VARIoT IoT vulnerabilities database
| VAR-201808-0379 | CVE-2018-14793 | Emerson Electric DeltaV Stack Buffer Overflow Vulnerability |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
DeltaV Versions 11.3.1, 12.3.1, 13.3.0, 13.3.1, and R5 is vulnerable to a buffer overflow exploit through an open communication port to allow arbitrary code execution. DeltaV Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Emerson Electric DeltaV is a digital automation system from Emerson Electric. The system provides I/O on-demand configuration, embedded intelligent control and alarm panel functions. A stack buffer overflow vulnerability exists in Emerson Electric Deltav. Emerson DeltaV is prone to the following multiple security vulnerabilities:
1. An arbitrary-code-execution vulnerability
2. Multiple security-bypass vulnerabilities
3. Failed exploit attempts will likely result in denial of service conditions
| VAR-201808-0381 | CVE-2018-14797 | Emerson Electric Deltav Uncontrolled Search Path Element Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Emerson DeltaV DCS versions 11.3.1, 12.3.1, 13.3.0, 13.3.1, R5 allow a specially crafted DLL file to be placed in the search path and loaded as an internal and valid DLL, which may allow arbitrary code execution. Emerson DeltaV DCS Contains a vulnerability related to uncontrolled search path elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Emerson Electric DeltaV is a digital automation system from Emerson Electric. The system provides I/O on-demand configuration, embedded intelligent control and alarm panel functions. There is a security hole in Emerson Electric Deltav. An arbitrary-code-execution vulnerability
2. Multiple security-bypass vulnerabilities
3. A stack-based buffer-overflow vulnerability
Attackers can exploit these issues to execute arbitrary code and bypass certain security restrictions, perform unauthorized actions, or gain sensitive information within the context of the affected system. Failed exploit attempts will likely result in denial of service conditions
| VAR-201808-0077 | CVE-2017-16744 | Tridium Niagara AX Framework and Niagara 4 Framework Path Traversal Vulnerability |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
A path traversal vulnerability in Tridium Niagara AX Versions 3.8 and prior and Niagara 4 systems Versions 4.4 and prior installed on Microsoft Windows Systems can be exploited by leveraging valid platform (administrator) credentials. Tridium Niagara AX Framework and Niagara 4 Framework are both IoT business application frameworks from Tridium. The vulnerability stems from the program's insufficient filtering of user-submitted input. A remote attacker could use this vulnerability to obtain sensitive information with valid platform administrator credentials. Tridium Niagara is prone to directory-traversal vulnerability and authentication-bypass vulnerability because the application fails to sufficiently sanitize user-supplied input
| VAR-201808-0129 | CVE-2017-16748 | Niagara Authentication vulnerabilities in the platform |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An attacker can log into the local Niagara platform (Niagara AX Framework Versions 3.8 and prior or Niagara 4 Framework Versions 4.4 and prior) using a disabled account name and a blank password, granting the attacker administrator access to the Niagara system. Niagara The platform contains authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Tridium Niagara AX Framework and Niagara 4 Framework are both IoT business application frameworks from Tridium. Tridium Niagara is prone to directory-traversal vulnerability and authentication-bypass vulnerability because the application fails to sufficiently sanitize user-supplied input.
Exploiting these issues may allow an attacker to bypass authentication and perform unauthorized actions on the affected application, and to obtain sensitive information that could aid in further attacks
| VAR-201808-0694 | CVE-2018-10917 | pulp Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
pulp 2.16.x and possibly older is vulnerable to an improper path parsing. A malicious user or a malicious iso feed repository can write to locations accessible to the 'apache' user. This may lead to overwrite of published content on other iso repositories. pulp Contains vulnerabilities related to authorization, permissions, and access control.Information may be tampered with. Pulp is a free and open source repository platform for managing content. The platform supports pushing the contents of software packages to consumers.
There is an arbitrary file coverage vulnerability in Pulp 2.16.x. The vulnerability stems from the program's failure to correctly resolve the path. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Satellite 6.5 Release
Advisory ID: RHSA-2019:1222-01
Product: Red Hat Satellite 6
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1222
Issue date: 2019-05-14
CVE Names: CVE-2016-6346 CVE-2018-10917 CVE-2018-14664
CVE-2018-16861 CVE-2018-16887 CVE-2019-3891
=====================================================================
1. Summary:
Red Hat Satellite 6.5 for RHEL 7 is now available containing security
fixes, bug fixes, and enhancements.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Satellite 6.5 - noarch, x86_64
Red Hat Satellite Capsule 6.5 - noarch, x86_64
3. Description:
Red Hat Satellite is a systems management tool for Linux-based
infrastructure.
It allows for provisioning, remote management, and monitoring of multiple
Linux deployments with a single centralized tool.
Security Fix(es):
* RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of
service attack (CVE-2016-6346)
* pulp: Improper path parsing leads to overwriting of iso repositories
(CVE-2018-10917)
* foreman: Persisted XSS on all pages that use breadcrumbs (CVE-2018-14664)
* foreman: stored XSS in success notification after entity creation
(CVE-2018-16861)
* katello: stored XSS in subscriptions and repositories pages
(CVE-2018-16887)
* candlepin: credentials exposure through log files (CVE-2019-3891)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
This update also fixes several bugs and adds various enhancements.
Documentation for these changes is available from the Release Notes
document linked to in the References section.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1143987 - [RFE] Hammer task missing info subcommand
1155811 - [RFE] Support Infoblox IPAM appliances as subnet / domain providers
1170174 - [RFE] Satellite 6 product FIPS mode Compliance
1232475 - [RFE] generate a report of Specific fields in the Content Hosts -> Details section
1233431 - [RFE] CSR should not be mandatory when installing Satellite Server or generating Capsule certificate bundle with custom ssl certificates
1267766 - capsule installer generates invalid dhcp.conf for non local networks
1305040 - [RFE] User control of Capsule sync policy and other traffic from Satellite to capsule
1335621 - [RFE] Ignore warnings when syncing repos and SRC packages are missing
1339743 - [RFE] Search OpenSCAP reports using host collections
1356126 - [RFE] Implement host disassociation command
1372120 - CVE-2016-6346 RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack
1396974 - VM orchestration should provide better error reporting and logging
1397590 - [RFE] “Unregister Host” needs a clear instruction for options under it
1402134 - [RFE] Need Hammer CLI commands to do the HostGroup / Environments associations with Provisioning Template.
1408782 - [RFE] virt-who need to make sure there is only one entry in satellite content host for the same hypervisor when configure hypervisor_id for uuid or hostname or hwuuid
1418026 - goferd errors with "[...] Condition('amqp:resource-limit-exceeded', 'local-idle-timeout expired')" when pushing Errata from Satellite
1438030 - [RFE] Feature to use the 'dzdo' as the "remote_execution_effective_user_method" to run the remote commands with a non-root user.
1445070 - katello models not working with foreman-hooks plugin
1447963 - Switching installation media (or source) back and forth corrupts initdamdisk/kernel
1449290 - Global PXE hostgroups menu entries missing when Installation Media is set to Synced Content
1451277 - [RFE] Support storing and presenting Vendor field in package API
1458898 - [RFE] Pre-canned Virt-who roles do not have a description
1468557 - Discovery KExec does not work with Atomic Host 7
1470987 - discovery settings are named differently in hammer than in UI
1476379 - [RFE] Add randomness to SCAP client runs to avoid DDOS of the server
1476938 - katello-change-hostname should check for enough ram before making changes
1481315 - Cloud-init integration with ovirt supports just a subset of cloud-init keywords
1488235 - Email subject prefix accepts long strings
1488475 - Specifying wrong content source id for host or hostgroup via hammer throws SQL error
1489252 - [RFE] Add a note to ignore "WARNING" message when foreman_scap_client command executed manually
1489379 - Non admins users should be able to add Organization / Locations to themselves
1489486 - API hosts/X interfaces array info inconsistent return of interface flags
1492848 - Roles cleared when error detected in User creation dialog
1495308 - [RFE] Feature to add the "--fetch-remote-resources" to the foreman_scap_client.
1500972 - traceback when deleting organization: javax.persistence.RollbackException: Error while committing the transaction
1501683 - Pulp repository sync step not skipped automatically when fail with "Abnormal termination".
1501927 - RHV compute resource screen shows DataTables warning invalid json response
1502752 - refresh manifest - proxy password with special character
1508169 - incremental update of content-view added errata RHSA-2017:2998 packages and also added some other packages as well , which is not present in errata
1514013 - Atomic Host 7.4.2 deployed from Satellite 6.2.12 cannot be upgraded out of the box
1515082 - Rerunning a ReX job with JobTemplate not in current Org/Loc shows undefined method `input_values' for nil:NilClass
1515671 - [RFE] Extend "Service Action - SSH Default" job template to be able to enable and disable services
1516803 - uploading a package to custom repo does not trigger sync of Capsule in Library LE
1517084 - Duplicate hammer options to view available compute-resource image
1517706 - Could not able to see filters of any role with org_admin user
1519779 - puppet classes info doesn't consider puppet environments parameter
1523147 - Templates tab in Hosts>Operating Systems have confusing and misleading asterisks
1523433 - Celery worker consumes large number of memory when regenerating applicability for a consumer that binds to many repositories with many errata.
1523940 - [RFE] [sat 6.3] k5login should support setting selinux context and owner attributes
1528524 - [RFE][Satellite 6.3 Beta] Need a way to split pulp_data.tar into smaller files
1532675 - incorrectly rendered empty lines in commands output on "Detail of Commands run" page
1534608 - [RFE] Searching for all instances of packages in all repos
1534967 - reboot ReX fails with "Runner error: NameError - uninitialized constant ForemanRemoteExecutionCore::ScriptRunner::MAX_PROCESS_RETRIES"
1537266 - [RFE] Add option to lock template upon import using foreman_templates plugin
1538688 - 'hammer ping' can erroneously say foreman-tasks is down when its just busy
1541393 - Improve help and error messages when adding CVs to a CCV
1545364 - Cloned Satellite improperly handles Pulp event_notifier URL and db entries
1547821 - while creating new hosts RHEVM assocation of compute profile doesn't show correct network for the Cluster
1549088 - Various Action:: Tasks types stop with warning: "no such file or directory" for file in foreman cache hierarchy
1549761 - [RFE] Flag to avoid deletion from compute resource of an host associated when it's removed from satellite
1552142 - Installation on FIPS enabled rhel7 fails with '/usr/bin/pulp-gen-ca-certificate' returned 1 instead of one of [0]
1552159 - Installation on FIPS enabled rhel7 failing with with certutil issues
1552200 - Upgrade to 6.3 failed with "Could not find dependency Class[Puppet::Server::Install] for File[/etc/pki/katello/puppet]"
1553105 - composite_content_view_ids field of a content_view_version is always empty
1554421 - candlepin takes >2m on /candlepin/consumers/UUID/guests query
1557436 - Unnecessary requirement of CSR when running --certs-update-server
1560978 - hammer host list --thin removed in Red Hat Satellite 6.3
1561249 - Several JS errors visiting repo discovery page
1561691 - Creating user with hammer having authentication source LDAP/AD should not ask for password
1561990 - UI: After add the CV on the CCV, Content View still on the list to add
1563529 - Root password hash in Operating System written in capital letters
1564867 - update bootstrap.py to works also on RHEL5
1565903 - ansible_provisioning_callback snippet does not set executable permission for '/root/ansible_provisioning_call.sh'
1566000 - KVM hypervisor profile does not contain guests running on it in the webui and creates duplicate profile with virt-who-* prefix
1566092 - using a filter for bastion layout/partials/table.html does not update the selected counts
1566166 - unable to register client to freshly installed capsule on fresh katello
1566540 - javascript error on new gpg key page
1566543 - [Satellite6] cd-rom settings in compute profile for vmware compute resource never showed as enabled
1568063 - [RFE] Hammer Job Cancellation
1568700 - Sat6.3.1 WEBUI Documentation link is unaccessible
1568838 - [RFE] Handle multiple capsules' ssh keys
1568848 - [RFE] Handle multiple capsules' ssh keys
1569395 - [Satellite 6] Adding search for lifecycle_environment or lifecycle_environment_id in role host fiter with permission view_hosts does not construct SQL querry when API is used
1571889 - [RFE] Allow override of tftpd.map file location and/or contents during installer upgrades
1571913 - Clean up EL6 and service-wait from Katello scripts
1574257 - katello-remove does not completely remove data on mounted filesystems
1575766 - Org/Loc Button ordering not the same when moved after window resize
1577014 - Missing "-name" option on "openssl pkcs12" command may cause incorrect nickname added to the katello nssdb
1577966 - In partition tables, problem with snippet check-box together with operating system
1578021 - [RFE] enable high availability when using ovirt compute resource
1578022 - [RFE] As an API user, I should be able to compare the Packages of a Content View Version to the Packages in Library.
1578470 - [RFE] allow configuration of helloMaxAge and helloInterval
1579876 - MMV stats disappear rendering pmlogger unable to restart
1582210 - Create RHEV host: Listing Images produces traceback when no images on CR
1582293 - Unable to unset proxy settings once set
1582484 - [RFE] As an API user, I should be able to compare the Errata of a Content View Version to the installable Errata in Library.
1583318 - hammer recurring-logic list command does not accept options --per-page or --page but suggests those option
1584162 - Error: No such repository with name <MISSING>
1585410 - some tasks in Monitor -> Tasks have "N/A" in a first column
1586271 - SSL 64-bit Block Size Cipher Suites Supported (SWEET32)
1586336 - The checksum type configuration of yum distributor should always fallback to the scratchped if it is not explicitly set to use a particular checksum type by the user.
1589515 - [RFE] Add kernel version to the hosts inventory report
1589625 - no unique constraint to the name column on the roles table
1589736 - Can not delete organization, if virt-who is configured
1591731 - [RFE] Audit discovery of new host and provision actions
1592570 - [RFE]: Ship Ansible Playbook for bootstrap.py as part of the katello-client-bootstrap package.
1593253 - installer missing --upgrade-mongo-storage option
1593647 - EC2 CR create with invalid data -> uninitialized constant ComputeResourcesController::OVIRT
1594289 - [RFE] Dashboard: Show a list of hosts with an expired token
1594882 - [RFE] Enable configuration setting to turn on foreman tasks cleanup logging
1595784 - Missing hammer command for BMC boot API
1595924 - production.log filled with too many no route errors for rhsm/consumer URLs for accessible_content calls
1596372 - [RFE] Dependency calculations in Satellite should handle rich dependencies
1596504 - hammer hostgroup info --output json returns json including non unique keys
1596885 - Manifest upload UI status bleeds into other orgs
1597035 - [RFE] RH Repos Content type filter default text could be better
1597089 - [RFE] Subscriptions "Export CSV" functionality should include/offer org in filename
1597208 - Partition table not set for host when using hammer cli, provisioning method bootdisk and host group
1597968 - Provisioning a new host with bond interface without domain and subnet failed with undefined method `vlanid' for nil:NilClass
1598928 - CVE-2018-10917 pulp: Improper path parsing leads to overwriting of iso repositories
1599303 - after new host group is created search doesn't work properly, search menu opens the create host group
1600095 - Non admin user is unable to see the audits for katello and taxable resources created by admin using Any Location context
1600450 - command "foreman-rake reports:expire" does not delete reports
1600710 - Breadcrumb switcher in Host Facts page is missing
1601155 - Templates get rendered when visiting job invocation details, leading to slow UI
1601762 - accessing subscription.rhn.redhat.com unexpectedly
1602110 - The number of MAX_RETRIES exceeded: PersistenceError in executor: terminating when running tasks are removed from database
1602367 - Hammer/API - wrong error message
1603185 - RHV4: Unable to do network provision host on RHV, auto selects blank template
1603219 - '--owner' key/value not recognized anymore with 'hammer host create' (Satellite 6.3.2)
1606236 - Subscription info can show many provided products
1606369 - [RFE] De-emphasize yStreams in the repos page
1607207 - [RFE] Job_invocation reset API could support its output being formatted in clean JSON by providing an API endpoint
1607845 - Monitor Tasks export is empty
1608400 - [File Repository] - All Repositories are shown for file content instead of contained Library Repositories
1609567 - Hostgroup can save without 'Partition table' even 'Operating system' selected
1612921 - Getting error "Oops, we're sorry but something went wrong undefined method `port' for #<RbVmomi::VIM::VirtualEthernetCardLegacyNetworkBackingInfo:0x00007f61dd1f2750>" while associating VMs to compute resource
1612959 - Per-page setting does not work in RPM and repo listings
1613304 - hammer subnet create do not honor the default organization and location
1613679 - VMWare SCSI PV driver not present in FDI initramdisk
1614768 - [RFE] API Support for easier use of Smart-Class Param Overrides
1614927 - [RFE] Provide the ability to delete a lifecycle environment from the middle of an existing path
1615800 - Export list of content host do not honour search filter
1616153 - [RFE] Support of modular errata and its applicability
1618485 - Subscription details doesn't show in web UI
1618811 - boostrap.py fails when registering nodes with org_environment contentAccessMode
1618868 - Breadcrumb bar for smart class parameter doesn't contain name.
1618872 - Breadcrumb bar on OS page doesn't show name of OS
1619284 - [Sync Plan] - Buttons are getting disabled after putting duplicate Sync Plan Name
1620179 - no way to list cluster IDs inside compute resource
1622802 - Running Ansible role fails with: Actions::ProxyAction::ProxyActionMissing: Proxy task gone missing from the capsule
1623277 - katello-host-tools triggers package profile update at install-time, potentially causing issues at scale.
1623937 - Extra logging in Satellite 6.4 Production logs
1624401 - Discovery templates are not assigned to default org
1624416 - Hammer command with content view version --order is not working as expected.
1624479 - Show Repo Label on Enabled repos results
1625109 - katello-debug.sh still calls katello-service status rather than foreman-maintain
1625174 - Two meanings of "Enabled" on new Subscription tab might cause confusion
1625649 - Yum plugins are loaded multiple times after updating the host to the latest katello-agent packages
1625965 - RHEL8 provisioning requires more than one enabled repository
1626113 - Some default values not shown in Settings page tool tips
1626114 - Header logo is not branded in upstream nightly + foreman_theme_satellite
1626119 - [RFE] Non-default settings should be bolded.
1626138 - When Setting has a "empty" default, the tool tip shows an empty string.
1626178 - Validation failed: Cannot set auto publish to a non-composite content view
1626494 - New Repositories page needs a clear option for the search bar.
1626956 - Internal Server error when matcher #23 is created for smart class parameter
1627640 - recurring jobs ignore organization context of host search
1628488 - Incorrect spelling of an operating systems list im provisioning cloud instances
1628505 - Ansible processes might get killed when logrotate runs for smart_proxy_dynflow_core
1628544 - ActiveRecord::RecordInvalid error when syncing RHEL 7 s390x kickstart repo
1628561 - hammer job-invocation output returns ISE on providing invalid invocation id
1628638 - The termination procedure after memory threshold exceeded can get stuck, waiting infinitely for some events to occur
1629564 - [RFE] Able to search Puppet parameters alphabetically
1631019 - [RFE] Satellite 6.x bootstrap is too aggressive and shouldn't run 'yum clean all'
1631299 - [RFE] bootstrap.py should support python 3
1632111 - repositories-validate check don't consider custom organization/activation key
1632626 - only "katello" and "satellite" rpms require java-1.7.0-openjdk*, candlepin requires java-1.8.0
1633236 - changing "per page" on Monitor -> Jobs does not have any effect
1633347 - Virt-who configs are tied to organization, but deploy command does not include org ID.
1633360 - Allow admin to opt-out from the Brute-force attack protection
1633937 - Manifest refresh fails with error "Failed to import archive"
1635364 - Failed to upload to Foreman, saving in spool. Failed with: Net::ReadTimeout
1635540 - Running a `sync_task` while the tasks service gets restarted might lead to passenger process hanging forever
1635680 - 6.4 snap25 bug joining a realm on kickstart
1636052 - "404 Not Found" when querying images without OS selected in Create Host dialogue
1636446 - [RFE] New Audit UI as per new UX design
1637042 - undefined method `[]' for nil:NilClass when more virt-who reports are sent a short time after other
1637431 - Branding changes after layout change
1637436 - The default Organization Admin role has double (Miscellaneous) filter
1637883 - Improve help text for RHV attributes, where ever user needs to pass ID's
1637955 - Satellite fails to create VMs on RHV system based on a template.
1638130 - CVE-2018-14664 foreman: Persisted XSS on all pages that use breadcrumbs
1638223 - Capsule scenario should enable REX by default
1638781 - Unable to create Content Credential bookmark via WebUI
1638866 - [RFE] Shorten name of "subscription-manager" zypper plugin to rhsm for readability.
1638906 - Update Foreman Hammer CLI VMware helpers
1639352 - When deleting content views, UI indicates wrong number of environments
1639406 - [RFE] Add support for sha512
1639676 - Unable to persistently set redirect_host for lazy sync to empty value
1640628 - Prevent multiple instances of /usr/bin/smart-proxy-openscap-send
1640644 - [RFE] Add switch to hammer CLI to disable the defaults
1640686 - While upgrading satellite from 6.3->6.4, satellite-installer does not perform remove_legacy_mongo step in some situations which results in error
1641017 - Upgrade to Satellite 6.4 is failning on script 20180516103339_update_idm_params.rb
1641266 - Wrong counts of success/fail/pending tasks on Bulk actions
1641785 - Upgrade from Satellite 6.3.4 to 6.4.0 fails in "Upgrade Step: clear_checksum_type..."
1641864 - Missing module errors after upgrading to gofer-2.12.1-1
1642088 - Upgrade from 6.3.4 to 6.4 is failing on foreman-rake katello:import_subscriptions
1642496 - improper command given in output of "katello-certs-check"
1642549 - Content Host filter is showing only 1 page of result
1643130 - Satellite Tools repository/module for RHEL8
1643432 - Subscription Status Widget showing incorrect information on Dashboard
1643740 - [6.5] No SCAP content profiles in default scap-contents
1643818 - Cannot update GPG Key on created product
1643871 - qdrouterd listens on 127.0.0.1 only
1644127 - Adding subscription shows notification with html tags
1644144 - katello-certs-check output shows foreman-installer/foreman-proxy-certs-generate
1644189 - Importing ansible role gives wrong number of arguments (given 1, expected 0)
1644191 - blue flashing(upstream) page appears when login page is visited.
1644192 - Test connection on compute resource shows notification with html tags
1644208 - Dependency issue while installing katello-agent on RHEL6 and RHEL5
1644354 - [RHEL 7.6] Satellite Update failed due to dependency issue Package: ant-junit-1.9.2-9.el7.noarch Requires: ant = 1.9.2-9.el7
1644571 - [RFE] Add Red Hat Satellite Maintenance 6 in recommended repositories
1644586 - System admin role cannot create new organizations
1644593 - Content View Version export breaks while exporting to relative path
1644596 - [Tracker][QE] Content View Export Import
1644618 - Repo sync fails on FIPS enabled machine
1644823 - [RFE] allow import/export of composite content views
1645017 - Atomic repos sync fails with GLib.Error('Server returned status 404: Not Found', 'g-io-error-quark', 1)
1645057 - host_collection controller does not return host_ids key inside a POST response
1645144 - Unable to delete virt-who configuration from satellite.
1645174 - Reimporting the existing CV version should have more refined validation message
1645190 - CVE-2018-16887 katello: stored XSS in subscriptions and repositories pages
1645201 - CVE-2018-16861 foreman: stored XSS in success notification after entity creation
1645365 - Upgrade step katello:upgrades:3.8:clear_checksum_type from 6.4 to 6.5 failed
1645372 - capsule upgrade to 6.5 points the last scenario to foreman-proxy-content and removes capsule-answers
1645396 - add_permissions_to_default_roles fails during db:create
1645398 - [RFE] Add permissions to Canned admin
1645587 - Satellite throws Undefined method error while importing the CVv if clone CV isnt set
1645737 - Capsule upgrade to 6.5 failed with undefined method `enabled?' for nil:NilClass
1646184 - "the field 'created_at' in the order statement is not valid field for search" error on history tab of content view
1646409 - [Container Admin] Changing Registry Name Pattern in Library LE displays error; is saved anyway
1646603 - [Container Admin] Registry Name Pattern with repository.url will always be rejected
1646988 - Satellite upgrade from 6.4 to 6.5 failed at db:migrate
1647216 - Lack of edit_smart_proxies permission causes error when setting host to Build
1647582 - hammer task list --search no longer appears to search ID field
1647631 - [RFE] Change Katello bootstrap.py to preserve rhsm proxy settings
1647762 - Satellite does not import facts from virt-who reported Hypervisors
1647799 - "Maximum call stack size exceeded" error when opening running task in web UI
1647938 - Update default RSS feed to point to new Blog location
1648121 - [6.4]After unregistering hypervisor, unable to view subscriptions on activation key via Satellite WebUI
1648252 - Error after upgrade on subscription page
1648331 - "Request failed with status code 404" error on Tasks page
1648344 - Can't sync discovered containers without slash in name from Docker.io registry
1648358 - [Container Admin] Failed promotion of CV with containers - error message is unhelpful
1648473 - In satellite 6.4 under the Content -> Packages -> Enter Package Name->Details Sections , the installed on,applicable to,upgradable for shows as 0 hosts.
1648506 - virt-who is failing when pushing the information to the Satellite Server
1648903 - Product sync: wrong link to task
1649040 - Update for host task is no clear with what happened, and next steps
1649231 - hammer --help does not work with --output json, csv and yaml
1649471 - [Container Admin] Docker repositories sync - Limit Sync Tags is ignored
1649766 - User input handled incorrectly in preview
1649800 - Preview host set should be limited or generating should be confirmed
1649866 - [Container Admin] Changing repository of any type through web UI changes "Container Image Tags Filter" field value
1649871 - [Container Admin] hammer shows "Container Image Tags Filter" for non-docker repositories
1649938 - Pulp_max_tasks_per_child is disabled in capsule but not in satellite
1649961 - Corrupt Roles after upgrade to 6.4
1650063 - Applicable errata reporting template missing in 6.5
1650259 - slow errata query on dashboard
1650543 - Excessive logging of OpenScap report via Rails
1650624 - Compute profile settings do not get transported during upgrade from Satellite 6.3 to 6.4
1650662 - Dashboard with search query generates multiple slow queries
1651006 - SCAP run failed on RHEL6 with error no such file to load -- json (LoadError)
1651013 - Job name displayed with html tags
1651129 - organization changed from Default org to [object Object] on sync status page in satellite WebUI.
1651189 - /etc/rhsm/rhsm.conf is being incorrectly edited during registration
1651242 - Satellite 6 should expose suse client repos via http
1651324 - [Subscriptions] "Partition table" string is displayed instead of "Enabled"
1651367 - Actions::Candlepin::ListenOnCandlepinEvents occasionally not starting after unclean shutdown of the executor
1651634 - Capsule 05-pulp-https.conf is using old ProxyPass directive for GPG keys (i.e missing the /v2/)
1651774 - Hypervisor <-> guest mapping within UI is not accurate
1651852 - Missing timeout for "Actions::Katello::Host::Package::Update" task
1651916 - Host details/associated host button on discovered host audit gives 404
1651981 - view_subscription filter does not allow subscriptions to be viewed
1652060 - Singleton actions may not start after unclean shutdown
1652423 - Failed to auto-attach RHEL-8.0-Snapshot-1.0 against Satellite6.4
1652497 - Missing consumed and entitlements columns at subscriptions page
1652526 - [RFE] The CV exported tar should have name respective to Content View name
1652531 - CV with repo having background download policy is importing and exporting
1652557 - Unable to search host in host search box page
1652677 - "Host Groups" menu item changed to "Host Group"
1652732 - Virt-who reported host on Satellite WEB-UI , under Hosts---> Content Hosts shows "Type" as blank
1652885 - [Modularity][RHEL8]- RHEL8 HBT repo sync are failed to sync module streams
1652905 - Scriptlet error while upgrading to 6.5 in foreman-installer-1.20
1652909 - Upgrade from 6.4 to 6.5 failed showing PG::UndefinedTable: ERROR: relation "katello_root_repositories" does not exist
1652938 - blank page on navigating from foreman to katello page
1652961 - blank affected organizations/locations for restricted user
1653200 - Wrong autocomplete suggestion for xccdf_rule_name parameter
1653251 - Activation key search is broken
1653386 - Can't search for virt-who hypervisors
1653584 - [Life Cycle Environment] - Duplicate repos are getting displayed in Library->yum repositories
1653646 - [Recurring logic/Sync Plan] - Associated Resources are not shown in Recurring Logic created using sync plan
1653657 - [Recurring Logic] -- UI issue on recurring logic page
1653792 - Content credential repo page is broken
1654094 - system purpose status on Satellite is not correct
1654160 - undefined method medium_uri in AutoYaST default iPXE template
1654217 - Dynlfow undefined method `dynflow_logger'
1654263 - Non-admin user can't generate report if it has any user input
1654327 - Missing value for template kind in provisioning templates audits
1654565 - katello-ca-consumer-latest.noarch.rpm script, some redirect writing is wrong.
1654598 - CVv with mirror_on_sync repo is being imported
1654721 - [Container Admin] hammer lifecycle-environment info doesn't show Registry-related fields
1654944 - No validation on download policy for non-yum repositories
1654975 - Dynflow executor termination may hang if there is an action which keeps the executor occupied
1655094 - Additional new lines in remote execution output
1655239 - Could not enable redhat repository using hammer cli
1655243 - Syncing puppet repo gives Error: PLP0034: The distributor indicated a failed response when publishing repository
1655277 - Upgrade step katello:upgrades:3.9:migrate_sync_plans failed while 6.4 to 6.5 upgrade
1655407 - [Sync Plan] - Hammer Sync-Plan info does not show foreman_tasks_recurring_logic_id
1655483 - Importing manifest from UI is broken : TypeError: Cannot read property 'title' of undefined
1655595 - Sync plans does not start 'repositories sync' first time as per defined "Start Date" and same happened for all 'hourly/daily/weekly' Intervals
1655628 - Registered hosts' report performs poorly
1655870 - Unable to delete filters on a Role using system admin
1655981 - Importing manifest gets slow with increasing number of organizations
1655982 - [Module Streams] - Getting a blank page with an error in console for modules streams details Page
1656043 - Provide a branded satellite-maintain script
1656078 - [Module Streams] - "Filter by Status:" is not working if user tried to use pagination
1656425 - Upgrade step katello:upgrades:3.8:clear_checksum_type from 6.3 to 6.4 failed - Download policy Cannot sync file:// repositories with On Demand or Background Download Policies
1656470 - Available Errata report performs poorly for some filters
1656478 - Add support for multipart proxy upload for new platform services
1657062 - Link to 'Learn more about this in the documentation' for Config Goups is incorrect.
1657302 - HTTP Proxies option called "HTTP Capsules" in menus.
1657475 - katello-agent failed because qdrouterd it is not listening to an IPv6 address (just IPv4)
1657699 - [Modularity] - Need to run "/usr/libexec/rhsmcertd-worker" every time to see updated module stream profiles
1657711 - Exporting CV version with non-yum repos not producing correct error for end user
1657719 - Subscription allocation on customer portal changes back to 6.3 from 6.4 after a manifest refresh from upgraded satellite server.
1657942 - Update system purpose Candlepin API usage
1658130 - Typos in user inputs description
1658157 - User name is not displayed for non default account
1658193 - Bump ovirt_provision_plugin to 2.0.3
1658274 - [Container Admin] hammer docker manifest list never shows docker tag names
1658364 - Foreman background colors used on some error pages.
1658444 - Ostree repo sync fails with 'OverflowError: MongoDB can only handle up to 8-byte ints'
1658474 - sub-menu menus being hidden too quickly
1658592 - [Product]- Sync Plan Interval and timing is shown incorrectly in Product Details Page If Sync Interval is Custom Cron
1658659 - Error When Creating or Editing Host Group With Operating System
1659014 - Unable to use auto-attach hitting Cannot read property "length" from undefined (rules#2926)
1659042 - Bootdisk does not validate media leading to Medium cannot be blank error during bootdisk provision method
1659324 - While executing insights remediation playbooks via satellite it does not honour HTTP Proxy configured
1659549 - productid is not published in the content view if that is the only item which changed in the sync
1659917 - Make request ID longer in production.log
1659941 - hammer erratum list --organization-id="org_id" display all organizations erratum
1660133 - hammer repository info show "Red Hat Repository: no" for a Redhat enabled repository
1660258 - Issue when provision a new Content Host (the network used is different from the selected on the compute profile)
1660489 - Fact imports erroneously cause audits to be created
1660497 - sometimes RHEL8 Beta sync fails: PG::UniqueViolation: ERROR: duplicate key value violates unique constraint "katello_module_stream_artifacts_name_mod_stream_id_uniq"
1660561 - `yum remove java-1.7.0-openjdk` pulls in katello and satellite as dependencies
1661019 - [Container Admin] docker pull does not work
1661422 - Recommended Repositories lists tools for outdated Satellite version
1661483 - Ansible Job Templates fails because sudo password is not provided even though it is
1661498 - Failure parsing Discovery Red Hat kexec: Safemode doesn't allow to access 'append' on #<Safemode::ScopeObject>
1661971 - Update from 6.4.1 to 6.5 failed due to yum dependency resolution
1662150 - [RFE][Hammer/Errata/module streams] - Need to add module streams in hammer o/p for "host errata info"
1662164 - Compute Resource Libvirt show wrong Display Type in Edit Page.
1662405 - 403 on attempt to open Packages Actions tab as user with viewer role
1663021 - Error when uploading a manifest file on the disconnected Satellite Server
1664261 - unable to change Red Hat CDN URL: Value (NilClass) '' is not any of: ForemanTasks::Concerns::ActionSubject.
1664281 - it would not possible to provision RHEL 8 Beta (and GA) for disconnected customers
1664296 - error message have wrong links: Failure parsing Kickstart default PXELinux: undefined method `full_path' for nil:NilClass. [Edit]
1664436 - disable host-tools plugins where subman supports combined profile
1664641 - cannot restore backup what was created before upgrade-mongo-storage-engine
1664948 - There is no "Type" attribute column for subscription under "Content" -> "Subscriptions"
1665173 - Dependencies of rubygem-smart_proxy_dhcp_infoblox are missing
1665203 - custom system purpose values not shown in content host details dropdowns
1665466 - satellite-installer --upgrade qpid-config returned 1 instead of one of [0]
1665657 - Upgrade Step: katello:upgrades:3.11:update_puppet_repos failed during 6.4 to 6.5 upgrade
1665780 - hammer host create Error: Found more than one compute_profile
1666312 - Non-grammatical error message when docker tags whitelist is being set for non-docker repos
1666632 - Hammer CV export prints new line character in error message instead on implementing it
1666968 - [Subscription] - Not able to add RHEL8 repositories into Satellite
1667129 - Providing custom=false to products controller does not filter out custom products
1667704 - Not able to delete user associated with usergroup
1667775 - [RFE] Satellite 6.4 WebUI Capsule documentation link is incorrect
1668449 - Unable to refresh manifest or complete Expired Pools job
1669186 - Manifest upload task takes too much time
1669241 - Manifest can be refreshed only by the user who imported. Other user can't refresh that.
1669484 - Red Hat Enterprise Linux Atomic Host (Kickstart) repo is showing "Unspecified"
1670002 - wrong ordering of a smart variable matchers applied when a parameter is in a compound matcher and also standalone
1670090 - Hammer CSV should be deprecated
1670100 - [RFE] RHEL8 Support in Satellite 6 [tracker]
1670104 - [RFE] Add System Purpose to Satellite 6
1670125 - Red Hat Repositories does not show enabled repositories list with search criteria 'Enabled/Both'
1670173 - [RFE] Foreman canned admin
1670276 - Unable to synchronise a repository that uses SSL certificates for authentication
1670524 - Html numeric code is displayed on task page
1670729 - some host group related options are not getting assigned to content host.
1671148 - hammer host update not showing --lifecycle-environment option
1671202 - Capsule sync failed with undefined method `backend_service' for nil:NilClass after upgrade to 6.5
1671517 - hammer host update --service-level fails with Numeric Value is required
1671531 - Expose route for system purpose compliance
1671577 - Regenerate applicability fails when there is a missing repo
1672426 - Remove Red Hat Access Case Management Plugin
1672498 - Change permissions for grub2/shim.efi
1672751 - scan_cdn task failed while enabling red hat repositories from cdn
1673032 - when I sync RHEL8 x86_64 BaseOs and AppStream repos and kickstarts, I do not see "Synced Content" in Hosts -> Create Hosts -> Operating System -> Media Selection
1673215 - Unable to sync 3 SLES Update repositories
1673326 - "Red Hat Registry" is ambiguous
1673474 - vmware compute-attributes scsi_controller_type not honored
1674496 - foreman-rake command throw lot of Warning messages while running any rake commands
1674548 - Recommended repositories page on Satellite 6.5 page listing some non-relevant repositories
1676642 - [Modularity, discovery] - Showing empty discovery repo for repo url containing module streams
1676663 - service command can't connect to remote mongodb
1677014 - Improve diagnostic info for bootstrap.py --rex commands
1677309 - Not able to run Ansible playbooks under Access Insights
1677620 - Clicking on Host count under Ansible Roles, shows null results.
1677773 - hammer erratum list fails for host
1677916 - Clone vm fails with error "TypeError: no implicit conversion of nil into String" if host is disassociated
1678177 - Changing Sync plan from Default options to Custom Cron does not work.
1678322 - httpd fails to start after installing capsule in FIPS mode
1678763 - Please add Red Hat Enterprise Linux 7 Server Kickstart x86_64 7.x into recommended list
1678770 - Status of Module Stream is not correctly updated in web UI
1678892 - system purpose dropdowns are not disabled when no values present
1679481 - Discovery taxonomy broken due to regression in puppet importer
1679959 - Link to the documentation at the bottom of 'Hosts --> Content Hosts --> Register Content Host' page is broken
1680067 - Documentation link is wrong for Infrastructure > HTTP Capsules
1680441 - customer db upgrade from 6.4 to 6.5 failed at upgrade task: katello:upgrades:3.11:update_puppet_repos
1681009 - Could not perform package actions on rhel 5 clients
1683081 - when candlepin is in "SUSPEND" mode, `hammer ping` still reports "ok" on candlepin
1683096 - hammer sync-plan update does not work with custom cron
1683350 - FIPS provisioning templates need to be updated
1683592 - Exporting a CV with only puppet modules raises a tar error
1683687 - improve Katello::Pool.import_all by querying candlepin activation keys once per each org only
1683935 - Unable to create docker repository when "Registry Name Pattern" is set in LE
1684291 - [regression] No saved searches listed ( bookmarks ) in Monitor -> Tasks
1685437 - [webUI, Repo-Discovery]- Failed to discover the repository from Repo Discovery Page
1685726 - Unhelpful error message when "Suggest IP" fails due to SSL verify error
1686013 - Unable to install katello-agent on rhel 8 : nothing provides python3-qpid-proton needed by python3-gofer-proton
1686460 - "Requires Virt-Who" column not listed on Red Hat Subscriptions page
1686540 - Update version to state 6.5 Beta for Public Beta
1686604 - manifest upload duplicate key value violates unique constraint
1686964 - [Modularity] - RHEL 8 Appstream/BaseOS beta Repositories not getting available to the content host.
1687190 - sporadic timeouts in opening TCP connection prevents Satellite upgrades
1687250 - Remove Beta from version on login page before GA
1687264 - Could not install katello-host-tools-tracer on rhel 8 : nothing provides python3-beautifulsoup4, python3-psutil needed by python3-tracer
1687378 - Create host for esxi hypervisor fails with Validation failed: Name has already been taken error
1687577 - [Repo-Discovery] - Duplicate URLs getting appended in while creating repos from repo-discovery feature
1687956 - 6.5 Branding
1688636 - Missing checkbox to toggle between applicable errata and installabe errata in the errata content hosts page.
1688840 - Candlepin connection times out on large virt-who checkins
1688973 - Manifest refresh does not import new CDN certificates into Pulp
1689144 - No puppet agent in rhel 8 tools repository
1689240 - Incorrect size of a rebranded icon
1690390 - Enable GA repositories for 6.5 upgrade
1690449 - Satellite UI page headers and Navigation missing when selecting insights pages
1690795 - Remove Grub2 UEFI HTTP options from PXE loader
1691105 - Content view version delete results in broken sym links
1692009 - Javascript error on accessing red hat subscription and repository page
1692697 - virt-who hypervisor_id has different behaviors between sat6.5-snap20 and sat6.5-snap21
1693867 - CVE-2019-3891 candlepin: credentials exposure through log files
1694715 - on big katello-agent update: PG::StringDataRightTruncation: ERROR: value too long for type character varying(255)
1695379 - Update syspurpose status handling to match Candlepin
1696273 - Katello::Content uses removed Katello::Glue::Candlepin::Product.import_product_content
1696718 - arrayIndexOutOfbounds wrapped in JsonMappingException during serializing java.util.Date fields
1696969 - Unable to upload arf report on rhel 6 client: unexpected '.', expecting kEND (SyntaxError)
1698549 - Incremental publish of RPM repos fails after upgrade from 6.4 to 6.5
1698876 - Registered Hosts: inefficient google-style filter
1698947 - Puppet environments are not synced to the capsules
1699017 - rubygem-smart_proxy_dhcp_infoblox and rubygem-smart_proxy_dns_infoblox not avaliable in capsule repo
6. Package List:
Red Hat Satellite Capsule 6.5:
Source:
SOAPpy-0.11.6-17.el7.src.rpm
ansiblerole-insights-client-1.6-1.el7sat.src.rpm
createrepo_c-0.7.4-1.el7sat.src.rpm
foreman-1.20.1.34-1.el7sat.src.rpm
foreman-bootloaders-redhat-201801241201-4.el7sat.src.rpm
foreman-discovery-image-3.5.4-2.el7sat.src.rpm
foreman-installer-1.20.0-2.el7sat.src.rpm
foreman-proxy-1.20.0-1.el7sat.src.rpm
foreman-selinux-1.20.0-1.el7sat.src.rpm
gofer-2.12.5-3.el7sat.src.rpm
hfsplus-tools-332.14-12.el7.src.rpm
katello-3.10.0-0.6.rc1.el7sat.src.rpm
katello-certs-tools-2.4.0-2.el7sat.src.rpm
katello-client-bootstrap-1.7.2-1.el7sat.src.rpm
katello-installer-base-3.10.0.7-1.el7sat.src.rpm
katello-selinux-3.0.3-2.el7sat.src.rpm
kobo-0.5.1-1.el7sat.src.rpm
libmodulemd-1.6.3-1.el7sat.src.rpm
libsolv-0.6.34-2.pulp.el7sat.src.rpm
libstemmer-0-2.585svn.el7sat.src.rpm
libwebsockets-2.4.2-2.el7.src.rpm
livecd-tools-20.4-1.6.el7sat.src.rpm
mod_xsendfile-0.12-10.el7sat.src.rpm
mongodb-2.6.11-2.el7sat.src.rpm
ostree-2017.1-2.atomic.el7.src.rpm
pulp-2.18.1.1-1.el7sat.src.rpm
pulp-docker-3.2.2-1.el7sat.src.rpm
pulp-katello-1.0.2-5.el7sat.src.rpm
pulp-ostree-1.3.1-1.el7sat.src.rpm
pulp-puppet-2.18.1-2.el7sat.src.rpm
pulp-rpm-2.18.1.5-1.el7sat.src.rpm
puppet-agent-5.5.12-1.el7sat.src.rpm
puppet-agent-oauth-0.5.1-3.el7sat.src.rpm
puppet-foreman_scap_client-0.3.19-1.el7sat.src.rpm
puppetlabs-stdlib-4.25.1-1.el7sat.src.rpm
puppetserver-5.3.6-3.el7sat.src.rpm
python-amqp-2.2.2-3.el7sat.src.rpm
python-anyjson-0.3.3-5.el7sat.src.rpm
python-billiard-3.5.0.3-3.el7sat.src.rpm
python-blinker-1.3-2.el7sat.src.rpm
python-celery-4.0.2-5.el7sat.src.rpm
python-crane-3.3.0-0.1.rc.el7sat.src.rpm
python-django-1.11.13-1.el7sat.src.rpm
python-flask-0.10.1-4.el7sat.src.rpm
python-fpconst-0.7.3-12.el7.src.rpm
python-gnupg-0.3.7-1.el7ui.src.rpm
python-isodate-0.5.0-5.pulp.el7sat.src.rpm
python-itsdangerous-0.23-1.el7sat.src.rpm
python-kid-0.9.6-11.el7sat.src.rpm
python-kombu-4.0.2-12.el7sat.src.rpm
python-mongoengine-0.10.5-2.el7sat.src.rpm
python-nectar-1.5.6-1.el7sat.src.rpm
python-oauth2-1.5.211-8.el7sat.src.rpm
python-okaara-1.0.32-1.el7sat.src.rpm
python-pymongo-3.2-2.el7sat.src.rpm
python-qpid-1.35.0-5.el7.src.rpm
python-semantic_version-2.2.0-6.el7sat.src.rpm
python-simplejson-3.2.0-1.el7sat.src.rpm
python-twisted-core-12.2.0-4.el7.src.rpm
python-twisted-web-12.1.0-5.el7_2.src.rpm
python-vine-1.1.3-4.el7sat.src.rpm
python-werkzeug-0.9.1-1.el7sat.src.rpm
python-zope-interface-4.0.5-4.el7.src.rpm
qpid-cpp-1.36.0-24.el7amq.src.rpm
qpid-dispatch-1.5.0-4.el7.src.rpm
qpid-proton-0.26.0-3.el7.src.rpm
redhat-access-insights-puppet-0.0.9-3.el7sat.src.rpm
repoview-0.6.6-4.el7sat.src.rpm
rubygem-ansi-1.4.3-3.el7sat.src.rpm
rubygem-bundler_ext-0.4.1-3.el7sat.src.rpm
rubygem-clamp-1.1.2-2.el7sat.src.rpm
rubygem-concurrent-ruby-1.0.3-6.el7sat.src.rpm
rubygem-fast_gettext-1.1.0-4.el7sat.src.rpm
rubygem-ffi-1.4.0-3.el7sat.src.rpm
rubygem-gssapi-1.1.2-4.el7sat.src.rpm
rubygem-hashie-2.0.5-5.el7sat.src.rpm
rubygem-highline-1.7.8-3.el7sat.src.rpm
rubygem-jwt-1.2.1-1.el7sat.src.rpm
rubygem-kafo-2.1.0-1.el7sat.src.rpm
rubygem-kafo_parsers-0.1.6-1.el7sat.src.rpm
rubygem-kafo_wizards-0.0.1-2.el7sat.src.rpm
rubygem-little-plugger-1.1.3-22.el7sat.src.rpm
rubygem-logging-2.2.2-1.el7sat.src.rpm
rubygem-mime-types-1.19-7.el7sat.src.rpm
rubygem-multi_json-1.12.2-2.el7sat.src.rpm
rubygem-netrc-0.7.7-9.el7sat.src.rpm
rubygem-newt-0.9.6-3.el7sat.src.rpm
rubygem-oauth-0.5.4-2.el7sat.src.rpm
rubygem-openscap-0.4.7-3.el7sat.src.rpm
rubygem-passenger-4.0.18-24.el7sat.src.rpm
rubygem-powerbar-1.0.17-2.el7sat.src.rpm
rubygem-rack-1.6.4-3.el7sat.src.rpm
rubygem-rack-protection-1.5.3-4.el7sat.src.rpm
rubygem-rake-0.9.2.2-41.el7sat.src.rpm
rubygem-rb-inotify-0.9.7-4.el7sat.src.rpm
rubygem-rest-client-1.6.7-7.el7sat.src.rpm
rubygem-rkerberos-0.1.3-5.el7sat.src.rpm
rubygem-rsec-0.4.2-2.el7sat.src.rpm
rubygem-rubyipmi-0.10.0-2.el7sat.src.rpm
rubygem-sinatra-1.4.7-3.el7sat.src.rpm
rubygem-smart_proxy_ansible-2.0.3-2.el7sat.src.rpm
rubygem-smart_proxy_dhcp_remote_isc-0.0.4-1.el7sat.src.rpm
rubygem-smart_proxy_discovery-1.0.4-5.el7sat.src.rpm
rubygem-smart_proxy_discovery_image-1.0.9-2.el7sat.src.rpm
rubygem-smart_proxy_dynflow-0.2.1-2.el7sat.src.rpm
rubygem-smart_proxy_openscap-0.7.1-1.el7sat.src.rpm
rubygem-smart_proxy_pulp-1.3.0-3.el7sat.src.rpm
rubygem-smart_proxy_remote_execution_ssh-0.2.0-3.el7sat.src.rpm
rubygem-tilt-1.3.7-2.git.0.3b416c9.el7sat.src.rpm
saslwrapper-0.22-5.el7sat.src.rpm
satellite-6.5.0-11.el7sat.src.rpm
satellite-installer-6.5.0.4-1.el7sat.src.rpm
tfm-5.0-3.el7sat.src.rpm
tfm-ror52-1.0-4.el7sat.src.rpm
tfm-ror52-rubygem-concurrent-ruby-1.0.5-1.el7sat.src.rpm
tfm-ror52-rubygem-mime-types-3.2.2-1.el7sat.src.rpm
tfm-ror52-rubygem-mime-types-data-3.2018.0812-1.el7sat.src.rpm
tfm-ror52-rubygem-multi_json-1.13.1-1.el7sat.src.rpm
tfm-ror52-rubygem-mustermann-1.0.2-1.el7sat.src.rpm
tfm-ror52-rubygem-rack-2.0.5-2.el7sat.src.rpm
tfm-ror52-rubygem-rack-protection-2.0.3-1.el7sat.src.rpm
tfm-ror52-rubygem-sinatra-2.0.3-1.el7sat.src.rpm
tfm-ror52-rubygem-sqlite3-1.3.13-1.el7sat.src.rpm
tfm-ror52-rubygem-tilt-2.0.8-1.el7sat.src.rpm
tfm-rubygem-algebrick-0.7.3-6.el7sat.src.rpm
tfm-rubygem-apipie-params-0.0.5-5.el7sat.src.rpm
tfm-rubygem-bundler_ext-0.4.1-4.el7sat.src.rpm
tfm-rubygem-concurrent-ruby-edge-0.2.4-2.el7sat.src.rpm
tfm-rubygem-domain_name-0.5.20160310-4.el7sat.src.rpm
tfm-rubygem-dynflow-1.1.6-1.el7sat.src.rpm
tfm-rubygem-ffi-1.4.0-12.el7sat.src.rpm
tfm-rubygem-foreman-tasks-core-0.2.5-2.el7sat.src.rpm
tfm-rubygem-foreman_ansible_core-2.1.2-2.el7sat.src.rpm
tfm-rubygem-foreman_remote_execution_core-1.1.4-1.el7sat.src.rpm
tfm-rubygem-gssapi-1.2.0-5.el7sat.src.rpm
tfm-rubygem-http-cookie-1.0.2-5.el7sat.src.rpm
tfm-rubygem-net-ssh-4.0.1-5.el7sat.src.rpm
tfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.src.rpm
tfm-rubygem-netrc-0.11.0-3.el7sat.src.rpm
tfm-rubygem-rest-client-2.0.1-3.el7sat.src.rpm
tfm-rubygem-sequel-5.7.1-2.el7sat.src.rpm
tfm-rubygem-smart_proxy_dynflow_core-0.2.1-5.el7sat.src.rpm
tfm-rubygem-statsd-instrument-2.1.4-2.el7sat.src.rpm
tfm-rubygem-unf-0.1.3-7.el7sat.src.rpm
tfm-rubygem-unf_ext-0.0.6-9.el7sat.src.rpm
v8-3.14.5.10-19.el7sat.src.rpm
yaml-cpp-0.5.1-7.el7sat.src.rpm
noarch:
SOAPpy-0.11.6-17.el7.noarch.rpm
ansiblerole-insights-client-1.6-1.el7sat.noarch.rpm
foreman-bootloaders-redhat-201801241201-4.el7sat.noarch.rpm
foreman-bootloaders-redhat-tftpboot-201801241201-4.el7sat.noarch.rpm
foreman-debug-1.20.1.34-1.el7sat.noarch.rpm
foreman-discovery-image-3.5.4-2.el7sat.noarch.rpm
foreman-installer-1.20.0-2.el7sat.noarch.rpm
foreman-installer-katello-3.10.0.7-1.el7sat.noarch.rpm
foreman-proxy-1.20.0-1.el7sat.noarch.rpm
foreman-proxy-content-3.10.0-0.6.rc1.el7sat.noarch.rpm
foreman-selinux-1.20.0-1.el7sat.noarch.rpm
katello-certs-tools-2.4.0-2.el7sat.noarch.rpm
katello-client-bootstrap-1.7.2-1.el7sat.noarch.rpm
katello-common-3.10.0-0.6.rc1.el7sat.noarch.rpm
katello-debug-3.10.0-0.6.rc1.el7sat.noarch.rpm
katello-installer-base-3.10.0.7-1.el7sat.noarch.rpm
katello-selinux-3.0.3-2.el7sat.noarch.rpm
katello-service-3.10.0-0.6.rc1.el7sat.noarch.rpm
kobo-0.5.1-1.el7sat.noarch.rpm
pulp-admin-client-2.18.1.1-1.el7sat.noarch.rpm
pulp-docker-admin-extensions-3.2.2-1.el7sat.noarch.rpm
pulp-docker-plugins-3.2.2-1.el7sat.noarch.rpm
pulp-katello-1.0.2-5.el7sat.noarch.rpm
pulp-maintenance-2.18.1.1-1.el7sat.noarch.rpm
pulp-nodes-child-2.18.1.1-1.el7sat.noarch.rpm
pulp-nodes-common-2.18.1.1-1.el7sat.noarch.rpm
pulp-nodes-parent-2.18.1.1-1.el7sat.noarch.rpm
pulp-ostree-admin-extensions-1.3.1-1.el7sat.noarch.rpm
pulp-ostree-plugins-1.3.1-1.el7sat.noarch.rpm
pulp-puppet-admin-extensions-2.18.1-2.el7sat.noarch.rpm
pulp-puppet-plugins-2.18.1-2.el7sat.noarch.rpm
pulp-rpm-admin-extensions-2.18.1.5-1.el7sat.noarch.rpm
pulp-rpm-plugins-2.18.1.5-1.el7sat.noarch.rpm
pulp-selinux-2.18.1.1-1.el7sat.noarch.rpm
pulp-server-2.18.1.1-1.el7sat.noarch.rpm
puppet-agent-oauth-0.5.1-3.el7sat.noarch.rpm
puppet-foreman_scap_client-0.3.19-1.el7sat.noarch.rpm
puppetlabs-stdlib-4.25.1-1.el7sat.noarch.rpm
puppetserver-5.3.6-3.el7sat.noarch.rpm
python-anyjson-0.3.3-5.el7sat.noarch.rpm
python-blinker-1.3-2.el7sat.noarch.rpm
python-crane-3.3.0-0.1.rc.el7sat.noarch.rpm
python-flask-0.10.1-4.el7sat.noarch.rpm
python-fpconst-0.7.3-12.el7.noarch.rpm
python-gnupg-0.3.7-1.el7ui.noarch.rpm
python-gofer-2.12.5-3.el7sat.noarch.rpm
python-gofer-qpid-2.12.5-3.el7sat.noarch.rpm
python-isodate-0.5.0-5.pulp.el7sat.noarch.rpm
python-itsdangerous-0.23-1.el7sat.noarch.rpm
python-kid-0.9.6-11.el7sat.noarch.rpm
python-mongoengine-0.10.5-2.el7sat.noarch.rpm
python-nectar-1.5.6-1.el7sat.noarch.rpm
python-oauth2-1.5.211-8.el7sat.noarch.rpm
python-okaara-1.0.32-1.el7sat.noarch.rpm
python-pulp-agent-lib-2.18.1.1-1.el7sat.noarch.rpm
python-pulp-bindings-2.18.1.1-1.el7sat.noarch.rpm
python-pulp-client-lib-2.18.1.1-1.el7sat.noarch.rpm
python-pulp-common-2.18.1.1-1.el7sat.noarch.rpm
python-pulp-docker-common-3.2.2-1.el7sat.noarch.rpm
python-pulp-integrity-2.18.1.5-1.el7sat.noarch.rpm
python-pulp-oid_validation-2.18.1.1-1.el7sat.noarch.rpm
python-pulp-ostree-common-1.3.1-1.el7sat.noarch.rpm
python-pulp-puppet-common-2.18.1-2.el7sat.noarch.rpm
python-pulp-repoauth-2.18.1.1-1.el7sat.noarch.rpm
python-pulp-rpm-common-2.18.1.5-1.el7sat.noarch.rpm
python-pulp-streamer-2.18.1.1-1.el7sat.noarch.rpm
python-qpid-1.35.0-5.el7.noarch.rpm
python-semantic_version-2.2.0-6.el7sat.noarch.rpm
python-werkzeug-0.9.1-1.el7sat.noarch.rpm
python2-amqp-2.2.2-3.el7sat.noarch.rpm
python2-celery-4.0.2-5.el7sat.noarch.rpm
python2-django-1.11.13-1.el7sat.noarch.rpm
python2-kombu-4.0.2-12.el7sat.noarch.rpm
python2-vine-1.1.3-4.el7sat.noarch.rpm
qpid-dispatch-tools-1.5.0-4.el7.noarch.rpm
qpid-tools-1.36.0-24.el7amq.noarch.rpm
redhat-access-insights-puppet-0.0.9-3.el7sat.noarch.rpm
repoview-0.6.6-4.el7sat.noarch.rpm
rubygem-ansi-1.4.3-3.el7sat.noarch.rpm
rubygem-bundler_ext-0.4.1-3.el7sat.noarch.rpm
rubygem-clamp-1.1.2-2.el7sat.noarch.rpm
rubygem-concurrent-ruby-1.0.3-6.el7sat.noarch.rpm
rubygem-fast_gettext-1.1.0-4.el7sat.noarch.rpm
rubygem-gssapi-1.1.2-4.el7sat.noarch.rpm
rubygem-hashie-2.0.5-5.el7sat.noarch.rpm
rubygem-highline-1.7.8-3.el7sat.noarch.rpm
rubygem-jwt-1.2.1-1.el7sat.noarch.rpm
rubygem-kafo-2.1.0-1.el7sat.noarch.rpm
rubygem-kafo_parsers-0.1.6-1.el7sat.noarch.rpm
rubygem-kafo_wizards-0.0.1-2.el7sat.noarch.rpm
rubygem-little-plugger-1.1.3-22.el7sat.noarch.rpm
rubygem-logging-2.2.2-1.el7sat.noarch.rpm
rubygem-mime-types-1.19-7.el7sat.noarch.rpm
rubygem-multi_json-1.12.2-2.el7sat.noarch.rpm
rubygem-netrc-0.7.7-9.el7sat.noarch.rpm
rubygem-oauth-0.5.4-2.el7sat.noarch.rpm
rubygem-openscap-0.4.7-3.el7sat.noarch.rpm
rubygem-powerbar-1.0.17-2.el7sat.noarch.rpm
rubygem-rack-1.6.4-3.el7sat.noarch.rpm
rubygem-rack-protection-1.5.3-4.el7sat.noarch.rpm
rubygem-rake-0.9.2.2-41.el7sat.noarch.rpm
rubygem-rb-inotify-0.9.7-4.el7sat.noarch.rpm
rubygem-rest-client-1.6.7-7.el7sat.noarch.rpm
rubygem-rsec-0.4.2-2.el7sat.noarch.rpm
rubygem-rubyipmi-0.10.0-2.el7sat.noarch.rpm
rubygem-sinatra-1.4.7-3.el7sat.noarch.rpm
rubygem-smart_proxy_ansible-2.0.3-2.el7sat.noarch.rpm
rubygem-smart_proxy_dhcp_remote_isc-0.0.4-1.el7sat.noarch.rpm
rubygem-smart_proxy_discovery-1.0.4-5.el7sat.noarch.rpm
rubygem-smart_proxy_discovery_image-1.0.9-2.el7sat.noarch.rpm
rubygem-smart_proxy_dynflow-0.2.1-2.el7sat.noarch.rpm
rubygem-smart_proxy_openscap-0.7.1-1.el7sat.noarch.rpm
rubygem-smart_proxy_pulp-1.3.0-3.el7sat.noarch.rpm
rubygem-smart_proxy_remote_execution_ssh-0.2.0-3.el7sat.noarch.rpm
rubygem-tilt-1.3.7-2.git.0.3b416c9.el7sat.noarch.rpm
satellite-capsule-6.5.0-11.el7sat.noarch.rpm
satellite-common-6.5.0-11.el7sat.noarch.rpm
satellite-debug-tools-6.5.0-11.el7sat.noarch.rpm
satellite-installer-6.5.0.4-1.el7sat.noarch.rpm
tfm-ror52-rubygem-concurrent-ruby-1.0.5-1.el7sat.noarch.rpm
tfm-ror52-rubygem-mime-types-3.2.2-1.el7sat.noarch.rpm
tfm-ror52-rubygem-mime-types-data-3.2018.0812-1.el7sat.noarch.rpm
tfm-ror52-rubygem-multi_json-1.13.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-mustermann-1.0.2-1.el7sat.noarch.rpm
tfm-ror52-rubygem-rack-2.0.5-2.el7sat.noarch.rpm
tfm-ror52-rubygem-rack-protection-2.0.3-1.el7sat.noarch.rpm
tfm-ror52-rubygem-sinatra-2.0.3-1.el7sat.noarch.rpm
tfm-ror52-rubygem-tilt-2.0.8-1.el7sat.noarch.rpm
tfm-rubygem-algebrick-0.7.3-6.el7sat.noarch.rpm
tfm-rubygem-apipie-params-0.0.5-5.el7sat.noarch.rpm
tfm-rubygem-bundler_ext-0.4.1-4.el7sat.noarch.rpm
tfm-rubygem-concurrent-ruby-edge-0.2.4-2.el7sat.noarch.rpm
tfm-rubygem-domain_name-0.5.20160310-4.el7sat.noarch.rpm
tfm-rubygem-dynflow-1.1.6-1.el7sat.noarch.rpm
tfm-rubygem-foreman-tasks-core-0.2.5-2.el7sat.noarch.rpm
tfm-rubygem-foreman_ansible_core-2.1.2-2.el7sat.noarch.rpm
tfm-rubygem-foreman_remote_execution_core-1.1.4-1.el7sat.noarch.rpm
tfm-rubygem-gssapi-1.2.0-5.el7sat.noarch.rpm
tfm-rubygem-http-cookie-1.0.2-5.el7sat.noarch.rpm
tfm-rubygem-net-ssh-4.0.1-5.el7sat.noarch.rpm
tfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.noarch.rpm
tfm-rubygem-netrc-0.11.0-3.el7sat.noarch.rpm
tfm-rubygem-rest-client-2.0.1-3.el7sat.noarch.rpm
tfm-rubygem-sequel-5.7.1-2.el7sat.noarch.rpm
tfm-rubygem-smart_proxy_dynflow_core-0.2.1-5.el7sat.noarch.rpm
tfm-rubygem-statsd-instrument-2.1.4-2.el7sat.noarch.rpm
tfm-rubygem-unf-0.1.3-7.el7sat.noarch.rpm
x86_64:
createrepo_c-0.7.4-1.el7sat.x86_64.rpm
createrepo_c-debuginfo-0.7.4-1.el7sat.x86_64.rpm
createrepo_c-libs-0.7.4-1.el7sat.x86_64.rpm
hfsplus-tools-332.14-12.el7.x86_64.rpm
hfsplus-tools-debuginfo-332.14-12.el7.x86_64.rpm
libmodulemd-1.6.3-1.el7sat.x86_64.rpm
libmodulemd-debuginfo-1.6.3-1.el7sat.x86_64.rpm
libsolv-0.6.34-2.pulp.el7sat.x86_64.rpm
libsolv-debuginfo-0.6.34-2.pulp.el7sat.x86_64.rpm
libstemmer-0-2.585svn.el7sat.x86_64.rpm
libstemmer-debuginfo-0-2.585svn.el7sat.x86_64.rpm
libwebsockets-2.4.2-2.el7.x86_64.rpm
libwebsockets-debuginfo-2.4.2-2.el7.x86_64.rpm
livecd-tools-20.4-1.6.el7sat.x86_64.rpm
mod_passenger-4.0.18-24.el7sat.x86_64.rpm
mod_xsendfile-0.12-10.el7sat.x86_64.rpm
mod_xsendfile-debuginfo-0.12-10.el7sat.x86_64.rpm
mongodb-2.6.11-2.el7sat.x86_64.rpm
mongodb-debuginfo-2.6.11-2.el7sat.x86_64.rpm
mongodb-server-2.6.11-2.el7sat.x86_64.rpm
ostree-2017.1-2.atomic.el7.x86_64.rpm
ostree-debuginfo-2017.1-2.atomic.el7.x86_64.rpm
puppet-agent-5.5.12-1.el7sat.x86_64.rpm
python-billiard-debuginfo-3.5.0.3-3.el7sat.x86_64.rpm
python-bson-3.2-2.el7sat.x86_64.rpm
python-imgcreate-20.4-1.6.el7sat.x86_64.rpm
python-pymongo-3.2-2.el7sat.x86_64.rpm
python-pymongo-debuginfo-3.2-2.el7sat.x86_64.rpm
python-pymongo-gridfs-3.2-2.el7sat.x86_64.rpm
python-qpid-proton-0.26.0-3.el7.x86_64.rpm
python-qpid-qmf-1.36.0-24.el7amq.x86_64.rpm
python-saslwrapper-0.22-5.el7sat.x86_64.rpm
python-simplejson-3.2.0-1.el7sat.x86_64.rpm
python-simplejson-debuginfo-3.2.0-1.el7sat.x86_64.rpm
python-twisted-core-12.2.0-4.el7.x86_64.rpm
python-twisted-core-debuginfo-12.2.0-4.el7.x86_64.rpm
python-twisted-web-12.1.0-5.el7_2.x86_64.rpm
python-zope-interface-4.0.5-4.el7.x86_64.rpm
python-zope-interface-debuginfo-4.0.5-4.el7.x86_64.rpm
python2-billiard-3.5.0.3-3.el7sat.x86_64.rpm
python2-solv-0.6.34-2.pulp.el7sat.x86_64.rpm
qpid-cpp-client-1.36.0-24.el7amq.x86_64.rpm
qpid-cpp-debuginfo-1.36.0-24.el7amq.x86_64.rpm
qpid-cpp-server-1.36.0-24.el7amq.x86_64.rpm
qpid-cpp-server-linearstore-1.36.0-24.el7amq.x86_64.rpm
qpid-dispatch-debuginfo-1.5.0-4.el7.x86_64.rpm
qpid-dispatch-router-1.5.0-4.el7.x86_64.rpm
qpid-proton-c-0.26.0-3.el7.x86_64.rpm
qpid-proton-debuginfo-0.26.0-3.el7.x86_64.rpm
qpid-qmf-1.36.0-24.el7amq.x86_64.rpm
rubygem-ffi-1.4.0-3.el7sat.x86_64.rpm
rubygem-ffi-debuginfo-1.4.0-3.el7sat.x86_64.rpm
rubygem-newt-0.9.6-3.el7sat.x86_64.rpm
rubygem-newt-debuginfo-0.9.6-3.el7sat.x86_64.rpm
rubygem-passenger-4.0.18-24.el7sat.x86_64.rpm
rubygem-passenger-debuginfo-4.0.18-24.el7sat.x86_64.rpm
rubygem-passenger-native-4.0.18-24.el7sat.x86_64.rpm
rubygem-passenger-native-libs-4.0.18-24.el7sat.x86_64.rpm
rubygem-rkerberos-0.1.3-5.el7sat.x86_64.rpm
rubygem-rkerberos-debuginfo-0.1.3-5.el7sat.x86_64.rpm
saslwrapper-0.22-5.el7sat.x86_64.rpm
saslwrapper-debuginfo-0.22-5.el7sat.x86_64.rpm
tfm-ror52-rubygem-sqlite3-1.3.13-1.el7sat.x86_64.rpm
tfm-ror52-rubygem-sqlite3-debuginfo-1.3.13-1.el7sat.x86_64.rpm
tfm-ror52-runtime-1.0-4.el7sat.x86_64.rpm
tfm-rubygem-ffi-1.4.0-12.el7sat.x86_64.rpm
tfm-rubygem-ffi-debuginfo-1.4.0-12.el7sat.x86_64.rpm
tfm-rubygem-unf_ext-0.0.6-9.el7sat.x86_64.rpm
tfm-rubygem-unf_ext-debuginfo-0.0.6-9.el7sat.x86_64.rpm
tfm-runtime-5.0-3.el7sat.x86_64.rpm
v8-3.14.5.10-19.el7sat.x86_64.rpm
v8-debuginfo-3.14.5.10-19.el7sat.x86_64.rpm
yaml-cpp-0.5.1-7.el7sat.x86_64.rpm
yaml-cpp-debuginfo-0.5.1-7.el7sat.x86_64.rpm
Red Hat Satellite 6.5:
Source:
SOAPpy-0.11.6-17.el7.src.rpm
ansiblerole-insights-client-1.6-1.el7sat.src.rpm
candlepin-2.5.15-1.el7sat.src.rpm
createrepo_c-0.7.4-1.el7sat.src.rpm
foreman-1.20.1.34-1.el7sat.src.rpm
foreman-bootloaders-redhat-201801241201-4.el7sat.src.rpm
foreman-discovery-image-3.5.4-2.el7sat.src.rpm
foreman-installer-1.20.0-2.el7sat.src.rpm
foreman-proxy-1.20.0-1.el7sat.src.rpm
foreman-selinux-1.20.0-1.el7sat.src.rpm
gofer-2.12.5-3.el7sat.src.rpm
hfsplus-tools-332.14-12.el7.src.rpm
katello-3.10.0-0.6.rc1.el7sat.src.rpm
katello-certs-tools-2.4.0-2.el7sat.src.rpm
katello-client-bootstrap-1.7.2-1.el7sat.src.rpm
katello-installer-base-3.10.0.7-1.el7sat.src.rpm
katello-selinux-3.0.3-2.el7sat.src.rpm
kobo-0.5.1-1.el7sat.src.rpm
libmodulemd-1.6.3-1.el7sat.src.rpm
libsolv-0.6.34-2.pulp.el7sat.src.rpm
libwebsockets-2.4.2-2.el7.src.rpm
liquibase-3.1.0-1.el7.src.rpm
livecd-tools-20.4-1.6.el7sat.src.rpm
mod_xsendfile-0.12-10.el7sat.src.rpm
ostree-2017.1-2.atomic.el7.src.rpm
pcp-mmvstatsd-0.4-2.el7sat.src.rpm
pulp-2.18.1.1-1.el7sat.src.rpm
pulp-docker-3.2.2-1.el7sat.src.rpm
pulp-katello-1.0.2-5.el7sat.src.rpm
pulp-ostree-1.3.1-1.el7sat.src.rpm
pulp-puppet-2.18.1-2.el7sat.src.rpm
pulp-rpm-2.18.1.5-1.el7sat.src.rpm
puppet-agent-5.5.12-1.el7sat.src.rpm
puppet-agent-oauth-0.5.1-3.el7sat.src.rpm
puppet-foreman_scap_client-0.3.19-1.el7sat.src.rpm
puppetlabs-stdlib-4.25.1-1.el7sat.src.rpm
puppetserver-5.3.6-3.el7sat.src.rpm
python-amqp-2.2.2-3.el7sat.src.rpm
python-anyjson-0.3.3-5.el7sat.src.rpm
python-billiard-3.5.0.3-3.el7sat.src.rpm
python-blinker-1.3-2.el7sat.src.rpm
python-celery-4.0.2-5.el7sat.src.rpm
python-crane-3.3.0-0.1.rc.el7sat.src.rpm
python-django-1.11.13-1.el7sat.src.rpm
python-flask-0.10.1-4.el7sat.src.rpm
python-fpconst-0.7.3-12.el7.src.rpm
python-gnupg-0.3.7-1.el7ui.src.rpm
python-isodate-0.5.0-5.pulp.el7sat.src.rpm
python-itsdangerous-0.23-1.el7sat.src.rpm
python-kid-0.9.6-11.el7sat.src.rpm
python-kombu-4.0.2-12.el7sat.src.rpm
python-mongoengine-0.10.5-2.el7sat.src.rpm
python-nectar-1.5.6-1.el7sat.src.rpm
python-oauth2-1.5.211-8.el7sat.src.rpm
python-okaara-1.0.32-1.el7sat.src.rpm
python-pymongo-3.2-2.el7sat.src.rpm
python-qpid-1.35.0-5.el7.src.rpm
python-semantic_version-2.2.0-6.el7sat.src.rpm
python-simplejson-3.2.0-1.el7sat.src.rpm
python-twisted-core-12.2.0-4.el7.src.rpm
python-twisted-web-12.1.0-5.el7_2.src.rpm
python-vine-1.1.3-4.el7sat.src.rpm
python-werkzeug-0.9.1-1.el7sat.src.rpm
python-zope-interface-4.0.5-4.el7.src.rpm
qpid-cpp-1.36.0-24.el7amq.src.rpm
qpid-dispatch-1.5.0-4.el7.src.rpm
qpid-proton-0.26.0-3.el7.src.rpm
redhat-access-insights-puppet-0.0.9-3.el7sat.src.rpm
repoview-0.6.6-4.el7sat.src.rpm
rhel8-kickstart-setup-0.0.2-1.el7sat.src.rpm
rubygem-ansi-1.4.3-3.el7sat.src.rpm
rubygem-bundler_ext-0.4.1-3.el7sat.src.rpm
rubygem-clamp-1.1.2-2.el7sat.src.rpm
rubygem-concurrent-ruby-1.0.3-6.el7sat.src.rpm
rubygem-facter-2.4.1-2.el7sat.src.rpm
rubygem-faraday-0.9.1-6.el7sat.src.rpm
rubygem-faraday_middleware-0.10.0-4.el7sat.src.rpm
rubygem-fast_gettext-1.1.0-4.el7sat.src.rpm
rubygem-ffi-1.4.0-3.el7sat.src.rpm
rubygem-foreman_scap_client-0.4.5-1.el7sat.src.rpm
rubygem-gssapi-1.1.2-4.el7sat.src.rpm
rubygem-hashie-2.0.5-5.el7sat.src.rpm
rubygem-highline-1.7.8-3.el7sat.src.rpm
rubygem-infoblox-2.0.4-1.el7sat.src.rpm
rubygem-jwt-1.2.1-1.el7sat.src.rpm
rubygem-kafo-2.1.0-1.el7sat.src.rpm
rubygem-kafo_parsers-0.1.6-1.el7sat.src.rpm
rubygem-kafo_wizards-0.0.1-2.el7sat.src.rpm
rubygem-little-plugger-1.1.3-22.el7sat.src.rpm
rubygem-logging-2.2.2-1.el7sat.src.rpm
rubygem-mime-types-1.19-7.el7sat.src.rpm
rubygem-multi_json-1.12.2-2.el7sat.src.rpm
rubygem-multipart-post-1.2.0-6.el7sat.src.rpm
rubygem-netrc-0.7.7-9.el7sat.src.rpm
rubygem-newt-0.9.6-3.el7sat.src.rpm
rubygem-oauth-0.5.4-2.el7sat.src.rpm
rubygem-openscap-0.4.7-3.el7sat.src.rpm
rubygem-passenger-4.0.18-24.el7sat.src.rpm
rubygem-powerbar-1.0.17-2.el7sat.src.rpm
rubygem-rack-1.6.4-3.el7sat.src.rpm
rubygem-rack-protection-1.5.3-4.el7sat.src.rpm
rubygem-rake-0.9.2.2-41.el7sat.src.rpm
rubygem-rb-inotify-0.9.7-4.el7sat.src.rpm
rubygem-rest-client-1.6.7-7.el7sat.src.rpm
rubygem-rkerberos-0.1.3-5.el7sat.src.rpm
rubygem-rsec-0.4.2-2.el7sat.src.rpm
rubygem-rubyipmi-0.10.0-2.el7sat.src.rpm
rubygem-sinatra-1.4.7-3.el7sat.src.rpm
rubygem-smart_proxy_ansible-2.0.3-2.el7sat.src.rpm
rubygem-smart_proxy_dhcp_infoblox-0.0.14-1.el7sat.src.rpm
rubygem-smart_proxy_dhcp_remote_isc-0.0.4-1.el7sat.src.rpm
rubygem-smart_proxy_discovery-1.0.4-5.el7sat.src.rpm
rubygem-smart_proxy_discovery_image-1.0.9-2.el7sat.src.rpm
rubygem-smart_proxy_dns_infoblox-0.0.7-1.el7sat.src.rpm
rubygem-smart_proxy_dynflow-0.2.1-2.el7sat.src.rpm
rubygem-smart_proxy_openscap-0.7.1-1.el7sat.src.rpm
rubygem-smart_proxy_pulp-1.3.0-3.el7sat.src.rpm
rubygem-smart_proxy_remote_execution_ssh-0.2.0-3.el7sat.src.rpm
rubygem-tilt-1.3.7-2.git.0.3b416c9.el7sat.src.rpm
saslwrapper-0.22-5.el7sat.src.rpm
satellite-6.5.0-11.el7sat.src.rpm
satellite-installer-6.5.0.4-1.el7sat.src.rpm
tfm-5.0-3.el7sat.src.rpm
tfm-ror52-1.0-4.el7sat.src.rpm
tfm-ror52-rubygem-actioncable-5.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-actionmailer-5.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-actionpack-5.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-actionview-5.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-activejob-5.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-activemodel-5.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-activerecord-5.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-activestorage-5.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-activesupport-5.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-arel-9.0.0-1.el7sat.src.rpm
tfm-ror52-rubygem-builder-3.2.3-1.el7sat.src.rpm
tfm-ror52-rubygem-coffee-rails-4.2.2-1.el7sat.src.rpm
tfm-ror52-rubygem-coffee-script-2.4.1-1.el7sat.src.rpm
tfm-ror52-rubygem-coffee-script-source-1.12.2-1.el7sat.src.rpm
tfm-ror52-rubygem-concurrent-ruby-1.0.5-1.el7sat.src.rpm
tfm-ror52-rubygem-crass-1.0.4-1.el7sat.src.rpm
tfm-ror52-rubygem-erubi-1.7.1-1.el7sat.src.rpm
tfm-ror52-rubygem-execjs-2.7.0-1.el7sat.src.rpm
tfm-ror52-rubygem-globalid-0.4.1-3.el7sat.src.rpm
tfm-ror52-rubygem-i18n-1.0.1-1.el7sat.src.rpm
tfm-ror52-rubygem-loofah-2.2.2-2.el7sat.src.rpm
tfm-ror52-rubygem-mail-2.7.0-1.el7sat.src.rpm
tfm-ror52-rubygem-marcel-0.3.2-1.el7sat.src.rpm
tfm-ror52-rubygem-method_source-0.9.0-1.el7sat.src.rpm
tfm-ror52-rubygem-mime-types-3.2.2-1.el7sat.src.rpm
tfm-ror52-rubygem-mime-types-data-3.2018.0812-1.el7sat.src.rpm
tfm-ror52-rubygem-mimemagic-0.3.2-1.el7sat.src.rpm
tfm-ror52-rubygem-mini_mime-1.0.0-1.el7sat.src.rpm
tfm-ror52-rubygem-mini_portile2-2.3.0-1.el7sat.src.rpm
tfm-ror52-rubygem-multi_json-1.13.1-1.el7sat.src.rpm
tfm-ror52-rubygem-mustermann-1.0.2-1.el7sat.src.rpm
tfm-ror52-rubygem-nio4r-2.3.1-1.el7sat.src.rpm
tfm-ror52-rubygem-nokogiri-1.8.4-2.el7sat.src.rpm
tfm-ror52-rubygem-rack-2.0.5-2.el7sat.src.rpm
tfm-ror52-rubygem-rack-protection-2.0.3-1.el7sat.src.rpm
tfm-ror52-rubygem-rack-test-1.1.0-1.el7sat.src.rpm
tfm-ror52-rubygem-rails-5.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-rails-dom-testing-2.0.3-3.el7sat.src.rpm
tfm-ror52-rubygem-rails-html-sanitizer-1.0.4-2.el7sat.src.rpm
tfm-ror52-rubygem-railties-5.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-sinatra-2.0.3-1.el7sat.src.rpm
tfm-ror52-rubygem-sprockets-3.7.2-3.el7sat.src.rpm
tfm-ror52-rubygem-sprockets-rails-3.2.1-1.el7sat.src.rpm
tfm-ror52-rubygem-sqlite3-1.3.13-1.el7sat.src.rpm
tfm-ror52-rubygem-thor-0.20.0-3.el7sat.src.rpm
tfm-ror52-rubygem-thread_safe-0.3.6-1.el7sat.src.rpm
tfm-ror52-rubygem-tilt-2.0.8-1.el7sat.src.rpm
tfm-ror52-rubygem-turbolinks-2.5.4-1.el7sat.src.rpm
tfm-ror52-rubygem-tzinfo-1.2.5-1.el7sat.src.rpm
tfm-ror52-rubygem-websocket-driver-0.7.0-1.el7sat.src.rpm
tfm-ror52-rubygem-websocket-extensions-0.1.3-1.el7sat.src.rpm
tfm-rubygem-activerecord-import-1.0.0-3.el7sat.src.rpm
tfm-rubygem-activerecord-session_store-1.1.1-2.el7sat.src.rpm
tfm-rubygem-addressable-2.3.6-6.el7sat.src.rpm
tfm-rubygem-algebrick-0.7.3-6.el7sat.src.rpm
tfm-rubygem-ancestry-3.0.0-3.el7sat.src.rpm
tfm-rubygem-anemone-0.7.2-20.el7sat.src.rpm
tfm-rubygem-angular-rails-templates-1.0.2-4.el7sat.src.rpm
tfm-rubygem-apipie-bindings-0.2.2-2.el7sat.src.rpm
tfm-rubygem-apipie-params-0.0.5-5.el7sat.src.rpm
tfm-rubygem-apipie-rails-0.5.14-1.el7sat.src.rpm
tfm-rubygem-audited-4.7.1-2.el7sat.src.rpm
tfm-rubygem-autoparse-0.3.3-10.el7sat.src.rpm
tfm-rubygem-awesome_print-1.8.0-3.el7sat.src.rpm
tfm-rubygem-bastion-6.1.23-1.el7sat.src.rpm
tfm-rubygem-bundler_ext-0.4.1-4.el7sat.src.rpm
tfm-rubygem-clamp-1.1.2-4.el7sat.src.rpm
tfm-rubygem-concurrent-ruby-edge-0.2.4-2.el7sat.src.rpm
tfm-rubygem-css_parser-1.4.7-3.el7sat.src.rpm
tfm-rubygem-daemons-1.2.3-7.el7sat.src.rpm
tfm-rubygem-deacon-1.0.0-4.el7sat.src.rpm
tfm-rubygem-deep_cloneable-2.3.2-2.el7sat.src.rpm
tfm-rubygem-deface-1.3.2-1.el7sat.src.rpm
tfm-rubygem-diffy-3.0.1-6.el7sat.src.rpm
tfm-rubygem-docker-api-1.28.0-4.el7sat.src.rpm
tfm-rubygem-domain_name-0.5.20160310-4.el7sat.src.rpm
tfm-rubygem-dynflow-1.1.6-1.el7sat.src.rpm
tfm-rubygem-excon-0.58.0-3.el7sat.src.rpm
tfm-rubygem-extlib-0.9.16-6.el7sat.src.rpm
tfm-rubygem-facter-2.4.0-6.el7sat.src.rpm
tfm-rubygem-faraday-0.9.1-6.el7sat.src.rpm
tfm-rubygem-fast_gettext-1.4.1-3.el7sat.src.rpm
tfm-rubygem-ffi-1.4.0-12.el7sat.src.rpm
tfm-rubygem-fog-1.42.1-2.el7sat.src.rpm
tfm-rubygem-fog-aws-1.3.0-3.el7sat.src.rpm
tfm-rubygem-fog-core-1.45.0-3.el7sat.src.rpm
tfm-rubygem-fog-digitalocean-0.3.0-3.el7sat.src.rpm
tfm-rubygem-fog-google-0.1.0-5.el7sat.src.rpm
tfm-rubygem-fog-json-1.0.2-10.el7sat.src.rpm
tfm-rubygem-fog-libvirt-0.4.1-3.el7sat.src.rpm
tfm-rubygem-fog-openstack-0.1.25-3.el7sat.src.rpm
tfm-rubygem-fog-ovirt-1.1.2-2.el7sat.src.rpm
tfm-rubygem-fog-rackspace-0.1.4-3.el7sat.src.rpm
tfm-rubygem-fog-vsphere-2.4.0-1.el7sat.src.rpm
tfm-rubygem-fog-xenserver-0.2.3-4.el7sat.src.rpm
tfm-rubygem-fog-xml-0.1.2-7.el7sat.src.rpm
tfm-rubygem-foreman-tasks-0.14.4.6-1.el7sat.src.rpm
tfm-rubygem-foreman-tasks-core-0.2.5-2.el7sat.src.rpm
tfm-rubygem-foreman_ansible-2.2.14-2.el7sat.src.rpm
tfm-rubygem-foreman_ansible_core-2.1.2-2.el7sat.src.rpm
tfm-rubygem-foreman_bootdisk-14.0.0.2-1.el7sat.src.rpm
tfm-rubygem-foreman_discovery-14.0.1-1.el7sat.src.rpm
tfm-rubygem-foreman_docker-4.1.0-2.el7sat.src.rpm
tfm-rubygem-foreman_hooks-0.3.15-1.el7sat.src.rpm
tfm-rubygem-foreman_openscap-0.11.5.1-1.el7sat.src.rpm
tfm-rubygem-foreman_remote_execution-1.6.7-19.el7sat.src.rpm
tfm-rubygem-foreman_remote_execution_core-1.1.4-1.el7sat.src.rpm
tfm-rubygem-foreman_templates-6.0.3-2.el7sat.src.rpm
tfm-rubygem-foreman_theme_satellite-3.0.1.13-1.el7sat.src.rpm
tfm-rubygem-foreman_virt_who_configure-0.3.2-1.el7sat.src.rpm
tfm-rubygem-formatador-0.2.1-11.el7sat.src.rpm
tfm-rubygem-friendly_id-5.2.4-2.el7sat.src.rpm
tfm-rubygem-get_process_mem-0.2.1-3.el7sat.src.rpm
tfm-rubygem-gettext_i18n_rails-1.2.1-5.el7sat.src.rpm
tfm-rubygem-git-1.2.5-9.el7sat.src.rpm
tfm-rubygem-google-api-client-0.8.2-11.el7sat.src.rpm
tfm-rubygem-gssapi-1.2.0-5.el7sat.src.rpm
tfm-rubygem-hammer_cli-0.15.1.2-1.el7sat.src.rpm
tfm-rubygem-hammer_cli_csv-2.3.1-3.el7sat.src.rpm
tfm-rubygem-hammer_cli_foreman-0.15.1.1-1.el7sat.src.rpm
tfm-rubygem-hammer_cli_foreman_admin-0.0.8-3.el7sat.src.rpm
tfm-rubygem-hammer_cli_foreman_ansible-0.1.1-3.el7sat.src.rpm
tfm-rubygem-hammer_cli_foreman_bootdisk-0.1.3.3-5.el7sat.src.rpm
tfm-rubygem-hammer_cli_foreman_discovery-1.0.0-3.el7sat.src.rpm
tfm-rubygem-hammer_cli_foreman_docker-0.0.6.1-1.el7sat.src.rpm
tfm-rubygem-hammer_cli_foreman_openscap-0.1.6-2.el7sat.src.rpm
tfm-rubygem-hammer_cli_foreman_remote_execution-0.1.0-2.el7sat.src.rpm
tfm-rubygem-hammer_cli_foreman_tasks-0.0.13-1.el7sat.src.rpm
tfm-rubygem-hammer_cli_foreman_templates-0.1.2-1.el7sat.src.rpm
tfm-rubygem-hammer_cli_foreman_virt_who_configure-0.0.3-3.el7sat.src.rpm
tfm-rubygem-hammer_cli_katello-0.16.0.11-1.el7sat.src.rpm
tfm-rubygem-hashie-3.6.0-1.el7sat.src.rpm
tfm-rubygem-highline-1.7.8-4.el7sat.src.rpm
tfm-rubygem-http-cookie-1.0.2-5.el7sat.src.rpm
tfm-rubygem-ipaddress-0.8.0-11.el7sat.src.rpm
tfm-rubygem-jgrep-1.3.3-12.el7sat.src.rpm
tfm-rubygem-journald-logger-2.0.4-1.el7sat.src.rpm
tfm-rubygem-journald-native-1.0.11-1.el7sat.src.rpm
tfm-rubygem-jwt-1.2.1-1.el7sat.src.rpm
tfm-rubygem-katello-3.10.0.46-1.el7sat.src.rpm
tfm-rubygem-launchy-2.4.3-6.el7sat.src.rpm
tfm-rubygem-ldap_fluff-0.4.7-3.el7sat.src.rpm
tfm-rubygem-little-plugger-1.1.3-23.el7sat.src.rpm
tfm-rubygem-locale-2.0.9-13.el7sat.src.rpm
tfm-rubygem-logging-2.2.2-5.el7sat.src.rpm
tfm-rubygem-logging-journald-2.0.0-1.el7sat.src.rpm
tfm-rubygem-multipart-post-1.2.0-6.el7sat.src.rpm
tfm-rubygem-net-ldap-0.15.0-3.el7sat.src.rpm
tfm-rubygem-net-ping-2.0.1-3.el7sat.src.rpm
tfm-rubygem-net-scp-1.2.1-3.el7sat.src.rpm
tfm-rubygem-net-ssh-4.0.1-5.el7sat.src.rpm
tfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.src.rpm
tfm-rubygem-netrc-0.11.0-3.el7sat.src.rpm
tfm-rubygem-oauth-0.5.4-3.el7sat.src.rpm
tfm-rubygem-ovirt-engine-sdk-4.2.3-3.el7sat.src.rpm
tfm-rubygem-ovirt_provision_plugin-2.0.3-1.el7sat.src.rpm
tfm-rubygem-parse-cron-0.1.4-4.el7sat.src.rpm
tfm-rubygem-passenger-4.0.18-25.el7sat.src.rpm
tfm-rubygem-pg-0.21.0-3.el7sat.src.rpm
tfm-rubygem-polyglot-0.3.5-3.el7sat.src.rpm
tfm-rubygem-powerbar-2.0.1-1.el7sat.src.rpm
tfm-rubygem-prometheus-client-0.7.1-3.el7sat.src.rpm
tfm-rubygem-qpid_messaging-1.36.0-9.el7sat.src.rpm
tfm-rubygem-quantile-0.2.0-3.el7sat.src.rpm
tfm-rubygem-rabl-0.13.1-2.el7sat.src.rpm
tfm-rubygem-rack-jsonp-1.3.1-7.el7sat.src.rpm
tfm-rubygem-rails-i18n-5.1.1-2.el7sat.src.rpm
tfm-rubygem-rainbow-2.2.1-5.el7sat.src.rpm
tfm-rubygem-rbovirt-0.1.7-2.el7sat.src.rpm
tfm-rubygem-rbvmomi-1.10.0-3.el7sat.src.rpm
tfm-rubygem-record_tag_helper-1.0.0-2.el7sat.src.rpm
tfm-rubygem-redhat_access-2.2.4-1.el7sat.src.rpm
tfm-rubygem-redhat_access_lib-1.1.4-3.el7sat.src.rpm
tfm-rubygem-responders-2.4.0-2.el7sat.src.rpm
tfm-rubygem-rest-client-2.0.1-3.el7sat.src.rpm
tfm-rubygem-retriable-1.4.1-6.el7sat.src.rpm
tfm-rubygem-roadie-3.2.2-2.el7sat.src.rpm
tfm-rubygem-roadie-rails-1.3.0-2.el7sat.src.rpm
tfm-rubygem-robotex-1.0.0-21.el7sat.src.rpm
tfm-rubygem-ruby-libvirt-0.7.0-4.el7sat.src.rpm
tfm-rubygem-ruby2ruby-2.4.0-2.el7sat.src.rpm
tfm-rubygem-ruby_parser-3.10.1-2.el7sat.src.rpm
tfm-rubygem-runcible-2.11.1-1.el7sat.src.rpm
tfm-rubygem-safemode-1.3.5-2.el7sat.src.rpm
tfm-rubygem-scoped_search-4.1.6-1.el7sat.src.rpm
tfm-rubygem-secure_headers-6.0.0-1.el7sat.src.rpm
tfm-rubygem-sequel-5.7.1-2.el7sat.src.rpm
tfm-rubygem-sexp_processor-4.10.0-5.el7sat.src.rpm
tfm-rubygem-signet-0.6.0-10.el7sat.src.rpm
tfm-rubygem-smart_proxy_dynflow_core-0.2.1-5.el7sat.src.rpm
tfm-rubygem-sshkey-1.9.0-3.el7sat.src.rpm
tfm-rubygem-statsd-instrument-2.1.4-2.el7sat.src.rpm
tfm-rubygem-trollop-2.1.2-3.el7sat.src.rpm
tfm-rubygem-unf-0.1.3-7.el7sat.src.rpm
tfm-rubygem-unf_ext-0.0.6-9.el7sat.src.rpm
tfm-rubygem-unicode-0.4.4.1-6.el7sat.src.rpm
tfm-rubygem-unicode-display_width-1.0.5-5.el7sat.src.rpm
tfm-rubygem-validates_lengths_from_database-0.5.0-5.el7sat.src.rpm
tfm-rubygem-webpack-rails-0.9.8-5.el7sat.src.rpm
tfm-rubygem-wicked-1.3.3-1.el7sat.src.rpm
tfm-rubygem-will_paginate-3.1.5-3.el7sat.src.rpm
tfm-rubygem-x-editable-rails-1.5.5-4.el7sat.src.rpm
noarch:
SOAPpy-0.11.6-17.el7.noarch.rpm
ansiblerole-insights-client-1.6-1.el7sat.noarch.rpm
candlepin-2.5.15-1.el7sat.noarch.rpm
candlepin-selinux-2.5.15-1.el7sat.noarch.rpm
foreman-1.20.1.34-1.el7sat.noarch.rpm
foreman-bootloaders-redhat-201801241201-4.el7sat.noarch.rpm
foreman-bootloaders-redhat-tftpboot-201801241201-4.el7sat.noarch.rpm
foreman-cli-1.20.1.34-1.el7sat.noarch.rpm
foreman-compute-1.20.1.34-1.el7sat.noarch.rpm
foreman-debug-1.20.1.34-1.el7sat.noarch.rpm
foreman-discovery-image-3.5.4-2.el7sat.noarch.rpm
foreman-ec2-1.20.1.34-1.el7sat.noarch.rpm
foreman-gce-1.20.1.34-1.el7sat.noarch.rpm
foreman-installer-1.20.0-2.el7sat.noarch.rpm
foreman-installer-katello-3.10.0.7-1.el7sat.noarch.rpm
foreman-journald-1.20.1.34-1.el7sat.noarch.rpm
foreman-libvirt-1.20.1.34-1.el7sat.noarch.rpm
foreman-openstack-1.20.1.34-1.el7sat.noarch.rpm
foreman-ovirt-1.20.1.34-1.el7sat.noarch.rpm
foreman-postgresql-1.20.1.34-1.el7sat.noarch.rpm
foreman-proxy-1.20.0-1.el7sat.noarch.rpm
foreman-proxy-content-3.10.0-0.6.rc1.el7sat.noarch.rpm
foreman-rackspace-1.20.1.34-1.el7sat.noarch.rpm
foreman-selinux-1.20.0-1.el7sat.noarch.rpm
foreman-telemetry-1.20.1.34-1.el7sat.noarch.rpm
foreman-vmware-1.20.1.34-1.el7sat.noarch.rpm
katello-3.10.0-0.6.rc1.el7sat.noarch.rpm
katello-certs-tools-2.4.0-2.el7sat.noarch.rpm
katello-client-bootstrap-1.7.2-1.el7sat.noarch.rpm
katello-common-3.10.0-0.6.rc1.el7sat.noarch.rpm
katello-debug-3.10.0-0.6.rc1.el7sat.noarch.rpm
katello-installer-base-3.10.0.7-1.el7sat.noarch.rpm
katello-selinux-3.0.3-2.el7sat.noarch.rpm
katello-service-3.10.0-0.6.rc1.el7sat.noarch.rpm
kobo-0.5.1-1.el7sat.noarch.rpm
liquibase-3.1.0-1.el7.noarch.rpm
pulp-admin-client-2.18.1.1-1.el7sat.noarch.rpm
pulp-docker-admin-extensions-3.2.2-1.el7sat.noarch.rpm
pulp-docker-plugins-3.2.2-1.el7sat.noarch.rpm
pulp-katello-1.0.2-5.el7sat.noarch.rpm
pulp-maintenance-2.18.1.1-1.el7sat.noarch.rpm
pulp-ostree-admin-extensions-1.3.1-1.el7sat.noarch.rpm
pulp-ostree-plugins-1.3.1-1.el7sat.noarch.rpm
pulp-puppet-admin-extensions-2.18.1-2.el7sat.noarch.rpm
pulp-puppet-plugins-2.18.1-2.el7sat.noarch.rpm
pulp-puppet-tools-2.18.1-2.el7sat.noarch.rpm
pulp-rpm-admin-extensions-2.18.1.5-1.el7sat.noarch.rpm
pulp-rpm-plugins-2.18.1.5-1.el7sat.noarch.rpm
pulp-selinux-2.18.1.1-1.el7sat.noarch.rpm
pulp-server-2.18.1.1-1.el7sat.noarch.rpm
puppet-agent-oauth-0.5.1-3.el7sat.noarch.rpm
puppet-foreman_scap_client-0.3.19-1.el7sat.noarch.rpm
puppetlabs-stdlib-4.25.1-1.el7sat.noarch.rpm
puppetserver-5.3.6-3.el7sat.noarch.rpm
python-anyjson-0.3.3-5.el7sat.noarch.rpm
python-blinker-1.3-2.el7sat.noarch.rpm
python-crane-3.3.0-0.1.rc.el7sat.noarch.rpm
python-flask-0.10.1-4.el7sat.noarch.rpm
python-fpconst-0.7.3-12.el7.noarch.rpm
python-gnupg-0.3.7-1.el7ui.noarch.rpm
python-gofer-2.12.5-3.el7sat.noarch.rpm
python-gofer-qpid-2.12.5-3.el7sat.noarch.rpm
python-isodate-0.5.0-5.pulp.el7sat.noarch.rpm
python-itsdangerous-0.23-1.el7sat.noarch.rpm
python-kid-0.9.6-11.el7sat.noarch.rpm
python-mongoengine-0.10.5-2.el7sat.noarch.rpm
python-nectar-1.5.6-1.el7sat.noarch.rpm
python-oauth2-1.5.211-8.el7sat.noarch.rpm
python-okaara-1.0.32-1.el7sat.noarch.rpm
python-pulp-bindings-2.18.1.1-1.el7sat.noarch.rpm
python-pulp-client-lib-2.18.1.1-1.el7sat.noarch.rpm
python-pulp-common-2.18.1.1-1.el7sat.noarch.rpm
python-pulp-docker-common-3.2.2-1.el7sat.noarch.rpm
python-pulp-integrity-2.18.1.5-1.el7sat.noarch.rpm
python-pulp-oid_validation-2.18.1.1-1.el7sat.noarch.rpm
python-pulp-ostree-common-1.3.1-1.el7sat.noarch.rpm
python-pulp-puppet-common-2.18.1-2.el7sat.noarch.rpm
python-pulp-repoauth-2.18.1.1-1.el7sat.noarch.rpm
python-pulp-rpm-common-2.18.1.5-1.el7sat.noarch.rpm
python-pulp-streamer-2.18.1.1-1.el7sat.noarch.rpm
python-qpid-1.35.0-5.el7.noarch.rpm
python-semantic_version-2.2.0-6.el7sat.noarch.rpm
python-werkzeug-0.9.1-1.el7sat.noarch.rpm
python2-amqp-2.2.2-3.el7sat.noarch.rpm
python2-celery-4.0.2-5.el7sat.noarch.rpm
python2-django-1.11.13-1.el7sat.noarch.rpm
python2-kombu-4.0.2-12.el7sat.noarch.rpm
python2-vine-1.1.3-4.el7sat.noarch.rpm
qpid-dispatch-tools-1.5.0-4.el7.noarch.rpm
qpid-tools-1.36.0-24.el7amq.noarch.rpm
redhat-access-insights-puppet-0.0.9-3.el7sat.noarch.rpm
repoview-0.6.6-4.el7sat.noarch.rpm
rhel8-kickstart-setup-0.0.2-1.el7sat.noarch.rpm
rubygem-ansi-1.4.3-3.el7sat.noarch.rpm
rubygem-bundler_ext-0.4.1-3.el7sat.noarch.rpm
rubygem-clamp-1.1.2-2.el7sat.noarch.rpm
rubygem-concurrent-ruby-1.0.3-6.el7sat.noarch.rpm
rubygem-faraday-0.9.1-6.el7sat.noarch.rpm
rubygem-faraday_middleware-0.10.0-4.el7sat.noarch.rpm
rubygem-fast_gettext-1.1.0-4.el7sat.noarch.rpm
rubygem-foreman_scap_client-0.4.5-1.el7sat.noarch.rpm
rubygem-gssapi-1.1.2-4.el7sat.noarch.rpm
rubygem-hashie-2.0.5-5.el7sat.noarch.rpm
rubygem-highline-1.7.8-3.el7sat.noarch.rpm
rubygem-infoblox-2.0.4-1.el7sat.noarch.rpm
rubygem-jwt-1.2.1-1.el7sat.noarch.rpm
rubygem-kafo-2.1.0-1.el7sat.noarch.rpm
rubygem-kafo_parsers-0.1.6-1.el7sat.noarch.rpm
rubygem-kafo_wizards-0.0.1-2.el7sat.noarch.rpm
rubygem-little-plugger-1.1.3-22.el7sat.noarch.rpm
rubygem-logging-2.2.2-1.el7sat.noarch.rpm
rubygem-mime-types-1.19-7.el7sat.noarch.rpm
rubygem-multi_json-1.12.2-2.el7sat.noarch.rpm
rubygem-multipart-post-1.2.0-6.el7sat.noarch.rpm
rubygem-netrc-0.7.7-9.el7sat.noarch.rpm
rubygem-oauth-0.5.4-2.el7sat.noarch.rpm
rubygem-openscap-0.4.7-3.el7sat.noarch.rpm
rubygem-powerbar-1.0.17-2.el7sat.noarch.rpm
rubygem-rack-1.6.4-3.el7sat.noarch.rpm
rubygem-rack-protection-1.5.3-4.el7sat.noarch.rpm
rubygem-rake-0.9.2.2-41.el7sat.noarch.rpm
rubygem-rb-inotify-0.9.7-4.el7sat.noarch.rpm
rubygem-rest-client-1.6.7-7.el7sat.noarch.rpm
rubygem-rsec-0.4.2-2.el7sat.noarch.rpm
rubygem-rubyipmi-0.10.0-2.el7sat.noarch.rpm
rubygem-sinatra-1.4.7-3.el7sat.noarch.rpm
rubygem-smart_proxy_ansible-2.0.3-2.el7sat.noarch.rpm
rubygem-smart_proxy_dhcp_infoblox-0.0.14-1.el7sat.noarch.rpm
rubygem-smart_proxy_dhcp_remote_isc-0.0.4-1.el7sat.noarch.rpm
rubygem-smart_proxy_discovery-1.0.4-5.el7sat.noarch.rpm
rubygem-smart_proxy_discovery_image-1.0.9-2.el7sat.noarch.rpm
rubygem-smart_proxy_dns_infoblox-0.0.7-1.el7sat.noarch.rpm
rubygem-smart_proxy_dynflow-0.2.1-2.el7sat.noarch.rpm
rubygem-smart_proxy_openscap-0.7.1-1.el7sat.noarch.rpm
rubygem-smart_proxy_pulp-1.3.0-3.el7sat.noarch.rpm
rubygem-smart_proxy_remote_execution_ssh-0.2.0-3.el7sat.noarch.rpm
rubygem-tilt-1.3.7-2.git.0.3b416c9.el7sat.noarch.rpm
satellite-6.5.0-11.el7sat.noarch.rpm
satellite-capsule-6.5.0-11.el7sat.noarch.rpm
satellite-cli-6.5.0-11.el7sat.noarch.rpm
satellite-common-6.5.0-11.el7sat.noarch.rpm
satellite-debug-tools-6.5.0-11.el7sat.noarch.rpm
satellite-installer-6.5.0.4-1.el7sat.noarch.rpm
tfm-ror52-rubygem-actioncable-5.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-actionmailer-5.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-actionpack-5.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-actionview-5.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-activejob-5.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-activemodel-5.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-activerecord-5.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-activestorage-5.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-activesupport-5.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-arel-9.0.0-1.el7sat.noarch.rpm
tfm-ror52-rubygem-builder-3.2.3-1.el7sat.noarch.rpm
tfm-ror52-rubygem-coffee-rails-4.2.2-1.el7sat.noarch.rpm
tfm-ror52-rubygem-coffee-script-2.4.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-coffee-script-source-1.12.2-1.el7sat.noarch.rpm
tfm-ror52-rubygem-concurrent-ruby-1.0.5-1.el7sat.noarch.rpm
tfm-ror52-rubygem-crass-1.0.4-1.el7sat.noarch.rpm
tfm-ror52-rubygem-erubi-1.7.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-execjs-2.7.0-1.el7sat.noarch.rpm
tfm-ror52-rubygem-globalid-0.4.1-3.el7sat.noarch.rpm
tfm-ror52-rubygem-i18n-1.0.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-loofah-2.2.2-2.el7sat.noarch.rpm
tfm-ror52-rubygem-mail-2.7.0-1.el7sat.noarch.rpm
tfm-ror52-rubygem-marcel-0.3.2-1.el7sat.noarch.rpm
tfm-ror52-rubygem-method_source-0.9.0-1.el7sat.noarch.rpm
tfm-ror52-rubygem-mime-types-3.2.2-1.el7sat.noarch.rpm
tfm-ror52-rubygem-mime-types-data-3.2018.0812-1.el7sat.noarch.rpm
tfm-ror52-rubygem-mimemagic-0.3.2-1.el7sat.noarch.rpm
tfm-ror52-rubygem-mini_mime-1.0.0-1.el7sat.noarch.rpm
tfm-ror52-rubygem-mini_portile2-2.3.0-1.el7sat.noarch.rpm
tfm-ror52-rubygem-multi_json-1.13.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-mustermann-1.0.2-1.el7sat.noarch.rpm
tfm-ror52-rubygem-rack-2.0.5-2.el7sat.noarch.rpm
tfm-ror52-rubygem-rack-protection-2.0.3-1.el7sat.noarch.rpm
tfm-ror52-rubygem-rack-test-1.1.0-1.el7sat.noarch.rpm
tfm-ror52-rubygem-rails-5.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-rails-dom-testing-2.0.3-3.el7sat.noarch.rpm
tfm-ror52-rubygem-rails-html-sanitizer-1.0.4-2.el7sat.noarch.rpm
tfm-ror52-rubygem-railties-5.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-sinatra-2.0.3-1.el7sat.noarch.rpm
tfm-ror52-rubygem-sprockets-3.7.2-3.el7sat.noarch.rpm
tfm-ror52-rubygem-sprockets-rails-3.2.1-1.el7sat.noarch.rpm
tfm-ror52-rubygem-thor-0.20.0-3.el7sat.noarch.rpm
tfm-ror52-rubygem-thread_safe-0.3.6-1.el7sat.noarch.rpm
tfm-ror52-rubygem-tilt-2.0.8-1.el7sat.noarch.rpm
tfm-ror52-rubygem-turbolinks-2.5.4-1.el7sat.noarch.rpm
tfm-ror52-rubygem-tzinfo-1.2.5-1.el7sat.noarch.rpm
tfm-ror52-rubygem-websocket-extensions-0.1.3-1.el7sat.noarch.rpm
tfm-rubygem-activerecord-import-1.0.0-3.el7sat.noarch.rpm
tfm-rubygem-activerecord-session_store-1.1.1-2.el7sat.noarch.rpm
tfm-rubygem-addressable-2.3.6-6.el7sat.noarch.rpm
tfm-rubygem-algebrick-0.7.3-6.el7sat.noarch.rpm
tfm-rubygem-ancestry-3.0.0-3.el7sat.noarch.rpm
tfm-rubygem-anemone-0.7.2-20.el7sat.noarch.rpm
tfm-rubygem-angular-rails-templates-1.0.2-4.el7sat.noarch.rpm
tfm-rubygem-apipie-bindings-0.2.2-2.el7sat.noarch.rpm
tfm-rubygem-apipie-params-0.0.5-5.el7sat.noarch.rpm
tfm-rubygem-apipie-rails-0.5.14-1.el7sat.noarch.rpm
tfm-rubygem-audited-4.7.1-2.el7sat.noarch.rpm
tfm-rubygem-autoparse-0.3.3-10.el7sat.noarch.rpm
tfm-rubygem-awesome_print-1.8.0-3.el7sat.noarch.rpm
tfm-rubygem-bastion-6.1.23-1.el7sat.noarch.rpm
tfm-rubygem-bundler_ext-0.4.1-4.el7sat.noarch.rpm
tfm-rubygem-clamp-1.1.2-4.el7sat.noarch.rpm
tfm-rubygem-concurrent-ruby-edge-0.2.4-2.el7sat.noarch.rpm
tfm-rubygem-css_parser-1.4.7-3.el7sat.noarch.rpm
tfm-rubygem-daemons-1.2.3-7.el7sat.noarch.rpm
tfm-rubygem-deacon-1.0.0-4.el7sat.noarch.rpm
tfm-rubygem-deep_cloneable-2.3.2-2.el7sat.noarch.rpm
tfm-rubygem-deface-1.3.2-1.el7sat.noarch.rpm
tfm-rubygem-diffy-3.0.1-6.el7sat.noarch.rpm
tfm-rubygem-docker-api-1.28.0-4.el7sat.noarch.rpm
tfm-rubygem-domain_name-0.5.20160310-4.el7sat.noarch.rpm
tfm-rubygem-dynflow-1.1.6-1.el7sat.noarch.rpm
tfm-rubygem-excon-0.58.0-3.el7sat.noarch.rpm
tfm-rubygem-extlib-0.9.16-6.el7sat.noarch.rpm
tfm-rubygem-faraday-0.9.1-6.el7sat.noarch.rpm
tfm-rubygem-fast_gettext-1.4.1-3.el7sat.noarch.rpm
tfm-rubygem-fog-1.42.1-2.el7sat.noarch.rpm
tfm-rubygem-fog-aws-1.3.0-3.el7sat.noarch.rpm
tfm-rubygem-fog-core-1.45.0-3.el7sat.noarch.rpm
tfm-rubygem-fog-digitalocean-0.3.0-3.el7sat.noarch.rpm
tfm-rubygem-fog-google-0.1.0-5.el7sat.noarch.rpm
tfm-rubygem-fog-json-1.0.2-10.el7sat.noarch.rpm
tfm-rubygem-fog-libvirt-0.4.1-3.el7sat.noarch.rpm
tfm-rubygem-fog-openstack-0.1.25-3.el7sat.noarch.rpm
tfm-rubygem-fog-ovirt-1.1.2-2.el7sat.noarch.rpm
tfm-rubygem-fog-rackspace-0.1.4-3.el7sat.noarch.rpm
tfm-rubygem-fog-vsphere-2.4.0-1.el7sat.noarch.rpm
tfm-rubygem-fog-xenserver-0.2.3-4.el7sat.noarch.rpm
tfm-rubygem-fog-xml-0.1.2-7.el7sat.noarch.rpm
tfm-rubygem-foreman-tasks-0.14.4.6-1.el7sat.noarch.rpm
tfm-rubygem-foreman-tasks-core-0.2.5-2.el7sat.noarch.rpm
tfm-rubygem-foreman_ansible-2.2.14-2.el7sat.noarch.rpm
tfm-rubygem-foreman_ansible_core-2.1.2-2.el7sat.noarch.rpm
tfm-rubygem-foreman_bootdisk-14.0.0.2-1.el7sat.noarch.rpm
tfm-rubygem-foreman_discovery-14.0.1-1.el7sat.noarch.rpm
tfm-rubygem-foreman_docker-4.1.0-2.el7sat.noarch.rpm
tfm-rubygem-foreman_hooks-0.3.15-1.el7sat.noarch.rpm
tfm-rubygem-foreman_openscap-0.11.5.1-1.el7sat.noarch.rpm
tfm-rubygem-foreman_remote_execution-1.6.7-19.el7sat.noarch.rpm
tfm-rubygem-foreman_remote_execution_core-1.1.4-1.el7sat.noarch.rpm
tfm-rubygem-foreman_templates-6.0.3-2.el7sat.noarch.rpm
tfm-rubygem-foreman_theme_satellite-3.0.1.13-1.el7sat.noarch.rpm
tfm-rubygem-foreman_virt_who_configure-0.3.2-1.el7sat.noarch.rpm
tfm-rubygem-formatador-0.2.1-11.el7sat.noarch.rpm
tfm-rubygem-friendly_id-5.2.4-2.el7sat.noarch.rpm
tfm-rubygem-get_process_mem-0.2.1-3.el7sat.noarch.rpm
tfm-rubygem-gettext_i18n_rails-1.2.1-5.el7sat.noarch.rpm
tfm-rubygem-git-1.2.5-9.el7sat.noarch.rpm
tfm-rubygem-google-api-client-0.8.2-11.el7sat.noarch.rpm
tfm-rubygem-gssapi-1.2.0-5.el7sat.noarch.rpm
tfm-rubygem-hammer_cli-0.15.1.2-1.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_csv-2.3.1-3.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_foreman-0.15.1.1-1.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_foreman_admin-0.0.8-3.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_foreman_ansible-0.1.1-3.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_foreman_bootdisk-0.1.3.3-5.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_foreman_discovery-1.0.0-3.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_foreman_docker-0.0.6.1-1.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_foreman_openscap-0.1.6-2.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_foreman_remote_execution-0.1.0-2.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_foreman_tasks-0.0.13-1.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_foreman_templates-0.1.2-1.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_foreman_virt_who_configure-0.0.3-3.el7sat.noarch.rpm
tfm-rubygem-hammer_cli_katello-0.16.0.11-1.el7sat.noarch.rpm
tfm-rubygem-hashie-3.6.0-1.el7sat.noarch.rpm
tfm-rubygem-highline-1.7.8-4.el7sat.noarch.rpm
tfm-rubygem-http-cookie-1.0.2-5.el7sat.noarch.rpm
tfm-rubygem-ipaddress-0.8.0-11.el7sat.noarch.rpm
tfm-rubygem-jgrep-1.3.3-12.el7sat.noarch.rpm
tfm-rubygem-journald-logger-2.0.4-1.el7sat.noarch.rpm
tfm-rubygem-jwt-1.2.1-1.el7sat.noarch.rpm
tfm-rubygem-katello-3.10.0.46-1.el7sat.noarch.rpm
tfm-rubygem-launchy-2.4.3-6.el7sat.noarch.rpm
tfm-rubygem-ldap_fluff-0.4.7-3.el7sat.noarch.rpm
tfm-rubygem-little-plugger-1.1.3-23.el7sat.noarch.rpm
tfm-rubygem-locale-2.0.9-13.el7sat.noarch.rpm
tfm-rubygem-logging-2.2.2-5.el7sat.noarch.rpm
tfm-rubygem-logging-journald-2.0.0-1.el7sat.noarch.rpm
tfm-rubygem-multipart-post-1.2.0-6.el7sat.noarch.rpm
tfm-rubygem-net-ldap-0.15.0-3.el7sat.noarch.rpm
tfm-rubygem-net-ping-2.0.1-3.el7sat.noarch.rpm
tfm-rubygem-net-scp-1.2.1-3.el7sat.noarch.rpm
tfm-rubygem-net-ssh-4.0.1-5.el7sat.noarch.rpm
tfm-rubygem-net-ssh-krb-0.4.0-3.el7sat.noarch.rpm
tfm-rubygem-netrc-0.11.0-3.el7sat.noarch.rpm
tfm-rubygem-oauth-0.5.4-3.el7sat.noarch.rpm
tfm-rubygem-ovirt_provision_plugin-2.0.3-1.el7sat.noarch.rpm
tfm-rubygem-parse-cron-0.1.4-4.el7sat.noarch.rpm
tfm-rubygem-polyglot-0.3.5-3.el7sat.noarch.rpm
tfm-rubygem-powerbar-2.0.1-1.el7sat.noarch.rpm
tfm-rubygem-prometheus-client-0.7.1-3.el7sat.noarch.rpm
tfm-rubygem-quantile-0.2.0-3.el7sat.noarch.rpm
tfm-rubygem-rabl-0.13.1-2.el7sat.noarch.rpm
tfm-rubygem-rack-jsonp-1.3.1-7.el7sat.noarch.rpm
tfm-rubygem-rails-i18n-5.1.1-2.el7sat.noarch.rpm
tfm-rubygem-rainbow-2.2.1-5.el7sat.noarch.rpm
tfm-rubygem-rbovirt-0.1.7-2.el7sat.noarch.rpm
tfm-rubygem-rbvmomi-1.10.0-3.el7sat.noarch.rpm
tfm-rubygem-record_tag_helper-1.0.0-2.el7sat.noarch.rpm
tfm-rubygem-redhat_access-2.2.4-1.el7sat.noarch.rpm
tfm-rubygem-redhat_access_lib-1.1.4-3.el7sat.noarch.rpm
tfm-rubygem-responders-2.4.0-2.el7sat.noarch.rpm
tfm-rubygem-rest-client-2.0.1-3.el7sat.noarch.rpm
tfm-rubygem-retriable-1.4.1-6.el7sat.noarch.rpm
tfm-rubygem-roadie-3.2.2-2.el7sat.noarch.rpm
tfm-rubygem-roadie-rails-1.3.0-2.el7sat.noarch.rpm
tfm-rubygem-robotex-1.0.0-21.el7sat.noarch.rpm
tfm-rubygem-ruby2ruby-2.4.0-2.el7sat.noarch.rpm
tfm-rubygem-ruby_parser-3.10.1-2.el7sat.noarch.rpm
tfm-rubygem-runcible-2.11.1-1.el7sat.noarch.rpm
tfm-rubygem-safemode-1.3.5-2.el7sat.noarch.rpm
tfm-rubygem-scoped_search-4.1.6-1.el7sat.noarch.rpm
tfm-rubygem-secure_headers-6.0.0-1.el7sat.noarch.rpm
tfm-rubygem-sequel-5.7.1-2.el7sat.noarch.rpm
tfm-rubygem-sexp_processor-4.10.0-5.el7sat.noarch.rpm
tfm-rubygem-signet-0.6.0-10.el7sat.noarch.rpm
tfm-rubygem-smart_proxy_dynflow_core-0.2.1-5.el7sat.noarch.rpm
tfm-rubygem-sshkey-1.9.0-3.el7sat.noarch.rpm
tfm-rubygem-statsd-instrument-2.1.4-2.el7sat.noarch.rpm
tfm-rubygem-trollop-2.1.2-3.el7sat.noarch.rpm
tfm-rubygem-unf-0.1.3-7.el7sat.noarch.rpm
tfm-rubygem-unicode-display_width-1.0.5-5.el7sat.noarch.rpm
tfm-rubygem-validates_lengths_from_database-0.5.0-5.el7sat.noarch.rpm
tfm-rubygem-webpack-rails-0.9.8-5.el7sat.noarch.rpm
tfm-rubygem-wicked-1.3.3-1.el7sat.noarch.rpm
tfm-rubygem-will_paginate-3.1.5-3.el7sat.noarch.rpm
tfm-rubygem-x-editable-rails-1.5.5-4.el7sat.noarch.rpm
x86_64:
createrepo_c-0.7.4-1.el7sat.x86_64.rpm
createrepo_c-debuginfo-0.7.4-1.el7sat.x86_64.rpm
createrepo_c-libs-0.7.4-1.el7sat.x86_64.rpm
hfsplus-tools-332.14-12.el7.x86_64.rpm
hfsplus-tools-debuginfo-332.14-12.el7.x86_64.rpm
libmodulemd-1.6.3-1.el7sat.x86_64.rpm
libmodulemd-debuginfo-1.6.3-1.el7sat.x86_64.rpm
libsolv-0.6.34-2.pulp.el7sat.x86_64.rpm
libsolv-debuginfo-0.6.34-2.pulp.el7sat.x86_64.rpm
libwebsockets-2.4.2-2.el7.x86_64.rpm
libwebsockets-debuginfo-2.4.2-2.el7.x86_64.rpm
livecd-tools-20.4-1.6.el7sat.x86_64.rpm
mod_passenger-4.0.18-24.el7sat.x86_64.rpm
mod_xsendfile-0.12-10.el7sat.x86_64.rpm
mod_xsendfile-debuginfo-0.12-10.el7sat.x86_64.rpm
ostree-2017.1-2.atomic.el7.x86_64.rpm
ostree-debuginfo-2017.1-2.atomic.el7.x86_64.rpm
pcp-mmvstatsd-0.4-2.el7sat.x86_64.rpm
puppet-agent-5.5.12-1.el7sat.x86_64.rpm
python-billiard-debuginfo-3.5.0.3-3.el7sat.x86_64.rpm
python-bson-3.2-2.el7sat.x86_64.rpm
python-imgcreate-20.4-1.6.el7sat.x86_64.rpm
python-pymongo-3.2-2.el7sat.x86_64.rpm
python-pymongo-debuginfo-3.2-2.el7sat.x86_64.rpm
python-pymongo-gridfs-3.2-2.el7sat.x86_64.rpm
python-qpid-proton-0.26.0-3.el7.x86_64.rpm
python-qpid-qmf-1.36.0-24.el7amq.x86_64.rpm
python-saslwrapper-0.22-5.el7sat.x86_64.rpm
python-simplejson-3.2.0-1.el7sat.x86_64.rpm
python-simplejson-debuginfo-3.2.0-1.el7sat.x86_64.rpm
python-twisted-core-12.2.0-4.el7.x86_64.rpm
python-twisted-core-debuginfo-12.2.0-4.el7.x86_64.rpm
python-twisted-web-12.1.0-5.el7_2.x86_64.rpm
python-zope-interface-4.0.5-4.el7.x86_64.rpm
python-zope-interface-debuginfo-4.0.5-4.el7.x86_64.rpm
python2-billiard-3.5.0.3-3.el7sat.x86_64.rpm
python2-solv-0.6.34-2.pulp.el7sat.x86_64.rpm
qpid-cpp-client-1.36.0-24.el7amq.x86_64.rpm
qpid-cpp-client-devel-1.36.0-24.el7amq.x86_64.rpm
qpid-cpp-debuginfo-1.36.0-24.el7amq.x86_64.rpm
qpid-cpp-server-1.36.0-24.el7amq.x86_64.rpm
qpid-cpp-server-linearstore-1.36.0-24.el7amq.x86_64.rpm
qpid-dispatch-debuginfo-1.5.0-4.el7.x86_64.rpm
qpid-dispatch-router-1.5.0-4.el7.x86_64.rpm
qpid-proton-c-0.26.0-3.el7.x86_64.rpm
qpid-proton-debuginfo-0.26.0-3.el7.x86_64.rpm
qpid-qmf-1.36.0-24.el7amq.x86_64.rpm
rubygem-facter-2.4.1-2.el7sat.x86_64.rpm
rubygem-ffi-1.4.0-3.el7sat.x86_64.rpm
rubygem-ffi-debuginfo-1.4.0-3.el7sat.x86_64.rpm
rubygem-newt-0.9.6-3.el7sat.x86_64.rpm
rubygem-newt-debuginfo-0.9.6-3.el7sat.x86_64.rpm
rubygem-passenger-4.0.18-24.el7sat.x86_64.rpm
rubygem-passenger-debuginfo-4.0.18-24.el7sat.x86_64.rpm
rubygem-passenger-native-4.0.18-24.el7sat.x86_64.rpm
rubygem-passenger-native-libs-4.0.18-24.el7sat.x86_64.rpm
rubygem-rkerberos-0.1.3-5.el7sat.x86_64.rpm
rubygem-rkerberos-debuginfo-0.1.3-5.el7sat.x86_64.rpm
saslwrapper-0.22-5.el7sat.x86_64.rpm
saslwrapper-debuginfo-0.22-5.el7sat.x86_64.rpm
tfm-ror52-rubygem-nio4r-2.3.1-1.el7sat.x86_64.rpm
tfm-ror52-rubygem-nio4r-debuginfo-2.3.1-1.el7sat.x86_64.rpm
tfm-ror52-rubygem-nokogiri-1.8.4-2.el7sat.x86_64.rpm
tfm-ror52-rubygem-nokogiri-debuginfo-1.8.4-2.el7sat.x86_64.rpm
tfm-ror52-rubygem-sqlite3-1.3.13-1.el7sat.x86_64.rpm
tfm-ror52-rubygem-sqlite3-debuginfo-1.3.13-1.el7sat.x86_64.rpm
tfm-ror52-rubygem-websocket-driver-0.7.0-1.el7sat.x86_64.rpm
tfm-ror52-rubygem-websocket-driver-debuginfo-0.7.0-1.el7sat.x86_64.rpm
tfm-ror52-runtime-1.0-4.el7sat.x86_64.rpm
tfm-rubygem-facter-2.4.0-6.el7sat.x86_64.rpm
tfm-rubygem-ffi-1.4.0-12.el7sat.x86_64.rpm
tfm-rubygem-ffi-debuginfo-1.4.0-12.el7sat.x86_64.rpm
tfm-rubygem-journald-native-1.0.11-1.el7sat.x86_64.rpm
tfm-rubygem-journald-native-debuginfo-1.0.11-1.el7sat.x86_64.rpm
tfm-rubygem-ovirt-engine-sdk-4.2.3-3.el7sat.x86_64.rpm
tfm-rubygem-ovirt-engine-sdk-debuginfo-4.2.3-3.el7sat.x86_64.rpm
tfm-rubygem-passenger-4.0.18-25.el7sat.x86_64.rpm
tfm-rubygem-passenger-debuginfo-4.0.18-25.el7sat.x86_64.rpm
tfm-rubygem-passenger-native-4.0.18-25.el7sat.x86_64.rpm
tfm-rubygem-passenger-native-libs-4.0.18-25.el7sat.x86_64.rpm
tfm-rubygem-pg-0.21.0-3.el7sat.x86_64.rpm
tfm-rubygem-pg-debuginfo-0.21.0-3.el7sat.x86_64.rpm
tfm-rubygem-qpid_messaging-1.36.0-9.el7sat.x86_64.rpm
tfm-rubygem-qpid_messaging-debuginfo-1.36.0-9.el7sat.x86_64.rpm
tfm-rubygem-ruby-libvirt-0.7.0-4.el7sat.x86_64.rpm
tfm-rubygem-ruby-libvirt-debuginfo-0.7.0-4.el7sat.x86_64.rpm
tfm-rubygem-unf_ext-0.0.6-9.el7sat.x86_64.rpm
tfm-rubygem-unf_ext-debuginfo-0.0.6-9.el7sat.x86_64.rpm
tfm-rubygem-unicode-0.4.4.1-6.el7sat.x86_64.rpm
tfm-rubygem-unicode-debuginfo-0.4.4.1-6.el7sat.x86_64.rpm
tfm-runtime-5.0-3.el7sat.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2016-6346
https://access.redhat.com/security/cve/CVE-2018-10917
https://access.redhat.com/security/cve/CVE-2018-14664
https://access.redhat.com/security/cve/CVE-2018-16861
https://access.redhat.com/security/cve/CVE-2018-16887
https://access.redhat.com/security/cve/CVE-2019-3891
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_satellite/6.5/html/release_notes/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=yyuT
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201808-0310 | CVE-2018-0409 | Cisco Unified Communications Manager IM & Presence Service and Cisco TelePresence Video Communication Server and Expressway Buffer error vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the XCP Router service of the Cisco Unified Communications Manager IM & Presence Service (CUCM IM&P) and the Cisco TelePresence Video Communication Server (VCS) and Expressway could allow an unauthenticated, remote attacker to cause a temporary service outage for all IM&P users, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a malicious IPv4 or IPv6 packet to an affected device on TCP port 7400. An exploit could allow the attacker to overread a buffer, resulting in a crash and restart of the XCP Router service. Cisco Bug IDs: CSCvg97663, CSCvi55947. Vendors have confirmed this vulnerability Bug ID CSCvg97663 and CSCvi55947 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Cisco Products are prone to a denial-of-service vulnerability. TelePresence Video Communication Server (VCS) and Expressway is a telepresence video communication server
| VAR-201808-0311 | CVE-2018-0410 | Cisco Web Security Appliances of AsyncOS Vulnerability related to resource depletion in software |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected system. The vulnerability exists because the affected software improperly manages memory resources for TCP connections to a targeted device. An attacker could exploit this vulnerability by establishing a high number of TCP connections to the data interface of an affected device via IPv4 or IPv6. A successful exploit could allow the attacker to exhaust system memory, which could cause the system to stop processing new connections and result in a DoS condition. System recovery may require manual intervention. Cisco Bug IDs: CSCvf36610. Vendors report this vulnerability Bug ID CSCvf36610 Published as.Denial of service (DoS) May be in a state. The device provides SaaS-based access control, real-time network reporting and tracking, and security policy development.
Attackers can exploit this issue to cause denial-of-service condition, denying service to legitimate users. AsyncOS Software is a set of operating systems running on it
| VAR-201808-0313 | CVE-2018-0367 | Cisco Registered Envelope Service Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A vulnerability in the web-based management interface of the Cisco Registered Envelope Service could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected service. The vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. Cisco Bug IDs: CVE-2018-0367. Vendors have confirmed this vulnerability Bug ID CSCvi34599 It is released as.Information may be obtained and information may be altered. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. The product includes read receipts for mail, mail recycling, mail forwarding and replying, and smartphone support
| VAR-201808-0295 | CVE-2018-0386 | Cisco Unified Communications Domain Manager Software Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in Cisco Unified Communications Domain Manager Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on an affected system. The vulnerability is due to improper validation of input that is passed to the affected software. An attacker could exploit this vulnerability by persuading a user of the affected software to access a malicious URL. A successful exploit could allow the attacker to access sensitive, browser-based information on the affected system or perform arbitrary actions in the affected software in the security context of the user. Cisco Bug IDs: CSCvh49694. Vendors have confirmed this vulnerability Bug ID CSCvh49694 It is released as.Information may be obtained and information may be altered. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This component features scalable, distributed, and highly available enterprise Voice over IP call processing
| VAR-201808-0300 | CVE-2018-0415 | Cisco Small Business 100 Series and Small Business 300 Series wireless access point error handling vulnerability |
CVSS V2: 5.5 CVSS V3: 6.8 Severity: MEDIUM |
A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper processing of certain EAPOL frames. An attacker could exploit this vulnerability by sending a stream of crafted EAPOL frames to an affected device. A successful exploit could allow the attacker to force the access point (AP) to disassociate all the associated stations (STAs) and to disallow future, new association requests. Cisco Bug IDs: CSCvj97472. Vendors have confirmed this vulnerability Bug ID CSCvj97472 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. A denial of service vulnerability exists in the implementation of the ExtensibleAuthenticationProtocoloverLAN (EAPOL) feature in CiscoSmallBusiness100SeriesWirelessAccessPoints and SmallBusiness300SeriesWirelessAccessPoints, which stems from a program not properly processing EAPOL frames. Multiple Cisco Products are prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause a denial-of-service condition
| VAR-201808-0301 | CVE-2018-0418 | Cisco ASR 9000 Series Aggregation Services Routers Local Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A vulnerability in the Local Packet Transport Services (LPTS) feature set of Cisco ASR 9000 Series Aggregation Services Router Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input and validation checking on certain Precision Time Protocol (PTP) ingress traffic to an affected device. An attacker could exploit this vulnerability by injecting malformed traffic into an affected device. A successful exploit could allow the attacker to cause services on the device to become unresponsive, resulting in a DoS condition. Cisco Bug IDs: CSCvj22858. Cisco ASR 9000 There are vulnerabilities related to input validation and resource exhaustion in the series. Vendors have confirmed this vulnerability Bug ID CSCvj22858 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco IOSXR for Cisco ASR9000 Series Aggregation Services Routers is an operating system running on 9000 Series routers. The LocalPacketTransportServices(LPTS) featureset in CiscoASR9000SeriesAggregationServicesRouterSoftware has a denial of service vulnerability
| VAR-201808-0302 | CVE-2018-0419 | Cisco Email Security Appliances Input validation vulnerability |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in certain attachment detection mechanisms of Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of an affected system. The vulnerability is due to the improper detection of content within executable (EXE) files. An attacker could exploit this vulnerability by sending a customized EXE file that is not recognized and blocked by the ESA. A successful exploit could allow an attacker to send email messages that contain malicious executable files to unsuspecting users. Cisco Bug IDs: CSCvh03786. Vendors have confirmed this vulnerability Bug ID CSCvh03786 It is released as.Information may be tampered with. The device provides spam protection, email encryption, and data loss prevention.
An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks
| VAR-201808-0956 | CVE-2018-9129 | ZyXEL ZyWALL/USG Cryptographic vulnerability in series devices |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
ZyXEL ZyWALL/USG series devices have a Bleichenbacher vulnerability in their Internet Key Exchange (IKE) handshake implementation used for IPsec based VPN connections. ZyXEL ZyWALL/USG Series devices contain cryptographic vulnerabilities.Information may be tampered with. ZyXEL ZyWALL/USG is a network security firewall device of ZyXEL Technology Company. An attacker could exploit this vulnerability to retrieve the IKEv1 session key and decrypt the connection
| VAR-201808-0303 | CVE-2018-0427 | Cisco Digital Network Architecture Center Input validation vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the CronJob scheduler API of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to perform a command injection attack. The vulnerability is due to incorrect input validation of user-supplied data. An attacker could exploit this vulnerability by sending a malicious packet. A successful exploit could allow the attacker to execute arbitrary commands with root privileges. Cisco Bug IDs: CSCvi42263. Vendors have confirmed this vulnerability Bug ID CSCvi42263 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The solution scales and protects devices, applications, and more within the network
| VAR-201808-0631 | CVE-2018-15172 |
TP-Link WR840N Device buffer error vulnerability
Related entries in the VARIoT exploits database: VAR-E-201808-0273 |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
TP-Link WR840N devices have a buffer overflow via a long Authorization HTTP header. TP-Link WR840N The device contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The TP-LinkWR840N is a wireless router product from China Unicom (TP-LINK). A buffer overflow vulnerability exists in TP-LinkWR840N. An attacker could exploit the vulnerability to cause a denial of service
| VAR-201808-0304 | CVE-2018-0428 | Cisco Web Security Appliance Access control vulnerability |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the account management subsystem of Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. The vulnerability is due to improper implementation of access controls. An attacker could exploit this vulnerability by authenticating to the device as a specific user to gain the information needed to elevate privileges to root in a separate login shell. A successful exploit could allow the attacker to escape the CLI subshell and execute system-level commands on the underlying operating system as root. Cisco Bug IDs: CSCvj93548. Vendors have confirmed this vulnerability Bug ID CSCvj93548 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
| VAR-201808-0298 | CVE-2018-0412 | Cisco Small Business 100 Series and Small Business 300 Cryptographic vulnerability in Series Wireless Access Point |
CVSS V2: 2.9 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an unauthenticated, adjacent attacker to force the downgrade of the encryption algorithm that is used between an authenticator (access point) and a supplicant (Wi-Fi client). The vulnerability is due to the improper processing of certain EAPOL messages that are received during the Wi-Fi handshake process. An attacker could exploit this vulnerability by establishing a man-in-the-middle position between a supplicant and an authenticator and manipulating an EAPOL message exchange to force usage of a WPA-TKIP cipher instead of the more secure AES-CCMP cipher. A successful exploit could allow the attacker to conduct subsequent cryptographic attacks, which could lead to the disclosure of confidential information. Cisco Bug IDs: CSCvj29229. Vendors have confirmed this vulnerability Bug ID CSCvj29229 It is released as.Information may be tampered with
| VAR-201808-0184 | CVE-2018-10369 | Intelbras Win 240 Cross-Site Scripting Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A Cross-site scripting (XSS) vulnerability was discovered on Intelbras Win 240 V1.1.0 devices. An attacker can change the Admin Password without a Login. Win 240 Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. IntelbrasWin240 is a wireless router from Brazil's Intelbras
| VAR-201904-1363 | CVE-2018-4300 | CUPS web Of the generated session of the interface cookie Vulnerable to information disclosure |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10. CUPS is prone to a security weakness.
Successfully exploiting this issue may allow attackers to bypass security mechanism. This may lead to other attacks. CPUS is an open source printing system. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
X41 D-Sec GmbH Security Advisory: X41-2018-005
Multiple Vulnerabilities in Apple smartcardservices
===================================================
Overview
- --------
Confirmed Affected Versions: e3eb96a6eff9d02497a51b3c155a10fa5989021f
Confirmed Patched Versions: 8eef01a5e218ae78cc358de32213b50a601662de
Vendor: Apple
Vendor URL: https://smartcardservices.github.io/
Credit: X41 D-Sec GmbH, Eric Sesterhenn
Status: Public
Advisory-URL:
https://www.x41-dsec.de/lab/advisories/x41-2018-005-smartcardservices/
Summary and Impact
- ------------------
Attackers with local access can exploit security issues in the
smartcard driver. These result in memory corruptions, which might lead
to code execution. Since smartcards can be used for authentication,
the vulnerabilities may allow an attacker to login to the system
without valid credentials as any user.
X41 did not perform a full test or audit on the software.
Product Description
- -------------------
The Smart Card Services project is comprised of several components
which, when combined, provide the necessary abstraction layer and
integration of smart cards into Appleas CDSA implementation.
Stack based buffer overflow
===========================
Severity Rating: Medium
Vector: APDU Response
CVE: CVE-2018-4300
CWE: 120
CVSS Score: 7.1 (High)
CVSS Vector: CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Summary and Impact
- ------------------
In file Tokend/CAC/CACRecord.cpp the function
CACCertificateRecord::getDataAttribute() might overwrite the value
certificate and possibly other stack data, if a smartcard provides
malicious data.
{% highlight c++ %}
unsigned char command[] = { 0x80, 0x36, 0x00, 0x00, 0x64 };
unsigned char result[MAXBUFFERSIZE];
sizet resultLength = sizeof(result);
uint8 certificate[CACMAXSIZECERT];
uint8 uncompressed[CACMAXSIZECERT];
sizet certificateLength = 0;
try
{
PCSC::Transaction (cacToken);
cacToken.select(mApplication);
uint32t cacreturn;
do
{
cacreturn = cacToken.exchangeAPDU(command,
sizeof(command), result,
resultLength);
if ((cacreturn & 0xFF00) != 0x6300)
CACError::check(cacreturn);
sizet requested = command[4];
if (resultLength != requested + 2)
PCSC::Error::throwMe(SCARDEPROTOMISMATCH);
memcpy(certificate + certificateLength,
result, resultLength - 2);
certificateLength += resultLength - 2;
// Number of bytes to fetch next time around
is in the last byte
// returned.
command[4] = cacreturn & 0xFF;
} while ((cacreturn & 0xFF00) == 0x6300);
}
catch (...)
{
return NULL;
}
{% endhighlight %}
As long as the smartcard returns a return code of 0x63FF, more data is
copied into the certificate buffer, causing a stack based overflow. A
malicious smartcard is able to control all of the overflowed bytes.
Workarounds
- -----------
None
Stack based buffer overflow with limited input
==============================================
Severity Rating: Medium
Vector: APDU Response
CVE: CVE-2018-4301
CWE: 120
CVSS Score: 7.1 (High)
CVSS Vector: CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Summary and Impact
- ------------------
In file Tokend/PKCS11/GemaltoKeyHandle.cpp the function
GemaltoPrivateKeyRecord::computeDecrypt() might overwrite the value
strData if the supplied dataLength is too big.
{% highlight c++ %}
void GemaltoPrivateKeyRecord::computeDecrypt(GemaltoToken
&gemaltoToken, CKULONG mech, const AccessCredentials *cred, unsigned
char *data, sizet dataLength, unsigned char output, size_t &outputLength)
{
GemaltoToken::log("\nGemaltoPrivateKeyRecord::computeDecrypt
<BEGIN>\n");
GemaltoToken::log("GemaltoPrivateKeyRecord::computeDecrypt -
mechanism <%lu>\n", mech);
GemaltoToken::log("GemaltoPrivateKeyRecord::computeDecrypt -
cred <%p>\n", cred);
char strData[6000];
memset(strData, '\0', sizeof(strData));
char str = strData;
for (size_t i=0; i<dataLength; i++)
{
str += sprintf(str, "%02x ", data[i]);
}
GemaltoToken::log("GemaltoPrivateKeyRecord::computeDecrypt -
dataLength <%lu> - data <%s>\n", dataLength, strData);
GemaltoToken::log("GemaltoPrivateKeyRecord::computeDecrypt -
output <%p>\n", output);
GemaltoToken::log("GemaltoPrivateKeyRecord::computeDecrypt -
outputLength <%lu>\n", outputLength);
{% endhighlight %}
The attacker might control the data which is to be decrypted, but
exploitation is limited by the sprintf() format string.
Workarounds
- -----------
None
Timeline
========
2018-02-03 Issues found
2018-05-22 Vendor contacted
2018-05-22 Automated vendor reply
2018-05-23 Personal vendor reply
2018-06-05 Requesting technical feedback from the vendor
2018-06-22 Vendor states that the bugs are fixed in public git
2018-07-12 CVE IDs assigned
2018-08-03 https://smartcardservices.github.io/security/ updated
2018-08-11 Advisory released
- --
X41 D-SEC GmbH, Dennewartstr. 25-27, D-52068 Aachen
T: +49 241 9809418-0, Fax: -9
Unternehmenssitz: Aachen, Amtsgericht Aachen: HRB19989
GeschA$?ftsfA1/4hrer: Markus Vervier
-----BEGIN PGP SIGNATURE-----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=9tdn
-----END PGP SIGNATURE-----
| VAR-201809-1079 | CVE-2018-7101 | HPE Integrated Lights Out 4 and iLO 5 Input validation vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A potential remote denial of service security vulnerability has been identified in HPE Integrated Lights Out 4 prior to v2.60 and iLO 5 for Gen 10 servers prior to v1.30. HPE Integrated Lights Out 4 and iLO 5 Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HP Integrated Lights-Out is prone to an unspecified remote denial-of-service vulnerability.
Exploiting this issue allows remote attackers to trigger denial-of-service conditions. Through an integrated remote management port, Monitor and maintain the running status of the server, remotely manage and control the server, etc. A remote attacker could exploit this vulnerability to cause a denial of service