-1.el7sat.noarch.rpm\nforeman-openstack-2.1.2.19-1.el7sat.noarch.rpm\nforeman-ovirt-2.1.2.19-1.el7sat.noarch.rpm\nforeman-postgresql-2.1.2.19-1.el7sat.noarch.rpm\nforeman-proxy-2.1.2-2.el7sat.noarch.rpm\nforeman-proxy-content-3.16.0-1.el7sat.noarch.rpm\nforeman-proxy-journald-2.1.2-2.el7sat.noarch.rpm\nforeman-selinux-2.1.2.3-1.el7sat.noarch.rpm\nforeman-service-2.1.2.19-1.el7sat.noarch.rpm\nforeman-telemetry-2.1.2.19-1.el7sat.noarch.rpm\nforeman-vmware-2.1.2.19-1.el7sat.noarch.rpm\nkatello-3.16.0-1.el7sat.noarch.rpm\nkatello-certs-tools-2.7.1-1.el7sat.noarch.rpm\nkatello-client-bootstrap-1.7.5-1.el7sat.noarch.rpm\nkatello-common-3.16.0-1.el7sat.noarch.rpm\nkatello-debug-3.16.0-1.el7sat.noarch.rpm\nkatello-selinux-3.4.0-1.el7sat.noarch.rpm\nkeycloak-httpd-client-install-1.2.2-1.el7sat.noarch.rpm\nkobo-0.5.1-1.el7sat.noarch.rpm\npulp-admin-client-2.21.3-1.el7sat.noarch.rpm\npulp-docker-admin-extensions-3.2.7-1.el7sat.noarch.rpm\npulp-docker-plugins-3.2.7-1.el7sat.noarch.rpm\npulp-katello-1.0.3-1.el7sat.noarch.rpm\npulp-maintenance-2.21.3-1.el7sat.noarch.rpm\npulp-ostree-admin-extensions-1.3.1-2.el7sat.noarch.rpm\npulp-ostree-plugins-1.3.1-2.el7sat.noarch.rpm\npulp-puppet-admin-extensions-2.21.3-2.el7sat.noarch.rpm\npulp-puppet-plugins-2.21.3-2.el7sat.noarch.rpm\npulp-puppet-tools-2.21.3-2.el7sat.noarch.rpm\npulp-rpm-admin-extensions-2.21.3-2.el7sat.noarch.rpm\npulp-rpm-plugins-2.21.3-2.el7sat.noarch.rpm\npulp-selinux-2.21.3-1.el7sat.noarch.rpm\npulp-server-2.21.3-1.el7sat.noarch.rpm\npuppet-agent-oauth-0.5.1-3.el7sat.noarch.rpm\npuppet-foreman_scap_client-0.4.0-1.el7sat.noarch.rpm\npuppetlabs-stdlib-4.25.1-2.el7sat.noarch.rpm\npuppetserver-6.13.0-1.el7sat.noarch.rpm\npython-blinker-1.3-2.el7sat.noarch.rpm\npython-gnupg-0.3.7-1.el7ui.noarch.rpm\npython-gofer-2.12.5-7.el7sat.noarch.rpm\npython-gofer-qpid-2.12.5-7.el7sat.noarch.rpm\npython-kid-0.9.6-11.el7sat.noarch.rpm\npython-mongoengine-0.10.5-2.el7sat.noarch.rpm\npython-nectar-1.6.2-1.el7sat.noarch.rpm\npython-oauth2-1.5.211-8.el7sat.noarch.rpm\npython-pulp-bindings-2.21.3-1.el7sat.noarch.rpm\npython-pulp-client-lib-2.21.3-1.el7sat.noarch.rpm\npython-pulp-common-2.21.3-1.el7sat.noarch.rpm\npython-pulp-docker-common-3.2.7-1.el7sat.noarch.rpm\npython-pulp-integrity-2.21.3-2.el7sat.noarch.rpm\npython-pulp-oid_validation-2.21.3-1.el7sat.noarch.rpm\npython-pulp-ostree-common-1.3.1-2.el7sat.noarch.rpm\npython-pulp-puppet-common-2.21.3-2.el7sat.noarch.rpm\npython-pulp-repoauth-2.21.3-1.el7sat.noarch.rpm\npython-pulp-rpm-common-2.21.3-2.el7sat.noarch.rpm\npython-pulp-streamer-2.21.3-1.el7sat.noarch.rpm\npython-qpid-1.35.0-5.el7.noarch.rpm\npython-semantic_version-2.2.0-6.el7sat.noarch.rpm\npython2-amqp-2.2.2-5.el7sat.noarch.rpm\npython2-ansible-runner-1.4.6-1.el7ar.noarch.rpm\npython2-anyjson-0.3.3-11.el7sat.noarch.rpm\npython2-apypie-0.2.2-1.el7sat.noarch.rpm\npython2-celery-4.0.2-9.el7sat.noarch.rpm\npython2-click-6.7-9.el7sat.noarch.rpm\npython2-crane-3.3.1-9.el7sat.noarch.rpm\npython2-daemon-2.1.2-7.el7at.noarch.rpm\npython2-django-1.11.29-1.el7sat.noarch.rpm\npython2-flask-0.12.2-4.el7sat.noarch.rpm\npython2-future-0.16.0-11.el7sat.noarch.rpm\npython2-isodate-0.5.4-12.el7sat.noarch.rpm\npython2-itsdangerous-0.24-15.el7sat.noarch.rpm\npython2-jinja2-2.10-10.el7sat.noarch.rpm\npython2-jmespath-0.9.0-6.el7_7.noarch.rpm\npython2-keycloak-httpd-client-install-1.2.2-1.el7sat.noarch.rpm\npython2-kombu-4.0.2-13.el7sat.noarch.rpm\npython2-lockfile-0.11.0-10.el7ar.noarch.rpm\npython2-okaara-1.0.37-2.el7sat.noarch.rpm\npython2-pexpect-4.6-1.el7at.noarch.rpm\npython2-ptyprocess-0.5.2-3.el7at.noarch.rpm\npython2-vine-1.1.3-6.el7sat.noarch.rpm\npython2-werkzeug-0.12.2-5.el7sat.noarch.rpm\npython3-async-timeout-3.0.1-2.el7ar.noarch.rpm\npython3-attrs-19.3.0-3.el7ar.noarch.rpm\npython3-chardet-3.0.4-10.el7ar.noarch.rpm\npython3-dateutil-2.8.1-2.el7ar.noarch.rpm\npython3-idna-2.4-2.el7ar.noarch.rpm\npython3-idna-ssl-1.1.0-2.el7ar.noarch.rpm\npython3-prometheus-client-0.7.1-2.el7ar.noarch.rpm\npython3-receptor-satellite-1.2.0-1.el7sat.noarch.rpm\npython3-six-1.11.0-8.el7ar.noarch.rpm\npython3-typing-extensions-3.7.4.1-2.el7ar.noarch.rpm\nqpid-dispatch-tools-1.5.0-4.el7.noarch.rpm\nqpid-tools-1.36.0-28.el7amq.noarch.rpm\nreceptor-0.6.3-1.el7ar.noarch.rpm\nredhat-access-insights-puppet-1.0.1-1.el7sat.noarch.rpm\nrepoview-0.6.6-11.el7sat.noarch.rpm\nrhel8-kickstart-setup-0.0.2-1.el7sat.noarch.rpm\nrubygem-fast_gettext-1.1.0-4.el7sat.noarch.rpm\nrubygem-foreman_scap_client-0.4.6-1.el7sat.noarch.rpm\nrubygem-highline-1.7.8-3.el7sat.noarch.rpm\nrubygem-oauth-0.5.4-2.el7sat.noarch.rpm\nrubygem-rack-1.6.12-1.el7sat.noarch.rpm\nrubygem-rake-0.9.2.2-41.el7sat.noarch.rpm\nsatellite-6.8.0-1.el7sat.noarch.rpm\nsatellite-capsule-6.8.0-1.el7sat.noarch.rpm\nsatellite-cli-6.8.0-1.el7sat.noarch.rpm\nsatellite-common-6.8.0-1.el7sat.noarch.rpm\nsatellite-debug-tools-6.8.0-1.el7sat.noarch.rpm\nsatellite-installer-6.8.0.11-1.el7sat.noarch.rpm\ntfm-rubygem-actioncable-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-actionmailbox-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-actionmailer-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-actionpack-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-actiontext-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-actionview-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-activejob-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-activemodel-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-activerecord-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-activerecord-import-1.0.0-6.el7sat.noarch.rpm\ntfm-rubygem-activerecord-session_store-1.1.1-4.el7sat.noarch.rpm\ntfm-rubygem-activestorage-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-activesupport-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-addressable-2.6.0-1.el7sat.noarch.rpm\ntfm-rubygem-algebrick-0.7.3-6.el7sat.noarch.rpm\ntfm-rubygem-amazing_print-1.1.0-1.el7sat.noarch.rpm\ntfm-rubygem-ancestry-3.0.7-1.el7sat.noarch.rpm\ntfm-rubygem-anemone-0.7.2-22.el7sat.noarch.rpm\ntfm-rubygem-angular-rails-templates-1.1.0-1.el7sat.noarch.rpm\ntfm-rubygem-ansi-1.5.0-2.el7sat.noarch.rpm\ntfm-rubygem-apipie-bindings-0.3.0-1.el7sat.noarch.rpm\ntfm-rubygem-apipie-dsl-2.2.2-2.el7sat.noarch.rpm\ntfm-rubygem-apipie-params-0.0.5-5.el7sat.noarch.rpm\ntfm-rubygem-apipie-rails-0.5.17-3.el7sat.noarch.rpm\ntfm-rubygem-audited-4.9.0-3.el7sat.noarch.rpm\ntfm-rubygem-azure_mgmt_compute-0.18.7-1.el7sat.noarch.rpm\ntfm-rubygem-azure_mgmt_network-0.19.0-1.el7sat.noarch.rpm\ntfm-rubygem-azure_mgmt_resources-0.17.6-1.el7sat.noarch.rpm\ntfm-rubygem-azure_mgmt_storage-0.17.10-1.el7sat.noarch.rpm\ntfm-rubygem-azure_mgmt_subscriptions-0.18.2-1.el7sat.noarch.rpm\ntfm-rubygem-builder-3.2.4-1.el7sat.noarch.rpm\ntfm-rubygem-bundler_ext-0.4.1-4.el7sat.noarch.rpm\ntfm-rubygem-clamp-1.1.2-5.el7sat.noarch.rpm\ntfm-rubygem-coffee-rails-5.0.0-1.el7sat.noarch.rpm\ntfm-rubygem-coffee-script-2.4.1-4.el7sat.noarch.rpm\ntfm-rubygem-coffee-script-source-1.12.2-4.el7sat.noarch.rpm\ntfm-rubygem-concurrent-ruby-1.1.6-2.el7sat.noarch.rpm\ntfm-rubygem-concurrent-ruby-edge-0.6.0-2.el7sat.noarch.rpm\ntfm-rubygem-connection_pool-2.2.2-2.el7sat.noarch.rpm\ntfm-rubygem-crass-1.0.6-1.el7sat.noarch.rpm\ntfm-rubygem-css_parser-1.4.7-3.el7sat.noarch.rpm\ntfm-rubygem-daemons-1.2.3-7.el7sat.noarch.rpm\ntfm-rubygem-deacon-1.0.0-4.el7sat.noarch.rpm\ntfm-rubygem-declarative-0.0.10-1.el7sat.noarch.rpm\ntfm-rubygem-declarative-option-0.1.0-1.el7sat.noarch.rpm\ntfm-rubygem-deep_cloneable-3.0.0-3.el7sat.noarch.rpm\ntfm-rubygem-deface-1.5.3-2.el7sat.noarch.rpm\ntfm-rubygem-diffy-3.0.1-6.el7sat.noarch.rpm\ntfm-rubygem-domain_name-0.5.20160310-4.el7sat.noarch.rpm\ntfm-rubygem-dynflow-1.4.7-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-erubi-1.9.0-1.el7sat.noarch.rpm\ntfm-rubygem-excon-0.58.0-3.el7sat.noarch.rpm\ntfm-rubygem-execjs-2.7.0-4.el7sat.noarch.rpm\ntfm-rubygem-faraday-0.15.4-1.el7sat.noarch.rpm\ntfm-rubygem-faraday-cookie_jar-0.0.6-1.el7sat.noarch.rpm\ntfm-rubygem-faraday_middleware-0.13.1-2.el7sat.noarch.rpm\ntfm-rubygem-fast_gettext-1.4.1-3.el7sat.noarch.rpm\ntfm-rubygem-fog-aws-3.6.5-1.el7sat.noarch.rpm\ntfm-rubygem-fog-core-2.1.0-3.el7sat.noarch.rpm\ntfm-rubygem-fog-google-1.8.2-1.el7sat.noarch.rpm\ntfm-rubygem-fog-json-1.2.0-3.el7sat.noarch.rpm\ntfm-rubygem-fog-kubevirt-1.3.3-1.el7sat.noarch.rpm\ntfm-rubygem-fog-libvirt-0.7.0-1.el7sat.noarch.rpm\ntfm-rubygem-fog-openstack-1.0.8-2.el7sat.noarch.rpm\ntfm-rubygem-fog-ovirt-1.2.5-1.el7sat.noarch.rpm\ntfm-rubygem-fog-vsphere-3.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-fog-xml-0.1.2-8.el7sat.noarch.rpm\ntfm-rubygem-foreman-tasks-2.0.2-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-foreman-tasks-core-0.3.4-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_ansible-5.1.3-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_ansible_core-3.0.4-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_azure_rm-2.1.2-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-foreman_bootdisk-17.0.2-2.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-foreman_discovery-16.1.2-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_hooks-0.3.16-2.el7sat.noarch.rpm\ntfm-rubygem-foreman_kubevirt-0.1.7-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_leapp-0.1.6-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_openscap-4.0.3-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-foreman_remote_execution-3.3.7-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_remote_execution-cockpit-3.3.7-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_remote_execution_core-1.3.0-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_rh_cloud-2.0.12-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_templates-9.0.1-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-foreman_theme_satellite-6.0.1.7-1.el7sat.noarch.rpm\ntfm-rubygem-foreman_virt_who_configure-0.5.2-1.el7sat.noarch.rpm\ntfm-rubygem-formatador-0.2.1-11.el7sat.noarch.rpm\ntfm-rubygem-friendly_id-5.3.0-1.el7sat.noarch.rpm\ntfm-rubygem-fx-0.5.0-1.el7sat.noarch.rpm\ntfm-rubygem-get_process_mem-0.2.1-3.el7sat.noarch.rpm\ntfm-rubygem-gettext-3.1.4-10.el7sat.noarch.rpm\ntfm-rubygem-gettext_i18n_rails-1.8.0-1.el7sat.noarch.rpm\ntfm-rubygem-git-1.5.0-1.el7sat.noarch.rpm\ntfm-rubygem-gitlab-sidekiq-fetcher-0.5.2-2.el7sat.noarch.rpm\ntfm-rubygem-globalid-0.4.2-1.el7sat.noarch.rpm\ntfm-rubygem-google-api-client-0.23.9-3.el7sat.noarch.rpm\ntfm-rubygem-googleauth-0.6.7-3.el7sat.noarch.rpm\ntfm-rubygem-graphql-1.8.14-1.el7sat.noarch.rpm\ntfm-rubygem-graphql-batch-0.3.10-1.el7sat.noarch.rpm\ntfm-rubygem-gssapi-1.2.0-6.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli-2.1.2-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman-2.1.2.1-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_admin-0.0.9-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_ansible-0.3.2-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_azure_rm-0.2.0-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_bootdisk-0.3.0-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_discovery-1.0.2-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_docker-0.0.6.4-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_kubevirt-0.1.4-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_leapp-0.1.0-2.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_openscap-0.1.11-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_remote_execution-0.1.2-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_tasks-0.0.14-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_templates-0.2.0-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_foreman_virt_who_configure-0.0.6-1.el7sat.noarch.rpm\ntfm-rubygem-hammer_cli_katello-0.22.2.2-1.el7sat.noarch.rpm\ntfm-rubygem-hashie-3.6.0-1.el7sat.noarch.rpm\ntfm-rubygem-highline-1.7.8-4.el7sat.noarch.rpm\ntfm-rubygem-http-3.3.0-1.el7sat.noarch.rpm\ntfm-rubygem-http-cookie-1.0.2-5.el7sat.noarch.rpm\ntfm-rubygem-http-form_data-2.1.1-1.el7sat.noarch.rpm\ntfm-rubygem-httpclient-2.8.3-1.el7sat.noarch.rpm\ntfm-rubygem-i18n-1.8.2-1.el7sat.noarch.rpm\ntfm-rubygem-infoblox-3.0.0-3.el7sat.noarch.rpm\ntfm-rubygem-ipaddress-0.8.0-11.el7sat.noarch.rpm\ntfm-rubygem-jgrep-1.3.3-12.el7sat.noarch.rpm\ntfm-rubygem-journald-logger-2.0.4-2.el7sat.noarch.rpm\ntfm-rubygem-jwt-2.2.1-1.el7sat.noarch.rpm\ntfm-rubygem-kafo-4.1.0-3.el7sat.noarch.rpm\ntfm-rubygem-kafo_parsers-1.1.0-3.el7sat.noarch.rpm\ntfm-rubygem-kafo_wizards-0.0.1-4.el7sat.noarch.rpm\ntfm-rubygem-katello-3.16.0.11-1.el7sat.noarch.rpm\ntfm-rubygem-kubeclient-4.3.0-1.el7sat.noarch.rpm\ntfm-rubygem-ldap_fluff-0.4.7-5.el7sat.noarch.rpm\ntfm-rubygem-little-plugger-1.1.4-1.el7sat.noarch.rpm\ntfm-rubygem-locale-2.0.9-13.el7sat.noarch.rpm\ntfm-rubygem-logging-2.2.2-6.el7sat.noarch.rpm\ntfm-rubygem-logging-journald-2.0.0-2.el7sat.noarch.rpm\ntfm-rubygem-loofah-2.4.0-1.el7sat.noarch.rpm\ntfm-rubygem-mail-2.7.1-1.el7sat.noarch.rpm\ntfm-rubygem-marcel-0.3.3-1.el7sat.noarch.rpm\ntfm-rubygem-memoist-0.16.0-1.el7sat.noarch.rpm\ntfm-rubygem-method_source-0.9.2-2.el7sat.noarch.rpm\ntfm-rubygem-mime-types-3.2.2-4.el7sat.noarch.rpm\ntfm-rubygem-mime-types-data-3.2018.0812-4.el7sat.noarch.rpm\ntfm-rubygem-mimemagic-0.3.5-1.el7sat.noarch.rpm\ntfm-rubygem-mini_mime-1.0.2-1.el7sat.noarch.rpm\ntfm-rubygem-mini_portile2-2.4.0-1.el7sat.noarch.rpm\ntfm-rubygem-ms_rest-0.7.4-2.el7sat.noarch.rpm\ntfm-rubygem-ms_rest_azure-0.11.1-2.el7sat.noarch.rpm\ntfm-rubygem-multi_json-1.14.1-1.el7sat.noarch.rpm\ntfm-rubygem-multipart-post-2.0.0-1.el7sat.noarch.rpm\ntfm-rubygem-mustermann-1.0.2-4.el7sat.noarch.rpm\ntfm-rubygem-net-ldap-0.16.1-1.el7sat.noarch.rpm\ntfm-rubygem-net-ping-2.0.1-3.el7sat.noarch.rpm\ntfm-rubygem-net-scp-1.2.1-3.el7sat.noarch.rpm\ntfm-rubygem-net-ssh-4.2.0-1.el7sat.noarch.rpm\ntfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.noarch.rpm\ntfm-rubygem-netrc-0.11.0-3.el7sat.noarch.rpm\ntfm-rubygem-oauth-0.5.4-3.el7sat.noarch.rpm\ntfm-rubygem-openscap-0.4.9-3.el7sat.noarch.rpm\ntfm-rubygem-optimist-3.0.0-1.el7sat.noarch.rpm\ntfm-rubygem-os-1.0.0-1.el7sat.noarch.rpm\ntfm-rubygem-ovirt_provision_plugin-2.0.3-1.el7sat.noarch.rpm\ntfm-rubygem-parse-cron-0.1.4-4.el7sat.noarch.rpm\ntfm-rubygem-polyglot-0.3.5-3.el7sat.noarch.rpm\ntfm-rubygem-powerbar-2.0.1-2.el7sat.noarch.rpm\ntfm-rubygem-prometheus-client-1.0.0-1.el7sat.noarch.rpm\ntfm-rubygem-promise.rb-0.7.4-1.el7sat.noarch.rpm\ntfm-rubygem-public_suffix-3.0.3-1.el7sat.noarch.rpm\ntfm-rubygem-pulp_2to3_migration_client-0.2.0-0.1.b6.el7sat.noarch.rpm\ntfm-rubygem-pulp_ansible_client-0.2.0b13.dev01588546902-1.el7sat.noarch.rpm\ntfm-rubygem-pulp_certguard_client-0.1.0rc5-1.el7sat.noarch.rpm\ntfm-rubygem-pulp_container_client-1.4.1-1.el7sat.noarch.rpm\ntfm-rubygem-pulp_file_client-1.0.1-1.el7sat.noarch.rpm\ntfm-rubygem-pulp_rpm_client-3.5.0-1.el7sat.noarch.rpm\ntfm-rubygem-pulpcore_client-3.4.1-1.el7sat.noarch.rpm\ntfm-rubygem-puma-plugin-systemd-0.1.5-1.el7sat.noarch.rpm\ntfm-rubygem-quantile-0.2.0-3.el7sat.noarch.rpm\ntfm-rubygem-rabl-0.14.3-1.el7sat.noarch.rpm\ntfm-rubygem-rack-2.2.3-1.el7sat.noarch.rpm\ntfm-rubygem-rack-cors-1.0.2-1.el7sat.noarch.rpm\ntfm-rubygem-rack-jsonp-1.3.1-9.el7sat.noarch.rpm\ntfm-rubygem-rack-protection-2.0.3-4.el7sat.noarch.rpm\ntfm-rubygem-rack-test-1.1.0-4.el7sat.noarch.rpm\ntfm-rubygem-rails-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-rails-dom-testing-2.0.3-6.el7sat.noarch.rpm\ntfm-rubygem-rails-html-sanitizer-1.3.0-1.el7sat.noarch.rpm\ntfm-rubygem-rails-i18n-6.0.0-2.el7sat.noarch.rpm\ntfm-rubygem-railties-6.0.3.1-1.el7sat.noarch.rpm\ntfm-rubygem-rainbow-2.2.1-5.el7sat.noarch.rpm\ntfm-rubygem-rb-inotify-0.9.7-5.el7sat.noarch.rpm\ntfm-rubygem-rbovirt-0.1.7-4.el7sat.noarch.rpm\ntfm-rubygem-rbvmomi-2.2.0-3.el7sat.noarch.rpm\ntfm-rubygem-record_tag_helper-1.0.1-3.el7sat.noarch.rpm\ntfm-rubygem-recursive-open-struct-1.1.0-1.el7sat.noarch.rpm\ntfm-rubygem-redhat_access-2.2.18-1.el7sat.noarch.rpm\ntfm-rubygem-redhat_access_lib-1.1.5-1.el7sat.noarch.rpm\ntfm-rubygem-redis-4.1.2-2.el7sat.noarch.rpm\ntfm-rubygem-representable-3.0.4-1.el7sat.noarch.rpm\ntfm-rubygem-responders-3.0.0-3.el7sat.noarch.rpm\ntfm-rubygem-rest-client-2.0.2-3.el7sat.noarch.rpm\ntfm-rubygem-retriable-3.1.2-1.el7sat.noarch.rpm\ntfm-rubygem-roadie-3.4.0-3.el7sat.noarch.rpm\ntfm-rubygem-roadie-rails-2.1.1-2.el7sat.noarch.rpm\ntfm-rubygem-robotex-1.0.0-21.el7sat.noarch.rpm\ntfm-rubygem-rsec-0.4.3-4.el7sat.noarch.rpm\ntfm-rubygem-ruby2ruby-2.4.2-3.el7sat.noarch.rpm\ntfm-rubygem-ruby_parser-3.10.1-2.el7sat.noarch.rpm\ntfm-rubygem-rubyipmi-0.10.0-6.el7sat.noarch.rpm\ntfm-rubygem-runcible-2.13.0-2.el7sat.noarch.rpm\ntfm-rubygem-safemode-1.3.5-2.el7sat.noarch.rpm\ntfm-rubygem-scoped_search-4.1.9-1.el7sat.noarch.rpm\ntfm-rubygem-secure_headers-6.3.0-2.el7sat.noarch.rpm\ntfm-rubygem-sequel-5.7.1-2.el7sat.noarch.rpm\ntfm-rubygem-sexp_processor-4.10.0-5.el7sat.noarch.rpm\ntfm-rubygem-sidekiq-5.2.7-3.el7sat.noarch.rpm\ntfm-rubygem-signet-0.11.0-3.el7sat.noarch.rpm\ntfm-rubygem-sinatra-2.0.3-4.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_ansible-3.0.1-5.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-3.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-2.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_discovery-1.0.5-5.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_discovery_image-1.2.1-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_dns_infoblox-1.0.0-7.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_dynflow-0.2.4-5.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_dynflow_core-0.2.6-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_openscap-0.7.3-1.fm2_1.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_pulp-2.1.0-2.el7sat.noarch.rpm\ntfm-rubygem-smart_proxy_remote_execution_ssh-0.3.0-3.el7sat.noarch.rpm\ntfm-rubygem-sprockets-3.7.2-6.el7sat.noarch.rpm\ntfm-rubygem-sprockets-rails-3.2.1-6.el7sat.noarch.rpm\ntfm-rubygem-sshkey-1.9.0-3.el7sat.noarch.rpm\ntfm-rubygem-statsd-instrument-2.1.4-2.el7sat.noarch.rpm\ntfm-rubygem-stomp-1.4.9-1.el7sat.noarch.rpm\ntfm-rubygem-text-1.3.0-7.el7sat.noarch.rpm\ntfm-rubygem-thor-1.0.1-2.el7sat.noarch.rpm\ntfm-rubygem-thread_safe-0.3.6-5.el7sat.noarch.rpm\ntfm-rubygem-tilt-2.0.8-4.el7sat.noarch.rpm\ntfm-rubygem-timeliness-0.3.10-1.el7sat.noarch.rpm\ntfm-rubygem-tzinfo-1.2.6-1.el7sat.noarch.rpm\ntfm-rubygem-uber-0.1.0-1.el7sat.noarch.rpm\ntfm-rubygem-unf-0.1.3-7.el7sat.noarch.rpm\ntfm-rubygem-unicode-display_width-1.0.5-5.el7sat.noarch.rpm\ntfm-rubygem-validates_lengths_from_database-0.5.0-7.el7sat.noarch.rpm\ntfm-rubygem-webpack-rails-0.9.8-6.el7sat.noarch.rpm\ntfm-rubygem-websocket-extensions-0.1.5-1.el7sat.noarch.rpm\ntfm-rubygem-will_paginate-3.1.7-3.el7sat.noarch.rpm\ntfm-rubygem-x-editable-rails-1.5.5-5.el7sat.noarch.rpm\ntfm-rubygem-xmlrpc-0.3.0-2.el7sat.noarch.rpm\ntfm-rubygem-zeitwerk-2.2.2-1.el7sat.noarch.rpm\n\nx86_64:\ncreaterepo_c-0.7.4-1.el7sat.x86_64.rpm\ncreaterepo_c-debuginfo-0.7.4-1.el7sat.x86_64.rpm\ncreaterepo_c-libs-0.7.4-1.el7sat.x86_64.rpm\nforeman-discovery-image-service-1.0.0-3.el7sat.x86_64.rpm\nforeman-discovery-image-service-tui-1.0.0-3.el7sat.x86_64.rpm\nhfsplus-tools-332.14-12.el7.x86_64.rpm\nhfsplus-tools-debuginfo-332.14-12.el7.x86_64.rpm\nlibmodulemd-1.7.0-1.pulp.el7sat.x86_64.rpm\nlibmodulemd-debuginfo-1.7.0-1.pulp.el7sat.x86_64.rpm\nlibsolv-0.7.4-4.pulp.el7sat.x86_64.rpm\nlibsolv-debuginfo-0.7.4-4.pulp.el7sat.x86_64.rpm\nlibwebsockets-2.4.2-2.el7.x86_64.rpm\nlibwebsockets-debuginfo-2.4.2-2.el7.x86_64.rpm\nlivecd-tools-20.4-1.6.el7sat.x86_64.rpm\nmod_passenger-4.0.18-24.el7sat.x86_64.rpm\nmod_xsendfile-0.12-11.el7sat.x86_64.rpm\nmod_xsendfile-debuginfo-0.12-11.el7sat.x86_64.rpm\nostree-2017.1-2.atomic.el7.x86_64.rpm\nostree-debuginfo-2017.1-2.atomic.el7.x86_64.rpm\npcp-mmvstatsd-0.4-2.el7sat.x86_64.rpm\npuppet-agent-6.14.0-2.el7sat.x86_64.rpm\npycairo-1.16.3-9.el7sat.x86_64.rpm\npycairo-debuginfo-1.16.3-9.el7sat.x86_64.rpm\npygobject3-debuginfo-3.28.3-2.el7sat.x86_64.rpm\npython-aiohttp-debuginfo-3.6.2-4.el7ar.x86_64.rpm\npython-billiard-debuginfo-3.5.0.3-3.el7sat.x86_64.rpm\npython-bson-3.2-2.el7sat.x86_64.rpm\npython-imgcreate-20.4-1.6.el7sat.x86_64.rpm\npython-markupsafe-debuginfo-0.23-21.el7sat.x86_64.rpm\npython-multidict-debuginfo-4.7.4-2.el7ar.x86_64.rpm\npython-psutil-5.0.1-3.el7sat.x86_64.rpm\npython-psutil-debuginfo-5.0.1-3.el7sat.x86_64.rpm\npython-pycurl-debuginfo-7.43.0.2-4.el7sat.x86_64.rpm\npython-pymongo-3.2-2.el7sat.x86_64.rpm\npython-pymongo-debuginfo-3.2-2.el7sat.x86_64.rpm\npython-pymongo-gridfs-3.2-2.el7sat.x86_64.rpm\npython-qpid-proton-0.28.0-3.el7.x86_64.rpm\npython-qpid-qmf-1.36.0-28.el7amq.x86_64.rpm\npython-saslwrapper-0.22-5.el7sat.x86_64.rpm\npython-simplejson-3.2.0-1.el7sat.x86_64.rpm\npython-simplejson-debuginfo-3.2.0-1.el7sat.x86_64.rpm\npython-twisted-debuginfo-16.4.1-12.el7sat.x86_64.rpm\npython-yarl-debuginfo-1.4.2-2.el7ar.x86_64.rpm\npython-zope-interface-4.0.5-4.el7.x86_64.rpm\npython-zope-interface-debuginfo-4.0.5-4.el7.x86_64.rpm\npython2-billiard-3.5.0.3-3.el7sat.x86_64.rpm\npython2-gobject-3.28.3-2.el7sat.x86_64.rpm\npython2-gobject-base-3.28.3-2.el7sat.x86_64.rpm\npython2-markupsafe-0.23-21.el7sat.x86_64.rpm\npython2-pycurl-7.43.0.2-4.el7sat.x86_64.rpm\npython2-solv-0.7.4-4.pulp.el7sat.x86_64.rpm\npython2-twisted-16.4.1-12.el7sat.x86_64.rpm\npython3-aiohttp-3.6.2-4.el7ar.x86_64.rpm\npython3-multidict-4.7.4-2.el7ar.x86_64.rpm\npython3-yarl-1.4.2-2.el7ar.x86_64.rpm\nqpid-cpp-client-1.36.0-28.el7amq.x86_64.rpm\nqpid-cpp-client-devel-1.36.0-28.el7amq.x86_64.rpm\nqpid-cpp-debuginfo-1.36.0-28.el7amq.x86_64.rpm\nqpid-cpp-server-1.36.0-28.el7amq.x86_64.rpm\nqpid-cpp-server-linearstore-1.36.0-28.el7amq.x86_64.rpm\nqpid-dispatch-debuginfo-1.5.0-4.el7.x86_64.rpm\nqpid-dispatch-router-1.5.0-4.el7.x86_64.rpm\nqpid-proton-c-0.28.0-3.el7.x86_64.rpm\nqpid-proton-debuginfo-0.28.0-3.el7.x86_64.rpm\nqpid-qmf-1.36.0-28.el7amq.x86_64.rpm\nrh-postgresql12-postgresql-evr-0.0.2-1.el7sat.x86_64.rpm\nrubygem-facter-2.4.1-2.el7sat.x86_64.rpm\nrubygem-newt-0.9.6-3.el7sat.x86_64.rpm\nrubygem-newt-debuginfo-0.9.6-3.el7sat.x86_64.rpm\nrubygem-passenger-4.0.18-24.el7sat.x86_64.rpm\nrubygem-passenger-debuginfo-4.0.18-24.el7sat.x86_64.rpm\nrubygem-passenger-native-4.0.18-24.el7sat.x86_64.rpm\nrubygem-passenger-native-libs-4.0.18-24.el7sat.x86_64.rpm\nsaslwrapper-0.22-5.el7sat.x86_64.rpm\nsaslwrapper-debuginfo-0.22-5.el7sat.x86_64.rpm\ntfm-rubygem-bcrypt-3.1.12-1.el7sat.x86_64.rpm\ntfm-rubygem-bcrypt-debuginfo-3.1.12-1.el7sat.x86_64.rpm\ntfm-rubygem-facter-2.4.0-6.el7sat.x86_64.rpm\ntfm-rubygem-ffi-1.12.2-1.el7sat.x86_64.rpm\ntfm-rubygem-ffi-debuginfo-1.12.2-1.el7sat.x86_64.rpm\ntfm-rubygem-http_parser.rb-0.6.0-1.el7sat.x86_64.rpm\ntfm-rubygem-http_parser.rb-debuginfo-0.6.0-1.el7sat.x86_64.rpm\ntfm-rubygem-journald-native-1.0.11-2.el7sat.x86_64.rpm\ntfm-rubygem-journald-native-debuginfo-1.0.11-2.el7sat.x86_64.rpm\ntfm-rubygem-nio4r-2.5.2-2.el7sat.x86_64.rpm\ntfm-rubygem-nio4r-debuginfo-2.5.2-2.el7sat.x86_64.rpm\ntfm-rubygem-nokogiri-1.10.9-1.el7sat.x86_64.rpm\ntfm-rubygem-nokogiri-debuginfo-1.10.9-1.el7sat.x86_64.rpm\ntfm-rubygem-ovirt-engine-sdk-4.2.3-3.el7sat.x86_64.rpm\ntfm-rubygem-ovirt-engine-sdk-debuginfo-4.2.3-3.el7sat.x86_64.rpm\ntfm-rubygem-passenger-4.0.18-26.el7sat.x86_64.rpm\ntfm-rubygem-passenger-debuginfo-4.0.18-26.el7sat.x86_64.rpm\ntfm-rubygem-passenger-native-4.0.18-26.el7sat.x86_64.rpm\ntfm-rubygem-passenger-native-libs-4.0.18-26.el7sat.x86_64.rpm\ntfm-rubygem-pg-1.1.4-2.el7sat.x86_64.rpm\ntfm-rubygem-pg-debuginfo-1.1.4-2.el7sat.x86_64.rpm\ntfm-rubygem-puma-4.3.3-4.el7sat.x86_64.rpm\ntfm-rubygem-puma-debuginfo-4.3.3-4.el7sat.x86_64.rpm\ntfm-rubygem-rkerberos-0.1.5-18.el7sat.x86_64.rpm\ntfm-rubygem-rkerberos-debuginfo-0.1.5-18.el7sat.x86_64.rpm\ntfm-rubygem-ruby-libvirt-0.7.0-4.el7sat.x86_64.rpm\ntfm-rubygem-ruby-libvirt-debuginfo-0.7.0-4.el7sat.x86_64.rpm\ntfm-rubygem-sqlite3-1.3.13-5.el7sat.x86_64.rpm\ntfm-rubygem-sqlite3-debuginfo-1.3.13-5.el7sat.x86_64.rpm\ntfm-rubygem-unf_ext-0.0.7.2-1.el7sat.x86_64.rpm\ntfm-rubygem-unf_ext-debuginfo-0.0.7.2-1.el7sat.x86_64.rpm\ntfm-rubygem-unicode-0.4.4.4-1.el7sat.x86_64.rpm\ntfm-rubygem-unicode-debuginfo-0.4.4.4-1.el7sat.x86_64.rpm\ntfm-rubygem-websocket-driver-0.7.1-1.el7sat.x86_64.rpm\ntfm-rubygem-websocket-driver-debuginfo-0.7.1-1.el7sat.x86_64.rpm\ntfm-runtime-6.1-1.el7sat.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-3258\nhttps://access.redhat.com/security/cve/CVE-2018-11751\nhttps://access.redhat.com/security/cve/CVE-2019-12781\nhttps://access.redhat.com/security/cve/CVE-2019-16782\nhttps://access.redhat.com/security/cve/CVE-2020-5216\nhttps://access.redhat.com/security/cve/CVE-2020-5217\nhttps://access.redhat.com/security/cve/CVE-2020-5267\nhttps://access.redhat.com/security/cve/CVE-2020-7238\nhttps://access.redhat.com/security/cve/CVE-2020-7663\nhttps://access.redhat.com/security/cve/CVE-2020-7942\nhttps://access.redhat.com/security/cve/CVE-2020-7943\nhttps://access.redhat.com/security/cve/CVE-2020-8161\nhttps://access.redhat.com/security/cve/CVE-2020-8184\nhttps://access.redhat.com/security/cve/CVE-2020-8840\nhttps://access.redhat.com/security/cve/CVE-2020-9546\nhttps://access.redhat.com/security/cve/CVE-2020-9547\nhttps://access.redhat.com/security/cve/CVE-2020-9548\nhttps://access.redhat.com/security/cve/CVE-2020-10693\nhttps://access.redhat.com/security/cve/CVE-2020-10968\nhttps://access.redhat.com/security/cve/CVE-2020-10969\nhttps://access.redhat.com/security/cve/CVE-2020-11619\nhttps://access.redhat.com/security/cve/CVE-2020-14061\nhttps://access.redhat.com/security/cve/CVE-2020-14062\nhttps://access.redhat.com/security/cve/CVE-2020-14195\nhttps://access.redhat.com/security/cve/CVE-2020-14334\nhttps://access.redhat.com/security/cve/CVE-2020-14380\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n1yK/tAm1KBU=osSG\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \nThe purpose of this text-only errata is to inform you about the security\nissues fixed in this release. \n\nSecurity Fix(es):\n\n* netty (CVE-2016-4970 CVE-2020-7238 CVE-2019-20444 CVE-2019-20445)\n\n* dom4j (CVE-2018-1000632)\n\n* elasticsearch (CVE-2018-3831)\n\n* pdfbox (CVE-2018-11797)\n\n* vertx (CVE-2018-12541)\n\n* spring-data-jpa (CVE-2019-3797)\n\n* mina-core (CVE-2019-0231)\n\n* jackson-databind (CVE-2019-12086 CVE-2019-16335 CVE-2019-14540\nCVE-2019-17267 CVE-2019-14892 CVE-2019-14893 CVE-2019-16942 CVE-2019-16943\nCVE-2019-17531 CVE-2019-20330 CVE-2020-10673 CVE-2020-10672 CVE-2020-8840\nCVE-2020-9546 CVE-2020-9547 CVE-2020-9548 CVE-2020-10968 CVE-2020-10969\nCVE-2020-11111 CVE-2020-11112 CVE-2020-11113 CVE-2020-11620 CVE-2020-11619\nCVE-2020-14195 CVE-2020-14060 CVE-2020-14061 CVE-2020-14062)\n\n* jackson-mapper-asl (CVE-2019-10172)\n\n* hawtio (CVE-2019-9827)\n\n* undertow (CVE-2019-9511 CVE-2020-1757 CVE-2019-14888 CVE-2020-1745)\n\n* santuario (CVE-2019-12400)\n\n* apache-commons-beanutils (CVE-2019-10086)\n\n* cxf (CVE-2019-17573)\n\n* apache-commons-configuration (CVE-2020-1953)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. Solution:\n\nBefore applying the update, back up your existing installation, including\nall applications, configuration files, databases and database settings, and\nso on. \n\nInstallation instructions are available from the Fuse 7.7.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.7/\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1343616 - CVE-2016-4970 netty: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl\n1620529 - CVE-2018-1000632 dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents\n1632452 - CVE-2018-3831 elasticsearch: Information exposure via _cluster/settings API\n1637492 - CVE-2018-11797 pdfbox: unbounded computation in parser resulting in a denial of service\n1638391 - CVE-2018-12541 vertx: WebSocket HTTP upgrade implementation holds the entire http request in memory before the handshake\n1697598 - CVE-2019-3797 spring-data-jpa: Additional information exposure with Spring Data JPA derived queries\n1700016 - CVE-2019-0231 mina-core: Retaining an open socket in close_notify SSL-TLS leading to Information disclosure. \n1713468 - CVE-2019-12086 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. \n1715075 - CVE-2019-10172 jackson-mapper-asl: XML external entity similar to CVE-2016-3720\n1728604 - CVE-2019-9827 hawtio: server side request forgery via initial /proxy/ substring of a URI\n1741860 - CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service\n1752770 - CVE-2020-1757 undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass\n1755831 - CVE-2019-16335 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource\n1755849 - CVE-2019-14540 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig\n1758167 - CVE-2019-17267 jackson-databind: Serialization gadgets in classes of the ehcache package\n1758171 - CVE-2019-14892 jackson-databind: Serialization gadgets in classes of the commons-configuration package\n1758182 - CVE-2019-14893 jackson-databind: Serialization gadgets in classes of the xalan package\n1758187 - CVE-2019-16942 jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*\n1758191 - CVE-2019-16943 jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource\n1764658 - CVE-2019-12400 xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source\n1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default\n1772464 - CVE-2019-14888 undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS\n1775293 - CVE-2019-17531 jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*\n1793154 - CVE-2019-20330 jackson-databind: lacks certain net.sf.ehcache blocking\n1796225 - CVE-2020-7238 netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling\n1797011 - CVE-2019-17573 cxf: reflected XSS in the services listing page\n1798509 - CVE-2019-20445 netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header\n1798524 - CVE-2019-20444 netty: HTTP request smuggling\n1807305 - CVE-2020-1745 undertow: AJP File Read/Inclusion Vulnerability\n1815212 - CVE-2020-1953 apache-commons-configuration: uncontrolled class instantiation when loading YAML files\n1815470 - CVE-2020-10673 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution\n1815495 - CVE-2020-10672 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution\n1816330 - CVE-2020-8840 jackson-databind: Lacks certain xbean-reflect/JNDI blocking\n1816332 - CVE-2020-9546 jackson-databind: Serialization gadgets in shaded-hikari-config\n1816337 - CVE-2020-9547 jackson-databind: Serialization gadgets in ibatis-sqlmap\n1816340 - CVE-2020-9548 jackson-databind: Serialization gadgets in anteros-core\n1819208 - CVE-2020-10968 jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider\n1819212 - CVE-2020-10969 jackson-databind: Serialization gadgets in javax.swing.JEditorPane\n1821304 - CVE-2020-11111 jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory\n1821311 - CVE-2020-11112 jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider\n1821315 - CVE-2020-11113 jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime\n1826798 - CVE-2020-11620 jackson-databind: Serialization gadgets in commons-jelly:commons-jelly\n1826805 - CVE-2020-11619 jackson-databind: Serialization gadgets in org.springframework:spring-aop\n1848958 - CVE-2020-14195 jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory\n1848960 - CVE-2020-14060 jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool\n1848962 - CVE-2020-14062 jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool\n1848966 - CVE-2020-14061 jackson-databind: serialization in weblogic/oracle-aqjms\n\n5", "sources": [ { "db": "NVD", "id": "CVE-2020-14195" }, { "db": "JVNDB", "id": "JVNDB-2020-007015" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-167049" }, { "db": "VULMON", "id": "CVE-2020-14195" }, { "db": "PACKETSTORM", "id": "159724" }, { "db": "PACKETSTORM", "id": "158636" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-14195", "trust": 2.8 }, { "db": "PACKETSTORM", "id": "159724", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-007015", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202006-1070", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2280", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2588", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3703", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022060909", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021042845", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021072123", "trust": 0.6 }, { "db": "NSFOCUS", "id": "48394", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2020-52692", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-167049", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-14195", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158636", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-167049" }, { "db": "VULMON", "id": "CVE-2020-14195" }, { "db": "JVNDB", "id": "JVNDB-2020-007015" }, { "db": "PACKETSTORM", "id": "159724" }, { "db": "PACKETSTORM", "id": "158636" }, { "db": "NVD", "id": "CVE-2020-14195" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202006-1070" } ] }, "id": "VAR-202006-1825", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-167049" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:03:08.949000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Block one more gadget type (org.jsecurity, CVE-2020-14195) #2765", "trust": 0.8, "url": "https://github.com/fasterxml/jackson-databind/issues/2765" }, { "title": "hitachi-sec-2020-125", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hitachi-sec-2020-125/index.html" }, { "title": "hitachi-sec-2020-125", "trust": 0.8, "url": "https://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hitachi-sec-2020-125/index.html" }, { "title": "FasterXML jackson-databind Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=122515" }, { "title": "IBM: Security Bulletin: Netcool Operations Insight component IBM Network Performance Insight 1.3.1 affected by CVE-2020-14195", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=65584a3dc4fa3ff4771f7034ca97043a" }, { "title": "Red Hat: Important: Satellite 6.8 release", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20204366 - security advisory" }, { "title": "Red Hat: Important: Red Hat Fuse 7.7.0 release and security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20203192 - security advisory" }, { "title": "Hitachi Security Advisories: Multiple Vulnerabilities in Hitachi Ops Center Common Services", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories\u0026qid=hitachi-sec-2020-125" }, { "title": "Hitachi Security Advisories: Multiple Vulnerabilities in Cosminexus", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories\u0026qid=hitachi-sec-2021-109" }, { "title": "Al1ex", "trust": 0.1, "url": "https://github.com/al1ex/al1ex " }, { "title": "cubed", "trust": 0.1, "url": "https://github.com/yahoo/cubed " }, { "title": "SecBooks", "trust": 0.1, "url": "https://github.com/sexybeast233/secbooks " }, { "title": "", "trust": 0.1, "url": "https://github.com/soosmile/poc " }, { "title": "CVE-POC", "trust": 0.1, "url": "https://github.com/0xt11/cve-poc " }, { "title": "PoC", "trust": 0.1, "url": "https://github.com/jonathan-elias/poc " }, { "title": "PoC-in-GitHub", "trust": 0.1, "url": "https://github.com/developer3000s/poc-in-github " }, { "title": "PoC-in-GitHub", "trust": 0.1, "url": "https://github.com/hectorgie/poc-in-github " } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-14195" }, { "db": "JVNDB", "id": "JVNDB-2020-007015" }, { "db": "CNNVD", "id": "CNNVD-202006-1070" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-167049" }, { "db": "JVNDB", "id": "JVNDB-2020-007015" }, { "db": "NVD", "id": "CVE-2020-14195" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://www.oracle.com/security-alerts/cpuapr2021.html" }, { "trust": 2.4, "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "trust": 2.4, "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "trust": 1.8, "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "trust": 1.8, "url": "https://github.com/fasterxml/jackson-databind/issues/2765" }, { "trust": 1.8, "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "trust": 1.8, "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "trust": 1.8, "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14195" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-14195" }, { "trust": 0.7, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-netcool-operations-insight-component-ibm-network-performance-insight-1-3-1-affected-by-cve-2020-14195/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022060909" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/fasterxml-jackson-databind-code-execution-via-org-jsecurity-32688" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-series-of-vulnerabilities-in-fasterxml-jackson-databind-affect-apache-solr-shipped-with-ibm-operations-analytics-log-analysis/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2280/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3703/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021072123" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-jackson-databind-shipped-with-ibm-cloud-pak-system/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/6528214" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2588/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021042845" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-jquery-spring-dom4j-mongodb-linux-kernel-targetcli-fb-jackson-node-js-and-apache-commons-affect-ibm-spectrum-protect-plus/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/6525182" }, { "trust": 0.6, "url": "https://www.oracle.com/security-alerts/cpujul2021.html" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/48394" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159724/red-hat-security-advisory-2020-4366-01.html" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-9547" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-10968" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-9546" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14061" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-11619" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-9548" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14062" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-8840" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-10969" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-7238" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14195" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/502.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:4366" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16782" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-16782" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12781" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-5267" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14380" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-11751" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9547" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-7943" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8184" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-14334" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11751" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10693" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-5217" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-5216" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12781" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-5267" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7663" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-5217" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8161" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-7663" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9548" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-14380" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-3258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8184" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11619" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9546" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8840" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7238" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7942" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-10693" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8161" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-7942" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10968" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14334" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10969" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14061" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7943" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-5216" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14062" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-16335" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11797" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-11112" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-11113" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-14060" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-16943" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-10672" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17573" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10172" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10672" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20330" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20445" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12086" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1000632" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000632" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9511" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12400" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-3831" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-0231" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20330" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20445" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-11797" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-10673" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=jboss.fuse\u0026version=7.7.0" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17531" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16335" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10086" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-12541" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3797" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4970" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17531" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-9827" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14540" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17267" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-1745" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.7/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-9511" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10172" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12086" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16942" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14892" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4970" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-1953" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-1757" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16943" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-11620" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0231" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17267" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14893" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-11111" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9827" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17573" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-16942" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14893" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3831" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14888" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12400" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14892" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10086" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12541" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14540" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:3192" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-3797" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14888" } ], "sources": [ { "db": "VULHUB", "id": "VHN-167049" }, { "db": "VULMON", "id": "CVE-2020-14195" }, { "db": "JVNDB", "id": "JVNDB-2020-007015" }, { "db": "PACKETSTORM", "id": "159724" }, { "db": "PACKETSTORM", "id": "158636" }, { "db": "NVD", "id": "CVE-2020-14195" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202006-1070" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-167049" }, { "db": "VULMON", "id": "CVE-2020-14195" }, { "db": "JVNDB", "id": "JVNDB-2020-007015" }, { "db": "PACKETSTORM", "id": "159724" }, { "db": "PACKETSTORM", "id": "158636" }, { "db": "NVD", "id": "CVE-2020-14195" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202006-1070" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-16T00:00:00", "db": "VULHUB", "id": "VHN-167049" }, { "date": "2020-06-16T00:00:00", "db": "VULMON", "id": "CVE-2020-14195" }, { "date": "2020-07-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007015" }, { "date": "2020-10-27T16:58:42", "db": "PACKETSTORM", "id": "159724" }, { "date": "2020-07-29T00:05:59", "db": "PACKETSTORM", "id": "158636" }, { "date": "2020-06-16T16:15:11.107000", "db": "NVD", "id": "CVE-2020-14195" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2020-06-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1070" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-17T00:00:00", "db": "VULHUB", "id": "VHN-167049" }, { "date": "2021-11-17T00:00:00", "db": "VULMON", "id": "CVE-2020-14195" }, { "date": "2020-08-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007015" }, { "date": "2021-11-17T20:20:55.263000", "db": "NVD", "id": "CVE-2020-14195" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2022-06-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1070" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "159724" }, { "db": "CNNVD", "id": "CNNVD-202006-1070" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FasterXML jackson-databind Unreliable data deserialization vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007015" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }</pre> </div> </div> </div> </div> <br /> <ul class="nav nav-tabs" id="pageTab" role="tablist"> <li class="nav-item"> <button class="nav-link active" id="related-tab" data-bs-toggle="tab" data-bs-target="#related" role="tab" aria-controls="related" aria-selected="true" href="#related">Related vulnerabilities <span class="badge bg-primary rounded-pill">1</span></button> </li> <li class="nav-item"> <button class="nav-link" id="comments-tab" data-bs-toggle="tab" data-bs-target="#comments" role="tab" aria-controls="comments" aria-selected="false" onclick="loadComments()" href="#comments">Comments <span class="badge bg-primary rounded-pill" id="nb-comments">0</span></button> </li> <li class="nav-item"> <button class="nav-link" id="bundles-tab" data-bs-toggle="tab" data-bs-target="#bundles" role="tab" aria-controls="bundles" aria-selected="false" onclick="loadBundles()" href="#bundles">Bundles <span class="badge bg-primary rounded-pill" id="nb-bundles">0</span></button> </li> <li class="nav-item"> <button class="nav-link" id="sightings-tab" data-bs-toggle="tab" data-bs-target="#sightings" role="tab" aria-controls="sightings" aria-selected="false" onclick="loadSightings()" href="#sightings">Sightings <span class="badge bg-primary rounded-pill" id="nb-sightings">0</span></button> </li> </ul> <div class="tab-content" id="pageTabContent"> <div class="tab-pane fade show active" id="related" role="tabpanel" aria-labelledby="related-tab"> <br /> <div class="row"> <div class="col text-end"> <a class="icon-link" href="/recent/all.atom?vulnerability=var-202006-1825" type="application/atom+xml" title="Atom feed"> <svg class="bi" width="1em" height="1em" fill="currentColor"> <use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#rss"/> </svg> </a> <a class="icon-link" href="/recent/all.rss?vulnerability=var-202006-1825" type="application/atom+xml" title="RSS feed"> <svg class="bi" width="1em" height="1em" fill="currentColor"> <use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#rss-fill"/> </svg> </a> </div> </div> <div class="card"> <div class="card-body"> <h5 class="card-title"><a href="/vuln/cve-2020-14195">cve-2020-14195</a></h5> <h6 class="card-subtitle mb-2 text-body-secondary"> Vulnerability from <a href="https://github.com/CVEProject/cvelistV5" rel="noreferrer" target="_blank">cvelistv5</a> </h6> <div class="row"> <div class="col-md-2 fw-bold">Published</div><div class="col">2020-06-16 15:07</div> </div> <div class="row"> <div class="col-md-2 fw-bold">Modified</div><div class="col">2024-08-04 12:39</div> </div> <div class="row"> <div class="col-md-2 fw-bold" data-bs-toggle="tooltip" data-bs-placement="right" title="The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.">Severity <span style="color: green;">?</span></div> <div class="col"> </div> </div> <div class="row" hidden> <div class="col-md-2 fw-bold" data-bs-toggle="tooltip" data-bs-placement="left" title="Exploit Prediction Scoring System (EPSS) from FIRST. The EPSS score is representing the probability of exploitation in the wild in the next 30 days.">EPSS score <span style="color: green;">?</span></div> <div class="col"> <span id="epss-score"></span> <span id="epss-percentile" style="text-decoration:underline dotted" data-bs-toggle="tooltip" data-bs-placement="right" title="The percentile of the current score, the proportion of all scored vulnerabilities with the same or a lower EPSS score"></span> </div> </div> <div class="row"> <div class="col-md-2 fw-bold">Summary</div><div class="col">FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).</div> </div> <div class="row"> <div class="col-md-2 fw-bold">References</div> <div class="col"> <table class="table table-borderless table-hover"> <thead> <tr data-bs-toggle="collapse" data-bs-target="#collapseReferenceTablecve-2020-14195" aria-expanded="false" aria-controls="collapseReferenceTablecve-2020-14195"> <th scope="col" style="width: 20px;"><span class="chevron" >▼</span></th><th scope="col">URL</th><th scope="col">Tags</th> </tr> </thead> <tbody class="collapse" id="collapseReferenceTablecve-2020-14195"> <tr><td></td><td><a href="https://github.com/FasterXML/jackson-databind/issues/2765" rel="noreferrer" target="_blank">https://github.com/FasterXML/jackson-databind/issues/2765</a></td><td>x_refsource_MISC</td></tr> <tr><td></td><td><a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" rel="noreferrer" target="_blank">https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html</a></td><td>mailing-list, x_refsource_MLIST</td></tr> <tr><td></td><td><a href="https://www.oracle.com/security-alerts/cpuoct2020.html" rel="noreferrer" target="_blank">https://www.oracle.com/security-alerts/cpuoct2020.html</a></td><td>x_refsource_MISC</td></tr> <tr><td></td><td><a href="https://security.netapp.com/advisory/ntap-20200702-0003/" rel="noreferrer" target="_blank">https://security.netapp.com/advisory/ntap-20200702-0003/</a></td><td>x_refsource_CONFIRM</td></tr> <tr><td></td><td><a href="https://www.oracle.com/security-alerts/cpujan2021.html" rel="noreferrer" target="_blank">https://www.oracle.com/security-alerts/cpujan2021.html</a></td><td>x_refsource_MISC</td></tr> <tr><td></td><td><a href="https://www.oracle.com/security-alerts/cpuApr2021.html" rel="noreferrer" target="_blank">https://www.oracle.com/security-alerts/cpuApr2021.html</a></td><td>x_refsource_MISC</td></tr> <tr><td></td><td><a href="https://www.oracle.com//security-alerts/cpujul2021.html" rel="noreferrer" target="_blank">https://www.oracle.com//security-alerts/cpujul2021.html</a></td><td>x_refsource_MISC</td></tr> <tr><td></td><td><a href="https://www.oracle.com/security-alerts/cpuoct2021.html" rel="noreferrer" target="_blank">https://www.oracle.com/security-alerts/cpuoct2021.html</a></td><td>x_refsource_MISC</td></tr> </table> </tbody> </div> </div> <div class="row"> <div class="col-md-2 fw-bold">Impacted products</div> <div class="col"> <table class="table table-borderless table-hover"> <thead> <tr data-bs-toggle="collapse" data-bs-target="#collapseProductTablecve-2020-14195" aria-expanded="false" aria-controls="collapseProductTablecve-2020-14195"> <th scope="col" style="width: 20px;"><span class="chevron" >▼</span></th><th scope="col">Vendor</th><th scope="col">Product</th> </tr> </thead> <tbody class="collapse" id="collapseProductTablecve-2020-14195"> <tr> <td></td><td><a href="/search?vendor=n/a">n/a</a></td><td><a href="/search?vendor=n/a&product=n/a">n/a</a></td> </tr> </tbody> </table> </div> </div> <a href="https://nvd.nist.gov/vuln/detail/cve-2020-14195" class="card-link" rel="noreferrer" target="_blank">Show details on NVD website</a> <br /><br /> <div class="btn-group" role="group"> <a role="button" class="btn btn-primary" data-bs-toggle="collapse" data-bs-target="#collapseJsoncve-2020-14195" aria-expanded="false" aria-controls="collapseJsoncve-2020-14195"> JSON <svg class="bi" width="1em" height="1em" fill="currentColor"> <use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/> </svg> </a> <div class="btn-group" role="group"> <button id="btnGroupDropShare" type="button" class="btn btn-primary" data-bs-toggle="dropdown" aria-expanded="false"> Share <svg class="bi" width="1em" height="1em" fill="currentColor"> <use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#chevron-down"/> </svg> </button> <ul class="dropdown-menu" aria-labelledby="btnGroupDropShare"> <li><a class="dropdown-item" href="https://news.ycombinator.com/submitlink?u=https://vulnerability.circl.lu/vuln/cve-2020-14195&t=Vulnerability cve-2020-14195" target="_blank" title="Share on Hacker News">Hacker News</a></li> <li><a class="dropdown-item" href="https://www.linkedin.com/shareArticle?mini=true&url=https://vulnerability.circl.lu/vuln/cve-2020-14195&title=Vulnerability cve-2020-14195" target="_blank" title="Share on LinkedIn">LinkedIn</a></li> <li><a class="dropdown-item" href="https://mastodonshare.com/?text=Vulnerability cve-2020-14195&url=https://vulnerability.circl.lu/vuln/cve-2020-14195" target="_blank" title="Share on Mastodon">Mastodon</a></li> <li><a class="dropdown-item" href="https://www.newspipe.org/bookmark/bookmarklet?href=https://vulnerability.circl.lu/vuln/cve-2020-14195&title=Vulnerability cve-2020-14195" target="_blank" title="Share on Newspipe">Newspipe</a></li> <li><a class="dropdown-item" href="https://api.pinboard.in/v1/posts/add?url=https://vulnerability.circl.lu/vuln/cve-2020-14195&description=Vulnerability cve-2020-14195" target="_blank" title="Share on Pinboard">Pinboard</a></li> <li><a class="dropdown-item" href="https://reddit.com/submit?link=https://vulnerability.circl.lu/vuln/cve-2020-14195&title=Vulnerability cve-2020-14195" target="_blank" title="Share on Reddit">Reddit</a></li> </ul> </div> <a type="button" class="btn btn-primary" title="Copy to clipboard" aria-label="Copy to clipboard" onclick="copyToClipboard('cve-2020-14195')" vuln-id="cve-2020-14195" href="#">To clipboard</a> </div> <div class="collapse" id="collapseJsoncve-2020-14195"> <br /> <div class="card card-body"> <pre class="json-container" id="containercve-2020-14195">{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2765" }, { "name": "[debian-lts-announce] 20200701 [SECURITY] [DLA 2270-1] jackson-databind security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-20T10:39:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2765" }, { "name": "[debian-lts-announce] 20200701 [SECURITY] [DLA 2270-1] jackson-databind security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-14195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FasterXML/jackson-databind/issues/2765", "refsource": "MISC", "url": "https://github.com/FasterXML/jackson-databind/issues/2765" }, { "name": "[debian-lts-announce] 20200701 [SECURITY] [DLA 2270-1] jackson-databind security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200702-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-14195", "datePublished": "2020-06-16T15:07:11", "dateReserved": "2020-06-16T00:00:00", "dateUpdated": "2024-08-04T12:39:36.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }</pre> </div> </div> </div> </div> <br /> </div> <div class="tab-pane fade show" id="comments" role="tabpanel" aria-labelledby="comments-tab"> <br /> <div class="row"> <div class="col"> <p><a href="/user/login">Log in</a> or <a href="/user/signup">create an account</a> to share your comment.</p> </div> <div class="col text-end"> <a class="icon-link" href="/comments/feed.atom?vulnerability=var-202006-1825" type="application/atom+xml" title="Atom feed"> <svg class="bi" width="1em" height="1em" fill="currentColor"> <use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#rss"/> </svg> </a> <a class="icon-link" href="/comments/feed.rss?vulnerability=var-202006-1825" type="application/atom+xml" title="RSS feed"> <svg class="bi" width="1em" height="1em" fill="currentColor"> <use xlink:href="/bootstrap/static/icons/bootstrap-icons.svg#rss-fill"/> </svg> </a> </div> </div> <div class="collapse" id="newCommentvar-202006-1825"> <div class="row"> <div class="col-md-9"> <div id="editor"></div> </div> <div class="col"> <br /><br /><br /> <div class="card card-body my-3"> <h5>Tags</h5> <select class="form-multi-select" id="select-tags" size="9" multiple> <optgroup label="Exploitability" exclusive="true"> <option value="vulnerability:exploitability=industrialised">Industrialised</option> <option value="vulnerability:exploitability=customised">Customised</option> <option value="vulnerability:exploitability=documented">Documented</option> <option value="vulnerability:exploitability=theoretical">Theoretical</option> </optgroup> <optgroup label="Information" exclusive="false"> <option value="vulnerability:information=PoC">Proof-of-Concept</option> <option value="vulnerability:information=remediation">Remediation</option> <option value="vulnerability:information=annotation">Annotation</option> </optgroup> </select> <a href="https://www.misp-project.org/taxonomies.html#_vulnerability_3" rel="noreferrer" target="_blank">Taxonomy of the tags.</a> </div> <button class='btn btn-primary' id='savecomment' title="Save the comment">Save the comment</button> </div> </div> </div> <br /><br /> <div id="list-comments"> <div class="d-flex justify-content-center"> <div class="spinner-border" role="status"><span class="sr-only">Loading...</span></div> </div> </div> </div> <div class="tab-pane fade show" id="bundles" role="tabpanel" aria-labelledby="bundles-tab"> <br /> <div id="list-bundles"> <div class="d-flex justify-content-center"> <div class="spinner-border" role="status"><span class="sr-only">Loading...</span></div> </div> </div> </div> <div class="tab-pane fade show" id="sightings" role="tabpanel" aria-labelledby="sightings-tab"> <br /> <div class="row pb-3" id="sightings-pane-top"> <div class="col"> <a class="btn btn-primary" href="/sightings/?query=var-202006-1825">All sightings related to this event</a> <a class="btn btn-primary" href="/sightings/misp_export?vulnerability=var-202006-1825">Export sightings related to this event</a> </div> </div> <div id="chart-sightings"> <div class="d-flex justify-content-center"> <div class="spinner-border" role="status"><span class="sr-only">Loading...</span></div> </div> </div> <div id="sightingsChartContainer" class="chart-container pt-3"> <canvas id="sightingsChart" height="400"></canvas> </div> <div id="chart-detailed-legend" class="row"> <div class="col-md-8"> <ul class="list-group list-group-flush"> <li class="list-group-item"><b>Seen</b>: The vulnerability was mentioned, discussed, or seen somewhere by the user.</li> <li class="list-group-item"><b>Confirmed</b>: The vulnerability is confirmed from an analyst perspective.</li> <li class="list-group-item"><b>Exploited</b>: This vulnerability was exploited and seen by the user reporting the sighting.</li> <li class="list-group-item"><b>Patched</b>: This vulnerability was successfully patched by the user reporting the sighting.</li> <li class="list-group-item"><b>Not exploited</b>: This vulnerability was not exploited or seen by the user reporting the sighting.</li> <li class="list-group-item"><b>Not confirmed</b>: The user expresses doubt about the veracity of the vulnerability.</li> <li class="list-group-item"><b>Not patched</b>: This vulnerability was not successfully patched by the user reporting the sighting.</li> </ul> </div> </div> </div> </div> <script> let easyMDE = null; let SCHEMA = null; let COMMENTS = {}; function openTabById(tabId) { const tabButton = document.querySelector(`button[data-bs-target="${tabId}"]`); if (tabButton) { const tab = new bootstrap.Tab(tabButton); tab.show(); } else { console.error(`Tab with ID ${tabId} not found.`); } } function getSelectValues(select) { var tags = []; var options = select && select.options; var opt; for (var i=0, iLen=options.length; i<iLen; i++) { opt = options[i]; if (opt.selected) { if (opt.parentNode.getAttribute("exclusive") == "true") { options1 = document.getElementById("select-tags").options; for (var j=0, jLen=options1.length; j<jLen; j++) { opt1 = options1[j]; if (opt1.parentNode.getAttribute("exclusive") == "true") { opt1.selected = false; } } opt.selected = true; } tags.push(opt.value || opt.text); } } var json = jsoneditor.getValue(); if (!("meta" in json)) { json["meta"] = [{"tags": tags}]; } else { json["meta"].forEach(function(value, index, array) { if ("tags" in value) { obj = {"tags": tags} json["meta"] = []; json["meta"] = [obj]; } }) } jsoneditor.setValue(json); } document.getElementById("select-tags").onclick= function (e) { getSelectValues(document.getElementById("select-tags")); }; function formatNumberWithPrecision(value, precision) { const formattedValue = parseFloat(value.toFixed(precision)); return formattedValue; } function RoundNumber(value) { return Math.round(value); } document.addEventListener("DOMContentLoaded", function() { // Enable tootips var tooltipTriggerList = [].slice.call(document.querySelectorAll('[data-bs-toggle="tooltip"]')) var tooltipList = tooltipTriggerList.map(function (tooltipTriggerEl) { return new bootstrap.Tooltip(tooltipTriggerEl) }) // Pretty print of JSON data in JSON containers var jsonContainers = document.querySelectorAll(".json-container"); Array.prototype.forEach.call(jsonContainers, function(jsonContainer) { jsonContainer.innerHTML = prettyPrintJson.toHtml(JSON.parse(jsonContainer.innerText)); }); // Open the tab specified with an anchor in the URL. const hash = window.location.hash; const tabButton = document.querySelector(`button[data-bs-target="${hash}"]`); if (tabButton) { const tab = new bootstrap.Tab(tabButton); tab.show(); selected_tab = tabButton.getAttribute("id"); switch (selected_tab) { case "comments-tab": loadComments(); break; case "bundles-tab": loadBundles(); break; case "sightings-tab": loadSightings(); break; default: openTabById("#related"); break; } } else { openTabById("#related"); } // Update the URL when a tab is clicked, for consistent behavior document.querySelectorAll('.nav-link[data-bs-toggle="tab"]').forEach(tabLink => { tabLink.addEventListener("shown.bs.tab", function(event) { history.replaceState(null, null, event.target.getAttribute("href")); }); }); // Retrieve the JSON schema for the comment and initialize the editor. fetch("/static/schemas/CIRCL/Security_Advisory_Comment.json") .then(response => response.json()) .then(result => { // initialize the JSON editor SCHEMA = result; initialize_editor(SCHEMA, {}); }).catch((error) => { console.error('Error:', error); }); // Retrieve the EPSS score epss_score_elem = document.getElementById("epss-score"); if (epss_score_elem) { fetch("/api/epss/var-202006-1825") .then(response => response.json()) .then(result => { if (result.total >= 1) { document.getElementById("epss-score").parentNode.parentNode.removeAttribute("hidden"); document.getElementById("epss-score").innerText = (result.data[0].epss * 100).toFixed(2) + "%"; document.getElementById("epss-percentile").innerText = "(" + formatNumberWithPrecision(Number(result.data[0].percentile), 5) + ")"; } else { document.getElementById("epss-score").parentNode.parentNode.remove(); } }).catch((error) => { console.error('Error:', error); document.getElementById("epss-score").parentNode.parentNode.remove(); }); } }) // End DOMContentLoaded listener if (document.getElementById("deleteVulnerability")) { document.getElementById("deleteVulnerability").onclick = function(event) { if (!confirm('You are going to delete the vulnerability. Are you sure?')) { return; } var csrf_token = "IjhiOTk4YjRlYWUxZTkzYWQ0MTFhYTQyYmQwNjYwNWYzZjNkMzRlOWUi.Zy_rGw.LOq3odDMeFjKXvCGLaBsBnF-PPY"; fetch("/vulnerability/var-202006-1825", { method: "DELETE", headers: { 'Content-Type': 'application/json', 'X-CSRFToken': csrf_token } }) .then(response => { if (!response.ok) { console.log(response); } else { window.location="/recent"; } }) .catch((error) => { console.log(error); }); }; } function addSighting(originalEvent) { const clickedItem = originalEvent.target; var csrf_token = "IjhiOTk4YjRlYWUxZTkzYWQ0MTFhYTQyYmQwNjYwNWYzZjNkMzRlOWUi.Zy_rGw.LOq3odDMeFjKXvCGLaBsBnF-PPY"; var json = {}; json["type"] = clickedItem.getAttribute("value"); json["vulnerability"] = "var-202006-1825"; data = JSON.stringify(json); fetch("/api/sighting/", { method: "POST", headers: { 'Content-Type': 'application/json', 'X-CSRFToken': csrf_token }, body: data }) .then(res => { if (!res.ok) { res.json().then(json => { document.getElementById("modal-error-text").innerText = "Problem when saving sighting."; var modal = new bootstrap.Modal(document.getElementById('modalError'), {}); modal.show(); }); } else { loadSightings(); showToast("Success", "Sighting added successfully!"); openTabById("#sightings"); } }) .catch((error) => { console.log(error); }); }; sightings_list = document.getElementById("sighting-list"); if (sightings_list) { document.getElementById("sighting-list").addEventListener("click", function(event) { showModal('New sighting', "Are you sure you want to add this sighting?", addSighting, event); }); } document.getElementById("savecomment").addEventListener("click", function(event) { var csrf_token = "IjhiOTk4YjRlYWUxZTkzYWQ0MTFhYTQyYmQwNjYwNWYzZjNkMzRlOWUi.Zy_rGw.LOq3odDMeFjKXvCGLaBsBnF-PPY"; var json = jsoneditor.getValue(); json["description"] = easyMDE.value(); json["vulnerability"] = "var-202006-1825"; data = JSON.stringify(json); fetch("/api/comment/", { method: "POST", headers: { 'Content-Type': 'application/json', 'X-CSRFToken': csrf_token }, body: data }) .then(res => { if (!res.ok) { res.json().then(json => { document.getElementById("modal-error-text").innerText = json['message']; var modal = new bootstrap.Modal(document.getElementById('modalError'), {}); modal.show(); }); } else { // reinitializes the form window.jsoneditor.setValue({}); easyMDE.value(""); // collapse the view which is containing the form new bootstrap.Collapse(document.getElementById("newCommentvar-202006-1825")); // load the updated list of comments loadComments(); showToast("Success", "Comment added successfully!"); } }) .catch((error) => { console.log(error); }); }); function copyToClipboard(vuln_id) { const copyText = document.getElementById("container"+vuln_id).textContent; const textArea = document.createElement('textarea'); textArea.textContent = copyText; navigator.clipboard.writeText(textArea.value).then(function() { /* clipboard successfully set */ showToast("Success", "Content copied to your clipboard."); }, function() { /* clipboard write failed */ }); } function loadComments() { COMMENTS = {}; var DateTime = luxon.DateTime; var converter = new showdown.Converter({tables: true, moreStyling: true}); var commentTemplate = _.template( '<div class="card markdown-description">' + '<div class="card-body">' + '<h5 class="card-title"><a href="/comment/<%= uuid %>"><%= title %></a></h5>' + '<p class="card-title">' + '<% _.forEach(tags, function(tag) ' + '{ %><span class="badge bg-primary"><a class="link-light" href="/comments/?meta=%5B%7B%22tags%22%3A%20%5B%22<%= tag %>%22%5D%7D%5D"><%= tag %></a></span> <% }); %>' + '</p>' + '<h6 class="card-subtitle mb-2 text-body-secondary"><%= timestamp %> by <a href="/user/<%= author_login %>"><%= author_name %></a></h6>' + '<p class="card-text"><%= description %></p>' + '<div class="btn-group" role="group">' + '<a role="button" class="btn btn-primary" data-bs-toggle="collapse" data-bs-target="#collapseJsonComment<%= uuid %>" aria-expanded="false" aria-controls="collapseJsonComment<%= uuid %>">JSON</a>' + '</div>' + '<div class="collapse" id="collapseJsonComment<%= uuid %>"><br /><pre class="json-container"><%= comment %></pre></div>' + '</div></div>' ); fetch("/api/comment/?vuln_id=var-202006-1825") .then(response => response.json()) .then(result => { document.getElementById("list-comments").innerHTML = ""; document.getElementById("nb-comments").innerText = result.metadata.count; if (result.metadata.count == 0) { document.getElementById("list-comments").innerHTML = "<p>No comment for this vulnerability. Browse <a href='/comments'>all the comments</a>.</p>"; } result.data .sort(function (a, b) { return new Date(b.timestamp) - new Date(a.timestamp); }) .map(function (comment) { var author = comment.author delete comment.author; if (Array.isArray(comment["meta"]) && comment["meta"].length > 0) { var itemWithTags = comment.meta.find(item => item.tags); var tags = itemWithTags ? itemWithTags.tags : []; } else { var tags = []; } var cardHTML = commentTemplate({ 'comment': JSON.stringify(comment, null, 2), 'uuid': comment.uuid, 'title': comment.title, 'description': converter.makeHtml(comment.description), 'timestamp': DateTime.fromISO(comment.timestamp).toRelative(), 'author_name': author.name, 'author_login': author.login, 'tags': tags }); COMMENTS[comment.uuid] = comment; var element = document.createElement("div"); var element_br = document.createElement("br"); element.innerHTML = cardHTML; document.getElementById("list-comments").appendChild(element.firstChild); document.getElementById("list-comments").append(element_br); }) }) .then(_ => { setTimeout(() => { formatMarkdownOutput(); if (easyMDE === null) { easyMDE = new EasyMDE({ element: document.getElementById('root[description]'), autoRefresh: { delay: 300 }, toolbarButtonClassPrefix: "mde", toolbar: [ "bold", "italic", "heading", "|", "quote", "code", "table", "unordered-list", "ordered-list", "|", "link", "image", "|", "preview", "side-by-side", "fullscreen", "|" ] }); } }, 0); // 0ms delay still allows the browser to update the DOM return COMMENTS; }) .catch((error) => { console.error('Error:', error); }); } function initialize_editor(schema, json_object) { // Default starting schema if(!schema) { schema = {} } // Divs/textareas on the page var $schema = schema; var $output = document.getElementById('output'); var $editor = document.getElementById('editor'); // Default theme JSONEditor.defaults.options.theme = 'bootstrap5'; window.startval = json_object; var jsoneditor; var reload = function(keep_value) { var startval = (jsoneditor && keep_value)? jsoneditor.getValue() : window.startval; window.startval = undefined; if (jsoneditor) { jsoneditor.destroy(); } jsoneditor = new JSONEditor($editor, { // The schema for the editor schema: schema, // Remove collapse button disable_collapse: true, // Seed the form with a starting value startval: startval, // Enable fetching schemas via ajax ajax: true, // Disable additional properties no_additional_properties: false, // Require all properties by default required_by_default: true, show_opt_in: false, disable_edit_json: true, theme: "bootstrap5", object_background: document.documentElement.getAttribute("data-bs-theme") == "dark" ? "bg-dark" : "bg-light", }); window.jsoneditor = jsoneditor; // When the value of the editor changes, update the JSON output and validation message jsoneditor.on('change',function() { var json = jsoneditor.getValue(); }); }; // Start the schema and output textareas with initial values $schema.value = JSON.stringify(schema, null, 2); reload(); }; function loadBundles() { var DateTime = luxon.DateTime; var converter = new showdown.Converter({tables: true, moreStyling: true}); var bundleTemplate = _.template( '<div class="card markdown-description">' + '<div class="card-body">' + '<h5 class="card-title"><a href="/bundle/<%= uuid %>"><%= name %></a></h5>' + '<h6 class="card-subtitle mb-2 text-body-secondary"><%= timestamp %> by <a href="/user/<%= author_login %>"><%= author_name %></a></h6>' + '<p class="card-text"><%= description %></p>' + '<h5 class="card-text">Related vulnerabilities</h5>' + '<div class="card" >' + '<ul class="list-group list-group-flush">' + '<% _.forEach(related_vulnerabilities, function(vuln) ' + '{ %><li class="list-group-item"><a href="/vuln/<%= vuln %>"><%- vuln %></a></li><% }); %>' + '</ul>' + '</div>' + '</div>'); fetch("/api/bundle/?vuln_id=var-202006-1825") .then(response => response.json()) .then(result => { document.getElementById("list-bundles").innerHTML = "<p>Bundles referring to this vulnerability.</p>"; if (result.metadata.count == 0) { document.getElementById("list-bundles").innerHTML = "<p>This vulnerability is not linked to any bundle.</p>"; } result.data .sort(function (a, b) { return new Date(b.updated_at) - new Date(a.updated_at); }) .map(function (bundle) { var author = bundle.author delete bundle.author; var cardHTML = bundleTemplate({ 'uuid': bundle.uuid, 'name': bundle.name, 'description': converter.makeHtml(bundle.description), 'timestamp': DateTime.fromISO(bundle.timestamp).toRelative(), 'related_vulnerabilities': bundle.related_vulnerabilities.map(v => v.toLowerCase()), 'author_name': author.name, 'author_login': author.login }); var element = document.createElement("div"); var element_br = document.createElement("br"); element.innerHTML = cardHTML; document.getElementById("list-bundles").appendChild(element.firstChild); document.getElementById("list-bundles").append(element_br); }) }) .then(_ => { setTimeout(() => { formatMarkdownOutput(); }, 0); // 0ms delay still allows the browser to update the DOM }) .catch((error) => { console.error('Error:', error); }); }; function loadSightings() { fetch("/api/sighting/?vuln_id=var-202006-1825") .then(response => response.json()) .then(result => { document.getElementById("nb-sightings").innerText = result.metadata.count; if (result.metadata.count == 0) { document.getElementById("sightings-pane-top").style.display = 'none'; document.getElementById("chart-sightings").innerHTML = "<p>No sightings for this vulnerability.</p>"; document.getElementById("sightingsChartContainer").style.display = 'none'; document.getElementById("chart-detailed-legend").style.display = 'none'; } else{ drawBarChart(result.data); document.getElementById("sightings-pane-top").style.display = 'block'; document.getElementById("chart-sightings").innerHTML = "<h3>Evolution of sightings over time.</h3>"; document.getElementById("sightingsChartContainer").style.display = 'block'; document.getElementById("chart-detailed-legend").style.display = 'block'; } }) .catch((error) => { console.error('Error:', error); }); }; document.getElementById("btnThemeSwitch").addEventListener("click",()=>{ if (document.documentElement.getAttribute("data-bs-theme") == "dark") { Array.from(document.getElementsByClassName("card")).forEach(container => { container.classList.remove("bg-dark"); container.classList.add("bg-light"); }); } else { Array.from(document.getElementsByClassName("card")).forEach(container => { container.classList.remove("bg-light"); container.classList.add("bg-dark"); }); } }) </script> </div> </main> <footer class="footer bg-light"> <div class="container"> <div class="row"> <div class="col d-none d-md-block"> <div class="d-flex justify-content-start"> <span class="text-muted"><a href="https://www.circl.lu" rel="noreferrer" target="_blank">Computer Incident Response Center Luxembourg (CIRCL)</a></span> </div> </div> <div class="col"> <div class="d-flex justify-content-end"> <a class="text-end" href="https://vulnerability.circl.lu/dumps/">Dumps</a>   <a class="text-end" href="/users/">Contributors</a>   <a class="text-end" href="/doc">API</a>   <a class="text-end" href="/about">About</a>   </div> </div> </div> </div> </footer> <!-- Optional JavaScript --> <script src="/bootstrap/static/umd/popper.min.js"></script> <script src="/bootstrap/static/js/bootstrap.min.js"></script> <script> if (getCookie("theme") == 'light') { document.getElementById('btnThemeSwitch').innerHTML = '<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" class="bi bi-toggle-off" viewBox="0 0 16 16"><path d="M11 4a4 4 0 0 1 0 8H8a5 5 0 0 0 2-4 5 5 0 0 0-2-4zm-6 8a4 4 0 1 1 0-8 4 4 0 0 1 0 8M0 8a5 5 0 0 0 5 5h6a5 5 0 0 0 0-10H5a5 5 0 0 0-5 5"/></svg>'; document.getElementById('btnThemeSwitch').setAttribute('title', 'Switch to dark theme.'); } else { document.getElementById('btnThemeSwitch').innerHTML = '<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" class="bi bi-toggle-on" viewBox="0 0 16 16"><path d="M5 3a5 5 0 0 0 0 10h6a5 5 0 0 0 0-10zm6 9a4 4 0 1 1 0-8 4 4 0 0 1 0 8"/></svg>'; document.getElementById('btnThemeSwitch').setAttribute('title', 'Switch to light theme.'); } document.addEventListener("DOMContentLoaded", function() { document.getElementById('btnThemeSwitch').addEventListener('click',()=>{ if (document.documentElement.getAttribute('data-bs-theme') == 'dark') { document.documentElement.setAttribute('data-bs-theme','light') document.getElementById('btnThemeSwitch').innerHTML = '<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" class="bi bi-toggle-off" viewBox="0 0 16 16"><path d="M11 4a4 4 0 0 1 0 8H8a5 5 0 0 0 2-4 5 5 0 0 0-2-4zm-6 8a4 4 0 1 1 0-8 4 4 0 0 1 0 8M0 8a5 5 0 0 0 5 5h6a5 5 0 0 0 0-10H5a5 5 0 0 0-5 5"/></svg>'; document.getElementById('btnThemeSwitch').setAttribute('title', 'Switch to dark theme.'); document.cookie = "theme=light; path=/; SameSite=Strict"; } else { document.documentElement.setAttribute('data-bs-theme','dark'); document.getElementById('btnThemeSwitch').innerHTML = '<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" class="bi bi-toggle-on" viewBox="0 0 16 16"><path d="M5 3a5 5 0 0 0 0 10h6a5 5 0 0 0 0-10zm6 9a4 4 0 1 1 0-8 4 4 0 0 1 0 8"/></svg>'; document.getElementById('btnThemeSwitch').setAttribute('title', 'Switch to light theme.'); document.cookie = "theme=dark; path=/; SameSite=Strict"; } }) }); </script> </body> </html>