VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202202-1144 CVE-2022-23634 Puma Information Disclosure Vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability. Puma and Rails Exists in unspecified vulnerabilities.Information may be obtained. Puma is a web server for high-concurrency applications developed by the individual developer of Evan Phoenix in the United States. No detailed vulnerability details are currently provided. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202208-28 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Puma: Multiple Vulnerabilities Date: August 14, 2022 Bugs: #794034, #817893, #833155, #836431 ID: 202208-28 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been discovered in Puma, the worst of which could result in denial of service. Background ========= Puma is a simple, fast, threaded, and highly concurrent HTTP 1.1 server for Ruby/Rack. Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-servers/puma < 5.6.4 >= 5.6.4 Description ========== Multiple vulnerabilities have been discovered in Puma. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Puma users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/puma-5.6.4" References ========= [ 1 ] CVE-2021-29509 https://nvd.nist.gov/vuln/detail/CVE-2021-29509 [ 2 ] CVE-2021-41136 https://nvd.nist.gov/vuln/detail/CVE-2021-41136 [ 3 ] CVE-2022-23634 https://nvd.nist.gov/vuln/detail/CVE-2022-23634 [ 4 ] CVE-2022-24790 https://nvd.nist.gov/vuln/detail/CVE-2022-24790 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202208-28 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . We recommend that you upgrade your puma packages. For the detailed security status of puma please refer to its security tracker page at: https://security-tracker.debian.org/tracker/puma Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmKNGrEACgkQEMKTtsN8 TjYLKxAAmsH1Yv2uTLb4ONhlsJwSpEW7+lZChBTALXMvJZGhBeWCNqMzKwYZGf7E +DPi0F04Igm930pDB/diFuu0P+R/OkLTGRklDL6Y1fa7quzVXJ2iyWCFb5ilA5dw 3BNz2qkytsXLy9lVXsCfUo06A6inwOpNeg+Dyz61iA+l6cuUoXveji4xg9WzJZJT vB1Acuns273ILxoYcTrnoG0srLZ2WQwduvyu1wRV5z6UjAZ9MwxxKWA1dm2fyNmG MfUugl6rHryyQq8MjY/qgnUpAb5aAT6OiyiBv2faJHflCvtYBzA5cE1aTUg/2EpK OG2lJYUJkzks0P8apw4ZoFQAxZcYbcQAUMSSrwMOob6YqIw1LO6oped3L86Yr/UY UK7m0N2EC0TYWiPa3Y0oW1348jatdqlEQP5OxoMLAIY2qlhH08xnpx6Pf9xzZynH ivM7kBn9xsOIZQh6XGdHLFnioBc9S2fUQlaIK5D6tn+2T3+CzR85qoY6mg3ZsJlI rpkNI2Fgj/piZIdhDxSM9A7Tb840ECi1Tv3Z1P0b9ujlzrzlRWO+GinTNl4HS8f1 7jUZ4HzAaeUg/LRcBrURlmG2vcCT6cB3qM/m/jX0VF1w/6AzjqysHGfD+MxhrxQA PKqIrnCaAvSSV59rtWxyzSSfwOfLFUkUu6BWDiLo71Jl2XxCrdE= =w9Nx -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Satellite 6.11 Release Advisory ID: RHSA-2022:5498-01 Product: Red Hat Satellite 6 Advisory URL: https://access.redhat.com/errata/RHSA-2022:5498 Issue date: 2022-07-05 CVE Names: CVE-2021-3200 CVE-2021-3584 CVE-2021-4142 CVE-2021-21290 CVE-2021-21295 CVE-2021-21409 CVE-2021-30151 CVE-2021-32839 CVE-2021-33928 CVE-2021-33929 CVE-2021-33930 CVE-2021-33938 CVE-2021-41136 CVE-2021-42550 CVE-2021-43797 CVE-2021-43818 CVE-2021-44420 CVE-2021-44568 CVE-2021-45115 CVE-2021-45116 CVE-2021-45452 CVE-2022-22818 CVE-2022-23633 CVE-2022-23634 CVE-2022-23833 CVE-2022-23837 CVE-2022-28346 CVE-2022-28347 ==================================================================== 1. Summary: An update is now available for Red Hat Satellite 6.11 2. Relevant releases/architectures: Red Hat Satellite 6.11 for RHEL 7 - noarch, x86_64 Red Hat Satellite 6.11 for RHEL 8 - noarch, x86_64 3. Description: Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool. Security Fix(es): * libsolv: Heap-based buffer overflow in testcase_read() in src/testcase.c (CVE-2021-3200) * satellite: foreman: Authenticate remote code execution through Sendmail configuration (CVE-2021-3584) * candlepin: Allow unintended SCA certificate to authenticate Candlepin (CVE-2021-4142) * candlepin: netty: Information disclosure via the local system temporary directory (CVE-2021-21290) * candlepin: netty: Possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295) * candlepin: netty: Request smuggling via content-length header (CVE-2021-21409) * tfm-rubygem-sidekiq: XSS via the queue name of the live-poll feature (CVE-2021-30151) * python-sqlparse: ReDoS via regular expression in StripComments filter (CVE-2021-32839) * libsolv: various flaws (CVE-2021-33928 CVE-2021-33929 CVE-2021-33930 CVE-2021-33938) * tfm-rubygem-puma: Inconsistent Interpretation of HTTP Requests in puma (CVE-2021-41136) * logback-classic: Remote code execution through JNDI call from within its configuration file (CVE-2021-42550) * candlepin: netty: Control chars in header names may lead to HTTP request smuggling (CVE-2021-43797) * python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818) * python3-django: Potential bypass of an upstream access control based on URL paths (CVE-2021-44420) * libsolv: Heap overflow (CVE-2021-44568) * python3-django: Various flaws (CVE-2021-45115 CVE-2021-45116 CVE-2021-45452 CVE-2022-22818) * tfm-rubygem-actionpack: Information leak between requests (CVE-2022-23633) * tfm-rubygem-puma: rubygem-rails: Information leak between requests (CVE-2022-23634) * python3-django: Denial-of-service possibility in file uploads (CVE-2022-23833) * tfm-rubygem-sidekiq: WebUI Denial of Service caused by number of days on graph (CVE-2022-23837) * python3-django: Various flaws (CVE-2022-28346 CVE-2022-28347) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: * New repo layout for Satellite, Utils, Maintenance, and Client repos. * Support for RHEL 9 clients * Module-based installation on RHEL 8 * Upgrading Satellite Server and Capsule Server installations from RHEL 7 to RHEL 8 * Connected and Disconnected servers supported on RHEL 7 and RHEL 8 * Inter-Server Synchronization improvements * Puppet integration optional and disabled by default * Pulp 3 updated to Python 3.8 * Change to Capsule certificate archive * New default port for communication with Red Hat Subscription Management * (RHSM) API on Capsule servers * New Content Views Page (Content Publication workflow simplification) * New Hosts Page (Technology Preview) * Registration and preview templates * Simplified host content source changing * Improved behavior for configuring and running remote jobs * Provisioning improvements * New error signaling unsupported options in TASK-Filter * Virt-who configuration enhanced to support Nutanix AHV * Cloud Connector configuration updated * Improved Insights adoption The items above are not a complete list of changes. This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section. 4. Solution: For Red Hat Satellite 6.11 see the following documentation for the release. https://access.redhat.com/documentation/en-us/red_hat_satellite/6.11 The important instructions on how to upgrade are available below. https://access.redhat.com/documentation/en-us/red_hat_satellite/6.11/html/upgrading_and_updating_red_hat_satellite 5. Bugs fixed (https://bugzilla.redhat.com/): 1459231 - [RFE] Support 'cleaning' a repo of downloaded on_demand content 1473263 - Processing outputs of remote command on the smart-proxy is slow. 1545000 - [RFE] As a user of Satellite, I would like to use another Satellite as my CDN. 1596004 - Cannot register host with activationkey that is associated to host collections that have host count limits 1609543 - concurrently creating repositories causes most of them are not visible for consumer at the end 1659649 - [RFE] Shorten or handle "410 Gone" errors rather than printing a page-long trace for each 1662924 - [RFE] Report that lists all the hosts on which a particular repository is enabled 1685708 - Editing a host tries to inherit the operating system properties from it's host-group instead of the CV and Lifecycle Environment assigned 1693733 - ensure foreman-maintain works with RHEL8 Satellite & Capsules 1694659 - [RFE] Host Add-Parameter button should not float down page as new params are added. 1713401 - RHEL 8 systems with OSPP applied cannot install katello-ca-consumer package from Satellite 6.5 1723632 - When restarting foreman-tasks, long running tasks got forcefully killed after 20 seconds of wait. 1723751 - [RFE] Provide a script-like interface to task cleanup, preventing wrong values from being entered 1735540 - Virt-who-config for kubevirt does not support in API and hammer CLI 1744521 - There is no way to identify the overriden Ansible variables while creating or editing an existing host 1761421 - [RFE] Option to "skip-tags" on Ansible runs from Red Hat Satellite server. 1770075 - Snippet template may render incorrect result when non-default scope class is used to render the main template. 1771724 - Move Actions::Katello::Host::UploadPackageProfile out of dynflow 1777820 - [RFE] Make hammer-cli available for RHEL 8 systems 1784254 - Static recurring job failed to schedule on 2nd iteration if any of the target host record is invalid. 1805028 - Issue with hammer shell while using "--fields" parameter to display host info 1807258 - Cloned viewer role cannot view facts 1807536 - Parent Hostgroup hammer parameter accept only name, not title 1809769 - [RFE] support ability disable and remove puppetserver from Satellite and Capsules 1811166 - REX job failed when you enable FIPS on RHEL 8 hosts 1813624 - Consistent use of unlimited-host argument throughout CLI 1819309 - [RFE] Load balanced capsules without using sticky sessions 1825761 - Ansible Role execution reports do not show Ansible Icon 1832858 - [RFE] Exporting a content view does not exports the description assigned to the content view. 1844848 - [RFE] add "duration" column to tasks hammer and export 1845471 - exclude source redhat containers by default 1847825 - Incorrect text alignment for error message 1851808 - Unable to set ssh password and sudo password when creating a REX job using hammer 1852897 - API - ISE when using invalid status type 1862140 - ipv4/6 auto-suggested address should be removed when the different domain and subnet with ipv6/4 are selected 1867193 - Content Host Traces Management modal window does not respect selection done on the previously opened page 1869351 - [RFE] Add ability to omit specific hosts from rh_cloud inventory upload 1872688 - Remote execution will fail on client with FIPS enabled 1873241 - [RFE] When choosing what capsule to use for Remote Execution into a host, use the host's "Registered through" capsule 1877283 - [RFE] Request to use /etc/virt-who.conf as the default config file for virt-who plugin 1878049 - Cancel button should be enabled in the capsule sync until the job completions 1881668 - hammer user list --help has invalid --order example 1883612 - [RFE] - Needs Dot Bullet to distinguised environment for Composite Content View on Red Hat Satellite Web UI 1883816 - Appropriate error message to be shown when creating authsource with same name as existing authsource. 1886780 - [Sat 6.8/UI/Bug] Refresh icon doesn't go away 1893059 - Satellite 6.8 Remote Execution fails on RHEL 8.2 clients with DEFAULT:NO-SHA1 crypto policy 1896628 - Hammer Command Fails to List Job Invocation Details if Organization is Used 1898656 - [RFE] Include status of REX jobs on the Satellite Dashboard 1899481 - [RFE] - Tasks: Need Word Wrap for Long Commands 1902047 - [RFE] In the message "Repository cannot be deleted since it has already been included in a published Content View" , include the name of CV and it's versions 1902314 - [RFE] Introduce check-only or dry-run feature for any kind of Ansible based job execution from Satellite 6 1906023 - ssh debug logging on FIPS causes REX job failure with OpenSSL::Digest::DigestError 1907795 - Remove the MS Windows provisioning Templates from the RedHat Satellite 6 1910433 - REX is not possible on RHEL 8 when FUTURE crypto policy is set from Satellite 6.8 1911545 - Epoch version is missing from rpm Packages tab of Content View Version 1914803 - Some of the "filters" permission changed after the upgrade. 1915394 - [RFE] Adding an option to keep the ansible-runner files on Satellite. 1919146 - [RFE] Possibility for further tailoring with Compliance Viewer role 1920579 - The private bookmark status is not reflected correct in satellite GUI and we cannot make a private bookmark public through Red Hat Satellite GUI 1922872 - Autosearch is not working even if its enabled. 1923766 - Inconsistent time format on Sync Plans Details page 1924625 - Sync status showing never synced even though the repositories has been synced successfully 1927028 - CVE-2021-21290 netty: Information disclosure via the local system temporary directory 1927532 - Large CRL file operation causes OOM error in Candlepin 1931489 - Timeout to kill settings in job execution is not honored when running an Ansible playbook 1937364 - CVE-2021-21295 netty: possible request smuggling in HTTP/2 due missing validation 1937470 - hammer does not have a compute resource associate VMs command as web UI has 1940308 - [BUG] The / at the end of proxy url is not being handled by satellite correctly when trying to enable repositories 1942806 - AttributeError occured when run python 3 bootstrap.py on RHEL9.0 Alpha 1944802 - [RFE] List of all Enabled Repository of all the content hosts using Reporting Templates. 1944888 - CVE-2021-21409 netty: Request smuggling via content-length header 1951626 - Validate Content Sync on bulk product produces error messages 1955385 - Privilege escalation defined inside ansible playbook tasks is not working when executing the playbook via Remote Execution in Satellite 6 1957070 - [RFE] add 'name' for the role filter in API 1957288 - [RFE] Add option in the satellite to upload/sync OVAL defination to evalute the rule (xccdf_org.ssgproject.content_rule_security_patches_up_to_date) when performing Compliance scan on the client registered with the Satellite server. 1958664 - [RFE]? Replace?bcrypt hash function with (FIPS-approved / NIST recommended) encryption algorithm for internal passwords?in the Satellite. 1959691 - [Tuning] Tuning Puma in the predefined tuning profiles 1960228 - Template is written twice when resolving provisioning templates for a host 1962307 - CVE-2021-3200 libsolv: heap-based buffer overflow in testcase_read() in src/testcase.c 1962410 - VMs Migrating are Losing ELS Subscriptions and Repos for RHEL 6 1962847 - foreman-rake katello:* fails with the error message The Dynflow world was not initialized yet 1964394 - Warning: postgresql.service changed on disk, when calling foreman-maintain service restart 1965968 - Since Satellite 6.8 it's not possible to remove subscriptions from 'WebUI --> Content --> Subscriptions' page if the user doesn't have 'Setting' permissions. 1967319 - The /api/usergroups/:usergroup_id/external_usergroups API is not accepting 1-group as the name of usergroup 1968439 - CVE-2021-3584 foreman: Authenticate remote code execution through Sendmail configuration 1969748 - Hammer documentation for "hammer organization create --help" command has unnecessary and repeated description 1969992 - Exclude pulp-2to3-migration package from Satellite 7.0 1970482 - Discovery plugin ignores IPv6 when doing reboot/kexec/fetch facts 1972501 - After promoting the content view, Candlepin failed to mark the entitlement certificates as dirty 1973146 - [RFE] As a user I want to receive an email notification when a job I triggered fails 1974225 - Incremental CV update does not auto-publish CCV 1975321 - select all button selects recommendation for other organizations which fails remediation action(JobInvocation). 1978323 - [RFE]: Include curve25519sha256 support in Remote Execution 1978689 - [global registration] [hammer] - No proper alignment in host-registration generate-command -h command 1979092 - Capsule cname is reported as opposed to hostname 1979907 - [RFE] IPv6 fact is not being parsed for satellite hosts. 1980023 - satellite-installer times out during long running SQL DELETE transactions 1980166 - Too many libvirt connections from Satellite due to ssh connection leaks 1982970 - Fact updates causing unnecessary compliance recalculation in Candlepin 1988370 - [RFE] Support Nutanix AHV in the Satellite virt-who plugin 1992570 - Only Ansible config jobs should run in check mode 1992624 - Remote Execution fails to honor remote_execution_connect_by_ip override on host 1992698 - Store certain parts of dynflow data as msgpack 1994212 - Failed at scanning for repository: undefined method `resolve_substitutions' for nil:NilClass 1994237 - Executing any foreman-rake commands shows 'ErbParser' and 'RubyParser' are ignored. 1994397 - Increased memory usage of pulp-3 workers during repo sync 1994679 - Host - Last Checkin report template is not showing any other content host apart from Red Hat Satellite itself. 1996803 - Grammatical errors with Insecure help text at Host Registration 1997575 - Lifecycle Environment tab flash OSTree & Docker details for a second then shows actual content path. 1997818 - "Login Page Footer Text" Blocking Login Button on Satellite UI 1998172 - Puppet classes and environment importer. documentation opens in same tab instead of a new one 1999604 - Unable to assign ansible roles to a host group via hammer/api with non-admin user 2000699 - CVE-2021-33928 libsolv: heap-based buffer overflow in pool_installable() in src/repo.h 2000703 - CVE-2021-33929 libsolv: heap-based buffer overflow in pool_disabled_solvable() in src/repo.h 2000705 - CVE-2021-33930 libsolv: heap-based buffer overflow in pool_installable_whatprovides() in src/repo.h 2000707 - CVE-2021-33938 libsolv: heap-based buffer overflow in prune_to_recommended() in src/policy.c 2000769 - pulp3: CV publishes with dependency solving and same source repos for copy are not concurrent 2002995 - hammer completion not working 2004016 - httpboot not working on GRUB version provided by RHEL7 2004158 - Sat 6.9.5: foreman-rake facts:clean aborts due to foreign key in database 2004234 - [RFE] Email notification after a job template execution completes. 2004335 - [RFE] API and Hammer functionality for Red Hat Access Insights in satellite 6 2005072 - CVE-2021-32839 python-sqlparse: ReDoS via regular expression in StripComments filter 2007655 - Authorization repository causing invalid upstream url 2008809 - Task is failing but still showing success state 2009049 - pulp_rpm: Basic-auth repository causing invalid upstream url 2009398 - hammer host interface update does not update remote execution setting 2010138 - Satellite doesn't forward the "If-Modified-Since" header for /accessible_content endpoint to Candlepin 2011062 - cockpit webconsole login fails when remote execution configured for kerberos 2013495 - CVE-2021-41136 rubygem-puma: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in puma 2013503 - CVE-2021-30151 sidekiq: XSS via the queue name of the live-poll feature 2013837 - Improve REX error reporting when uploading script 2014037 - There is a new login account in satellite 6.9 2014244 - Remove Greedy DepSolving from UI 2014251 - Global Registration: Selecting Satellite URL as the proxy fails to register hosts with default config 2018263 - Using Satellite with a proxy produces an SELinux alert 2020329 - [RFE] Switch process output to DB 2021255 - Satellite schedules one recurring InventorySync::Async::InventoryScheduledSync per org but each task syncs all orgs, resulting in harmless but unnecessary tasks 2021352 - [RFE] One manifest version to cover all of Satellite 7 2021406 - syncing tens of repos to capsule can cause deadlock: while updating tuple (...) in relation "core_content" 2021985 - [BUG] Upgrading Satellite 6.9 with custom certificates to Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886 2022648 - please update to Satellite Ansible Collection 3.0.0 2023809 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR: column "subscription_id" contains null values 2024269 - Attempt of upgrading Satellite server to 6.7 or 6.8 stops with message "Please run 'foreman-maintain prep-6.10-upgrade' prior to upgrading." when using latest rubygem-foreman_maintain package 2024553 - Repository sync jobs are failing with the Exception "NoMethodError undefined method `repository_href' for nil:NilClass" post upgrade to satellite version 6.10 2024889 - Syncing RHEL 5 KS repository fails with: " Artifact() got an unexpected keyword argument 'sha' " 2024894 - Unable to sync EPEL repositories on Satellite 6.10 when 'Mirror on Sync' is enabled 2024963 - Syncing EPEL repos on Satellite 6.10 fails with: "Incoming and existing advisories have the same id but different timestamps and non-intersecting package lists.." 2024978 - Satellite upgrade to 6.10.1 fails with multiple rubygem-sinatra package dependency errors 2024986 - CV publish fails with: No route matches {:action=>"show", :controller=>"foreman_tasks/tasks", :id=>nil}, missing required keys: [:id] (ActionController::UrlGenerationError) 2025049 - Executing remove-pulp2 after a successful Satellite 6.10 upgrade breaks synchronizations and repositories. 2025437 - New OS created due to facts mismatch for operatingsystem for RHSM, Puppet and Ansible 2025494 - Capsule sync task failed to refresh repo that doesn't have feed url with "bad argument (expected URI object or URI string)" error 2025523 - Ansible roles are not starting automatically after provisioning 2025760 - installer does not restart foreman.service when changing puma configuration 2025811 - Upgrading to Satellite 6.9.6 and above introduces an increase in system memory consumption causing Pulp activities to fail with OOM at certain times 2026239 - Config report upload failed with "No smart proxy server found on ["capsule.example.com"] and is not in trusted_hosts" 2026277 - null value in column "manifest_id" violates not-null constraint error while syncing RHOSP container images 2026415 - RFE: Add command for upgrading foreman-maintain to next major version 2026658 - Fix name & path to OS host_init_config template 2026718 - XCCDF Profile in Tailoring File selecting the first id not the selected id 2026873 - Date parse error around SCA cert fetching when system locale is en_AU or en_CA 2027052 - The redhat.satellite.foreman plugin is unable to collect all facts for the target systems as expected when using default api 2027968 - A failed CV promote during publish or repo sync causes ISE 2028178 - CVE-2021-44420 django: potential bypass of an upstream access control based on URL paths 2028205 - db:seed can fail when there are host mismatches 2028273 - Cannot pull container content - TypeError: wrong argument type String (expected OpenSSL/X509) 2028377 - [RFE] add option to export and import just repository for hammer content-export 2028446 - Pulp: Add options to change the import and export path in /etc/pulp/settings.py 2028733 - katello-change-hostname fails to perform changes, leaving the system in an unusable state 2029192 - Applying errata from the errata's page always tries to use katello-agent even when remote_execution_by_default set to true 2029375 - webhook event "build_exited" never gets triggered 2029385 - selinux denials when accessing /etc/pulp/certs/database_fields.symmetric.key 2029548 - Excluding system facts logs as WARN causing log files to increase dramatically 2029760 - Scenarios for Satellite and Capsule 7.0 2029807 - foreman-maintain service fails for external postgres service, when no psql utility installed 2029828 - TFTP Storage check fails on undefined method `[]' for nil:NilClass 2029829 - change hostname tries to unconditionally restart puppetserver 2029914 - FIPS enabled RHEL7 server: Candlepin services not running after installation 2030101 - No longer be able to import content into disconnected Satellite for existing content views 2030273 - The tasks generated by task export in html format are not sorted by date 2030434 - Repository sync download all metadata files on every sync, even when there is no new packages 2030460 - Need a way to sync from a specific content view lifecycle environment of the upstream organization 2030715 - hammer content-[import,export] uses /tmp directory for temporary decompression location 2031154 - After upgrading to Satellite 6.10, Repository sync randomly fails if a ReservedResource exists in core_taskreservedresource table of pulpcore DB. 2031958 - CVE-2021-43797 netty: control chars in header names may lead to HTTP request smuggling 2032098 - Incremental publish content view doesn't copy any contents 2032400 - Remove warning from reports page in 7.0 2032569 - CVE-2021-43818 python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through 2032602 - Content not accessible after importing 2032928 - Puppet disable command fails 2032956 - Cannot create bookmark for credentials search 2033174 - Large repo sync failed with "Katello::Errors::Pulp3Error: Response payload is not completed" 2033201 - Button to assign roles on Host details page missing 2033217 - "Cannot find rabl template 'api/v2/override_values/index'" error while trying to import Ansible variables using hammer CLI. 2033336 - Add 'service restart' step in purge-puppet command 2033560 - CVE-2021-42550 logback: remote code execution through JNDI call from within its configuration file 2033593 - fact_values api performance issues when loading a large number of facts 2033847 - Content view export failed with undefined method `first' for nil:NilClass 2033853 - Publish content view failed with "PulpRpmClient::ApiError Error message: the server returns an error" 2033940 - Error: AttributeError: 'NoneType' object has no attribute 'cast' thrown while listing repository versions 2034317 - hammer repository upload-content with large file gives "Too many open files" error 2034346 - CVE-2021-4142 Satellite: Allow unintended SCA certificate to authenticate Candlepin 2034461 - Capsule failed to sync empty repositories 2034552 - Puppet disable command fails on Capsule 2034635 - New hosts UI, removal of Share your feedback link 2034643 - New hosts UI, when navigated back to host detail from jobs detail, old ui is shown instead of new 2034649 - New hosts UI, missing Ansible cards 2034659 - OSTree repository update error: `excludes` is not a valid attribute in `PulpOstreeClient::OstreeOstreeRemote` 2035195 - command "hammer full-help" gives error "Error: uninitialized constant HammerCLIForeman::CommandExtensions::PuppetEnvironment" 2035204 - Tags need to be truncated in rh_cloud report 2035480 - In Satellite upgrade, yum update failed to resolve the "createrepo_c-libs" dependency 2035907 - Ansible config report time is one hour off 2036054 - [Custom Certs] - Failed to install the custom certs on the Satellite 7.0.0 works fine in 6.10 2036187 - self-upgrade fails with x.y should be greater than existing version x.y.z! 2036381 - Applying exclude filter on a CV containing kickstart repos causes missing package groups 2036628 - Rex job fails Error loading data from Capsule: NoMethodError - undefined method `each' for nil:NilClass 2036721 - Satellite is creating the schedule on the wrong day of the week (day+1) 2037024 - CVE-2021-45115 django: Denial-of-service possibility in UserAttributeSimilarityValidator 2037025 - CVE-2021-45116 django: Potential information disclosure in dictsort template filter 2037028 - CVE-2021-45452 django: Potential directory-traversal via Storage.save() 2037180 - Failed to docker pull image with "Error: image <image name> not found" error 2037275 - Cockpit integration always fails with authentication error 2037508 - upload-content results in wrong RPM being added to product 2037518 - The RSS channel is set to the upstream URL 2037520 - Bootdisk new host page menu items are missing 2037648 - upgrade check checking group ownership of /var/lib/pulp (pulp2) instead of /var/lib/pulp/content (pulp3) 2037706 - Rex job fails: undefined method `join' for "RHSA-2012:0055":String 2037773 - The new host detail page should be enabled by default without the experimental warning 2038042 - Ansible Jobs are halting at status running 2038192 - Upgrade to Satellite 6.10 fails at db:migrate stage if there are errata reference present for some ostree\puppet type repos 2038241 - ERROR: at least one Erratum record has migrated_pulp3_href NULL value 2038388 - Activation key issue with custom products on RHEL 6 2038432 - Error when importing content and same package belongs to multiple repositories 2038849 - repositories-setup procedure failing with "undefined method `map' for "*":String" 2039289 - Installing Satellite7, satellite-installer runs redundant upgrade steps 2039696 - Puppet-related hammer commands still missing after plugin enabled 2040406 - Incorrect layout of new host details overview cards 2040447 - [RFE] Katello host detail tabs should accept URL params for search 2040453 - Limited CV docker tags cannot be pulled after syncing library repo with "limit sync tags" 2040596 - undefined method `name' for "":String" on "All Hosts" page 2040650 - Upgrade or offline backup fails on RHEL8 due to missing iptables command 2040773 - Updating repo with GPG key ID fails 2040796 - Grammar error on SyncPlan Details tab 2040870 - Error to import rhel7 kickstart on disconnected satellite 2041457 - Change ks= to inst.ks= and sendmac for RHEL 9 Beta 2041497 - Incremental CV update fails with 400 HTTP error 2041508 - Publication creation (during migration to pulp3 as well) can fail if /var/lib/pulp is NFS share 2041551 - Puppet enable fails on RHEL8 due to missing package(s) 2041588 - [RFE] Add Type to cdn configuration for 'disconnected' mode 2041701 - Fail to import contents when the connected and disconnected Satellite have different product labels for the same product 2042416 - Unclickable Class names in Configure > Puppet classes 2042480 - Configure Cloud Connector fails after hostname change; potentially hits all templates 2042848 - Package list of repository is empty page 2042861 - [Recurring Logic]logging for recurring logic should be more verbose 2043081 - 406 error appears when running insights-client --compliance 2043097 - sql dump of dynflow data is encoded, what breaks sosreport 2043144 - After upgrading to 6.10, Satellite fails to sync some repositories with large files with timeout error 2043248 - Importing content fails if an importer with same name already exists 2043501 - Satellite upgrade fails during db:seed with ActiveRecord::RecordNotDestroyed: Failed to destroy the record 2043609 - pulpcore-workers grow very large when repositories have many changelog entries 2043726 - content views configured as "import only" generate 404 errors during capsule sync 2044581 - CVE-2022-23837 sidekiq: WebUI Denial of Service caused by number of days on graph 2044606 - New version of Candlepin now has org in entitlement certificate and causes authorization issues 2044631 - duplicate key value violates unique constraint "core_repositorycontent_repository_id_content_id_df902e11_uniq" 2044839 - SSH Remote execution does not reap processes when closing multiplexed ssh connection 2045504 - Show all provisioning templates by default 2045854 - organization context fails to change in web UI 2046281 - usability issues for user without execute_jobs_on_infrastructure_hosts permissions 2046307 - New host details Errata overview card shows stale data for unregistered host 2046322 - Manager role does contain the execute_jobs_on_infrastructure_hosts permission 2046328 - Custom yum CV does not show correct list of packages 2046337 - Certain manifest, subscription and repository related actions are broken while using HTTP Proxy as content_default_http_proxy in Satellite 6.10 2046484 - RPM exclude filter does not work in web UI 2046573 - update puppet classes via API to empty puppet classes does not update the classes 2047285 - [RFE] enable redis cache for pulp content server by default 2047443 - Unable to Import any content via Import/Export 2047451 - [RFE] [SAT-4229] Packages - Filter by status 2047485 - syncing repo using proxy can generate misleading log entries when proxy deny access to the url requested 2047649 - please update to Satellite Ansible Collection 3.1.0 2047675 - Getting "404 not found" when publishing a content view 2047683 - Force cancel a paused task doesn't release the lock 2048470 - Leapp upgrade fails after reboot with disabled postgresql redis tomcat services 2048517 - service stop tries to execute CheckTftpStorage 2048560 - REX doesn't honor effective_user when async_ssh is true 2048775 - CVE-2022-22818 django: Possible XSS via '{% debug %}' template tag 2048778 - CVE-2022-23833 django: Denial-of-service possibility in file uploads 2048913 - "foreman-maintain health check --label check-hotfix-installed" fails with error "undefined method `[]' for nil:NilClass" 2048927 - Satellite 6.10 clone is looking for mongo_data.tar.gz file 2048986 - "foreman-maintain health check --label validate-yum-config" command failed with message "clean_requirements_on_remove=True Unset this configuration as it is risky while yum update or upgrade!" 2049143 - Unable to run Convert2RHEL role on the host 2049304 - katello-rhsm-consumer script subscription-manager version detection depends on subscription-manager rpm being installed 2049799 - Incremental update with --propagate-all-composites makes new CVV but with no new content 2049913 - Repo filtering shows all products and repos in different organizations 2050100 - Module streams enabled by default are gone when CV starts using filters 2050297 - Modifying 'Capsule tasks batch size for Ansible' causes subsequent Ansible jobs to hit TypeError 2050323 - Misleading error message when incorrect org label is entered 2050440 - pulp workers are idle despite there is one pending task 2051374 - wrong sinatra obsoletes makes Satellite uninstallable 2051408 - IP obfuscation algorithm can generate invalid IPs 2051468 - Active directory users taking too much time to login when its part of many groups. 2051522 - pulpcore_t and pulpcore_server_t domains are prevented to access httpd_config_t files 2051543 - smart_proxy_remote_execution_ssh leaves zombie ssh processes around 2051912 - Some of the services failed to start after satellite restore 2052048 - Repeated Ansible Role run scheduling adds extra time to specified start date 2052088 - Satellite-installer does not ensure proper permissions on /etc/foreman-proxy/ssl_ca.pem at every run 2052420 - Satellite upgrade fails during db:migrate with PG::DuplicateTable: ERROR: relation "index_hostgroups_puppetclasses_on_hostgroup_id" already exists 2052493 - restore on another machine fails with ERROR: web server's SSL certificate generation/signing failed 2052506 - "foreman-maintain health check --label check-hotfix-installed" does not display the modified files in command stdout. 2052524 - rubygem-sinatra el8 rpm should keep the epoch number 2052815 - dynflow fails with "403 extra bytes after the deserialized object" 2052958 - Job invocation fails for errata installation. 2053329 - content-view import fails with Error: PG::StringDataRightTruncation: ERROR: value too long for type character varying(255) 2053395 - Satellite upgrade failed with error "Couldn't connect to the server: undefined method `to_sym' for nil:NilClass" 2053478 - Uploading external DISA SCAP content to satellite 6.10 fails with exception "Invalid SCAP file type" 2053601 - Errata icons are the wrong colors 2053839 - Deletion of Custom repo fails with error "uninitialized constant Actions::Foreman::Exception" in Satellite 7.0 2053843 - hammer shell with redirected input prints stty error on RHEL8 2053872 - Changing Upstream URL of a custom repo in WebUI raises error "Upstream password requires upstream username be set." 2053876 - Multiple instances of scheduled tasks of more types 2053884 - Host detail UI setting is not honored when returning to the host page after canceling an Edit action 2053923 - InsightsScheduledSync raises exception when allow_auto_insights_sync is false 2053928 - Satellite UI suddenly shows "Connection refused - connect(2) for 10.74.xxx.yyy:443 (Errno::ECONNREFUSED) Plus 6 more errors" for a capsule even if there are no connectivity issue present in Satellite\Capsule 7.0 2053956 - Installing Satellite 7.0 on FIPS enabled RHEL 8.5 fails on "katello-ssl-tool --gen-ca" step with error "ERROR: Certificate Authority private SSL key generation failed" 2053970 - Upgrade to Red Hat Satellite 7.0 fails at db:migrate step with error "undefined local variable or method `type' for #<Katello::CdnConfiguration:0x00000000153c6198>" 2053996 - ReclaimSpace does not acquire repo lock so it can be run concurrently with the repo sync 2053997 - hammer lacks command "repository reclaim-space" 2054008 - Retain packages on Repository does not synchronize the specified number of packages on Satellite 7 2054121 - API and WebUI must disallow repo create with negative Retain package versions count 2054123 - hammer repository create ignores --retain-package-versions-count option 2054165 - After satellite-change-hostname, foreman tasks acquired lock error still refers to URL of old hostname 2054174 - Repo discovery feature cannot discover yum repositories because 'Content Default HTTP Proxy' is not used to connect to the upstream URL in Satellite 7.0 2054182 - remove pulp2 automatically on upgrade to 6.11 (If the user hasn't already done it) 2054211 - CVE-2022-23634 rubygem-puma: rubygem-rails: information leak between requests 2054340 - [SAT-4229] Module streams - basic table 2054758 - Satellite 6.10 clone is failing with user pulp doesn't exist 2054849 - CDN loading error for non-admin user and non-default org 2054971 - Enable registration by default 2055159 - Satellite/capsule 6.10 and tools 6.10 repos are listed in the Recommended Repositories for Sat 7.0 2055312 - Enabling ISO type repository fails with PG::NotNullViolation: ERROR 2055329 - Cannot import a cv 2055495 - If Kickstart 7.X repos are being synced to Capsule 7.0 then Pulp 3 tries to sync a non-existant HighAvailability and ResilientStorage repo as well and gets 404 fnot found 2055513 - Deletion of Custom repo deletes it from all versions of CV where it is included but the behavior is different for Red Hat based repos in Satellite 7.0 2055570 - Add check for LCE and CV presence in upstream server for disconnected Satellite 2055808 - Upgrading the Satellite 7.0 from Snap 8 to Snap 9 , sets the CDN configuration for all Organizations in airgapped mode 2055951 - Index content is creating duplicated errata in "katello_erratum" table after upgrading to Satellite 6.10 2056167 - [RFE] Create new content view should redirect to "Repositories" and not "Versions" tab 2056171 - [RFE] Publish new version should redirect to "Version" tab 2056172 - [RFE] Add repositories button should highlight in Content view 2056173 - [RFE] Content view filter doesn't shows "Start Date" & "End Date" tags to confirm the correct user inputs. 2056177 - [Bug] Custom subscriptions consumed and available quantity not correct in the CSV file 2056178 - [RFE] Add RHEL-8 EUS repositories under recommended repositories 2056183 - Content view filter should suggest architectures parameters in RPM rule 2056186 - After enabling the Red Hat web console feature in Satellite 7.0, the redesigned Host page does not offers any option to connect to the Web\Cockpit Console of the client system 2056189 - Remove RHEL 7 EUS repository from the Recommended Repositories list 2056198 - [RFE] "Add Content Views" button should highlight in Composite Content view 2056202 - [RFE] Promote button should be displayed in the Content view version 2056237 - [Bug] Satellite Administration Documentation is missing 2056469 - Not possible to set hostgroup parameter during hostgroup creation 2056657 - Add deprecation banners for traditional (non-SCA) subscription management 2056966 - Part of REX job fails if multiple capsules are used for the job 2057178 - CVE-2021-44568 libsolv: heap-overflows in resolve_dependencies function 2057309 - Latest Hardware version for VMware vSphere 7.0U3 is not available on Satellite 7 2057416 - rubygem-rack is obsoleted without epoch 2057605 - foreman.rpm pulls in nodejs 2057632 - Creating repo fails if there's a validation error in the first save. 2057658 - Update pulp-rpm to 3.17 2057782 - Limit sync tags parameter is displayed twice on the repositories detail page 2057848 - Inclusion of tags in limit sync tags parameter is not white listing the tags to sync 2058397 - Ensure pulp-rpm 3.17 is built for Satellite 6.11 2058532 - certs-regenerate breaks qpidd certificates, resulting in qpidd start-up failures: Couldn't find any network address to listen to 2058649 - Unable to set or unset "Discovery location" settings from UI of Satellite 7.0 but the same is partly feasible via hammer_cli. 2058711 - Ostree type is missing during repo creation. 2058844 - The foreman-protector plugin does not works for Satellite 6.11 if the OS is RHEL 8 2058863 - Everytime a host build is being submitted that somehow generates a huge traceback with error "undefined method `insights' for nil:NilClass" in Satellite 7.0 2058867 - The insights registration steps happens during host build even if the host_registration_insights parameter is set to false in Satellite 7.0 2058894 - Server fingerprints not managed properly 2058905 - Content Import does not delete version on failure 2058984 - The Satellite 7.0 beta offers the download capability of both Host and Full Host image via UI where as the support for Host image was already removed in Satellite 6.10 2059576 - non admin user with host_view permission is unable to look at old host details ui 2059985 - please update to Satellite Ansible Collection 3.3.0 2060097 - [RFE] ouia-ID for content view table 2060396 - satellite-maintain self-upgrade passes even if the next major version maintenance repository isn't available 2060512 - Update terminology for ISS 2060546 - Leapp-upgrade package installation failing with dependency on sat 7.0 2060885 - Update foreman-ansible package to 7.0.3 2061688 - old rubygems (from 6.7 and older) installed and prevent EL7 to EL8 upgrade 2061749 - Templates sync with git on RHEL8 is causing SElinux error 2061773 - Settings defined by DSL are not properly encrypted 2061970 - Mirror on sync still shows up in 'hammer repository info', while mirroring policy does not 2062189 - satellite-installer gets failed with "Could not open SSL root certificate file /root/.postgresql/root.crt" error. 2062476 - GPG shows blank on repo details page render, but is correct when selecting the dropdown 2063149 - CVE-2022-23633 rubygem-actionpack: information leak between requests 2063190 - Upgrading from Satellite 6.9 to Satellite 6.10.3 fails with error "undefined method operatingsystems' for nil:NilClass" during the db:migrate step 2063575 - [RFE] - add ouia-ID for buttons on a cv 2063910 - LEAPP upgrade fails with [Errno 2] No such file or directory: '/var/lib/leapp/scratch/mounts/root_/system_overlay/etc/pki/pulp/content/pulp-global-repo.ca' 2064400 - Migration of encrypted fields between 3.14 and 3.16 is broken for some remotes 2064410 - Incorrect file permissions in /var/lib/pulp/media/... lead to repository sync errors 2064434 - Repository set not showing repos after importing library and creating an ak in a disconnected satellite 2064583 - High memory usage of foreman-proxy during a scaled bulk REX job 2064707 - bootstrap.py can't reach the API via the capsule 2064793 - Remotes should have username and password cleared out if a user sets them to be blank 2065015 - "Sync Connect Timeout" settings takes invalid value and shows update successful but doesn't reflect the change for invalid values 2065027 - Job invocation installs all the installable errata if incorrect `Job Template` is used. 2065391 - LCE and content view label resets when trying to delete the field names in "Upstream Foreman Server" tab 2065448 - [RFE] - add ouia-ID prop to update buttons in CDN configuration 2065450 - [RFE] - add ouia-ID prop to all fields in CDN configuration 2066408 - REX SSH Key works for SSH but fails for REX on RHEL 8.5 Host 2066899 - After IP change on Tues Mar 22 Satellite manifest tasks fail with 'could not initialize proxy [org.candlepin.model.UpstreamConsumer#XXXXX] - no Session' 2067301 - hammer content-import fails with error Export version 3.14.9 of pulpcore does not match installed version 3.14.12 if the z-stream versions are different for the connected and disconnected satellite 6.10 2067331 - Upgrade to Satellite 6.9 and 6.10 fails with error "ActiveRecord::RecordInvalid: Validation failed: Remote execution features is invalid" during db:seed stage 2069135 - After restore from 6.10.2 (and older) backup to 6.10.3 candlepin is broken 2069248 - documentation links in 6.11 navigate to 7.0 instead of 6.11 2069381 - new host ui, do not navigate to task, instead navigate to job 2069456 - new host ui details,ansible roles, bug when all ansible roles are assigned 2069459 - new host ui details, edit ansible roles, when assigned, wait and not confirmed, role is unasigned automatically 2069640 - insights total risk chart network errors in new host page's overview tab 2070176 - Clicking on "Select recommendations from all pages" of host details page(insights tab) selects insights recommendations of other hosts as well. 2070177 - De-duplicate errata migration doesn't delete child records 2070242 - The satellite-maintain change with respect to 6.11 version shift 2070272 - Sync Status page does not show syncing progress bar under "Result" column when syncing a repo 2070620 - After upgrading to 6.11 ping check fails with "Some components are failing: katello_agent" 2072447 - CVE-2022-28346 Django: SQL injection in QuerySet.annotate(),aggregate() and extra() 2072459 - CVE-2022-28347 Django: SQL injection via QuerySet.explain(options) on PostgreSQL 2072530 - Improvements on foreman-maintain's self-upgrade mechanism 2073039 - LEAPP upgrade enables wrong repositories for capsules 2073124 - HTTP responses include incorrect ETag value 2073194 - Filter API/ UI doesn't return errata, package group, module stream filter rules if repository has been removed from CV 2073307 - "Selected scenario is DISABLED" errors when trying to upgrade installer packages 2073313 - "Publish" action in the drop down doesn't work 2073421 - The new host page should be disabled by default 2073468 - Bootdisk Provisioning Templates are missing description 2073469 - Discovery kexec Provisioning Template is missing description 2073470 - "Kickstart default user data" Provisioning Template contains doubled description key 2075434 - bootstrap.py fails if puppet is not enabled in Satellite 2075519 - Upgrade fails during db:migrate with PG::ForeignKeyViolation: ERROR: update or delete on table "katello_errata" violates foreign key constraint "katello_content_facet_errata_errata_id" 2075528 - OS upgrade keeps original TFTP setup preventing machines to boot from the network 2076372 - Address VCR test changes in pulp_rpm_client 3.17.5 2076684 - NullPointerException during manifest refresh 2076987 - After upgrade any foreman-rake command shows 'ErbParser' and 'RubyParser' are ignored. 2077850 - Puppet purge fails on an upgraded Satellite 2078983 - Tabbable latest version 5.3.1 is not compatible with jest dom/ JSDom without changes to PF4. 2079357 - foreman-maintain maintenance-mode status command fails with `undefined method `maintenance_mode_status?' for nil:NilClass` 2080909 - The satellite-maintain self-upgrade does not disable the non RHSM repository if it was not enabled on system 2081280 - Bootdisks are left in privatetmp of httpd 2081459 - Omit python*-pulp-ostree packages 2082076 - Settings - Like operator for name 2082241 - hammer host-collection create fails with "Too many arguments" when setting unlimited-hosts 2082505 - Omit python*-pulp-python packages 2082560 - satellite-clone missed version rename 7.0 to 6.11 2083532 - PG::ForeignKeyViolation: ERROR: update or delete on table "katello_erratum_packages" violates foreign key constraint "katello_msep_erratum_package_id_fk" on table "katello_module_stream_erratum_packages" 2084106 - satellite-change-hostname on capsule runs deprecated capsule-installer 2084624 - Unable to install 6.11 with ansible-core 2.12 2085446 - LEAPP preupgrade --target 8.6 fails to resolve conflicts for rubygem-openscap 2085528 - Change "Component content view" to "Content view" 2086101 - rhel8 repos are missing python2-qpid, making qpid-tools and thus the katello-agent support unavailable 2086683 - Actions::Candlepin::Owner::Import failing with "Entity version collision detected" 2086948 - Remove 6.11 beta branding 2087727 - Upgrade to Satellite 6.10.5.1 fails with error message "PG::NotNullViolation: ERROR: null value in column "erratum_package_id" violates not-null constraint" 2089361 - satellite-clone is broken on RHEL8.6 2089794 - Insights recommendations get halted with error undefined method `id' for nil:NilClass 2089796 - Absence of Package redhat-access-insights-puppet.noarch in rhel 8 sat/capsule 2089812 - Need to list Satellite Utils and Puppet agent repositories on Recommended Repositories page for Sat 6.11 2089928 - Dependency Issue when attempting to enable Satellite Infoblox DNS and DHCP plugins on RHEL 8 2090740 - Update links for the new puppet documentation 2090820 - satellite upgrade to 6.11 fails in installer with "Could not open SSL root certificate file /root/.postgresql/root.crt" error for external DB setup 2093679 - satellite-installer --enable-foreman-proxy-plugin-shellhooks fails with error Error: Unable to find a match: rubygem-smart_proxy_shellhooks in Red Hat Satellite 6.11 2094255 - Configure Cloud Connector runs against an old hostname after a hostname change 2094280 - rhc_instance_id is not being set correctly by configure cloud connector playbook. 2094454 - Error "missing keywords: :arch, :major, :minor" on CDN configuration 2095598 - The completion of a remediation playbook should indicate success or failure combined for all hosts in the run 2095599 - Satellite yggdrasil-forwarder-worker does not send proper lowercase JSON to RHC API 2096198 - Too many connection issue occurring for on-demand content sync 2096921 - "Reconfigure Cloud Connector" job fails on upgraded Satellite configured with fifi/receptor. 6. Package List: Red Hat Satellite 6.11 for RHEL 7: Source: ansible-collection-redhat-satellite-3.3.0-1.el7sat.src.rpm ansible-collection-redhat-satellite_operations-1.2.3-1.el7sat.src.rpm ansible-runner-1.4.7-1.el7ar.src.rpm ansiblerole-foreman_scap_client-0.2.0-2.el7sat.src.rpm ansiblerole-insights-client-1.7.1-2.el7sat.src.rpm candlepin-4.1.13-1.el7sat.src.rpm createrepo_c-0.20.0-1.el7pc.src.rpm dynflow-utils-1.6.3-1.el7sat.src.rpm foreman-3.1.1.21-2.el7sat.src.rpm foreman-bootloaders-redhat-202005201200-1.el7sat.src.rpm foreman-discovery-image-3.8.2-1.el7sat.src.rpm foreman-discovery-image-service-1.0.0-4.1.el7sat.src.rpm foreman-installer-3.1.2.6-1.el7sat.src.rpm foreman-proxy-3.1.1.1-1.el7sat.src.rpm foreman-selinux-3.1.2.1-1.el7sat.src.rpm gofer-2.12.5-7.el7sat.src.rpm hfsplus-tools-332.14-12.el7.src.rpm katello-4.3.0-3.el7sat.src.rpm katello-certs-tools-2.9.0-1.el7sat.src.rpm katello-client-bootstrap-1.7.9-1.el7sat.src.rpm katello-selinux-4.0.2-1.el7sat.src.rpm keycloak-httpd-client-install-1.2.2-2.el7sat.src.rpm libcomps-0.1.18-1.el7pc.src.rpm libmodulemd2-2.9.3-1.el7pc.src.rpm libsodium-1.0.17-3.el7sat.src.rpm libsolv-0.7.22-1.el7pc.src.rpm libsolv0-0.6.34-4.el7sat.src.rpm libwebsockets-2.4.2-2.el7.src.rpm livecd-tools-20.4-1.6.el7sat.src.rpm pcp-mmvstatsd-0.4-2.el7sat.src.rpm pulpcore-selinux-1.3.0-1.el7pc.src.rpm puppet-agent-7.12.1-1.el7sat.src.rpm puppet-agent-oauth-0.5.1-3.el7sat.src.rpm puppet-foreman_scap_client-0.4.0-1.el7sat.src.rpm puppetlabs-stdlib-5.2.0-1.el7sat.src.rpm puppetserver-7.4.2-1.el7sat.src.rpm python-daemon-2.1.2-7.2.el7sat.src.rpm python-jinja2-2.10-10.el7sat.src.rpm python-lockfile-0.11.0-10.el7ar.src.rpm python-markupsafe-0.23-21.el7sat.src.rpm python-pexpect-4.6-1.el7at.src.rpm python-psutil-5.7.2-2.el7sat.src.rpm python-ptyprocess-0.5.2-3.el7at.src.rpm python-qpid-1.35.0-5.el7.src.rpm python2-libcomps-0.1.15-5.pulp.el7sat.src.rpm qpid-cpp-1.36.0-32.el7_9amq.src.rpm qpid-dispatch-1.14.0-1.el7_9.src.rpm qpid-proton-0.33.0-6.el7_9.src.rpm redhat-access-insights-puppet-1.0.1-1.el7sat.src.rpm rh-postgresql12-postgresql-evr-0.0.2-1.el7sat.src.rpm rhel8-kickstart-setup-0.0.2-1.el7sat.src.rpm rubygem-clamp-1.1.2-7.el7sat.src.rpm rubygem-facter-2.4.1-2.el7sat.src.rpm rubygem-fast_gettext-1.1.0-4.el7sat.src.rpm rubygem-foreman_maintain-1.0.12-1.el7sat.src.rpm rubygem-foreman_scap_client-0.5.0-1.el7sat.src.rpm rubygem-highline-2.0.3-2.el7sat.src.rpm rubygem-oauth-0.5.4-2.el7sat.src.rpm saslwrapper-0.22-5.el7sat.src.rpm satellite-6.11.0-2.el7sat.src.rpm satellite-installer-6.11.0.7-1.el7sat.src.rpm satellite-maintain-0.0.1-1.el7sat.src.rpm tfm-7.0-1.el7sat.src.rpm tfm-pulpcore-1.0-4.el7pc.src.rpm tfm-pulpcore-python-aiodns-3.0.0-2.el7pc.src.rpm tfm-pulpcore-python-aiofiles-0.7.0-2.el7pc.src.rpm tfm-pulpcore-python-aiohttp-3.8.1-2.el7pc.src.rpm tfm-pulpcore-python-aiohttp-xmlrpc-1.5.0-1.el7pc.src.rpm tfm-pulpcore-python-aioredis-2.0.0-2.el7pc.src.rpm tfm-pulpcore-python-aiosignal-1.2.0-1.el7pc.src.rpm tfm-pulpcore-python-ansible-builder-1.0.1-2.el7pc.src.rpm tfm-pulpcore-python-asgiref-3.4.1-1.el7pc.src.rpm tfm-pulpcore-python-async-lru-1.0.2-2.el7pc.src.rpm tfm-pulpcore-python-async-timeout-4.0.2-1.el7pc.src.rpm tfm-pulpcore-python-asyncio-throttle-1.0.2-2.el7pc.src.rpm tfm-pulpcore-python-attrs-21.2.0-2.el7pc.src.rpm tfm-pulpcore-python-backoff-1.11.1-1.el7pc.src.rpm tfm-pulpcore-python-bindep-2.10.1-1.el7pc.src.rpm tfm-pulpcore-python-bleach-3.3.1-1.el7pc.src.rpm tfm-pulpcore-python-bleach-allowlist-1.0.3-2.el7pc.src.rpm tfm-pulpcore-python-brotli-1.0.9-1.el7pc.src.rpm tfm-pulpcore-python-cchardet-2.1.7-1.el7pc.src.rpm tfm-pulpcore-python-certifi-2020.6.20-2.el7pc.src.rpm tfm-pulpcore-python-cffi-1.15.0-1.el7pc.src.rpm tfm-pulpcore-python-chardet-3.0.4-3.el7pc.src.rpm tfm-pulpcore-python-charset-normalizer-2.0.7-1.el7pc.src.rpm tfm-pulpcore-python-click-8.0.3-1.el7pc.src.rpm tfm-pulpcore-python-click-shell-2.1-2.el7pc.src.rpm tfm-pulpcore-python-colorama-0.4.4-2.el7pc.src.rpm tfm-pulpcore-python-contextlib2-21.6.0-2.el7pc.src.rpm tfm-pulpcore-python-cryptography-3.1.1-1.el7pc.src.rpm tfm-pulpcore-python-dateutil-2.8.2-1.el7pc.src.rpm tfm-pulpcore-python-debian-0.1.42-1.el7pc.src.rpm tfm-pulpcore-python-defusedxml-0.7.1-2.el7pc.src.rpm tfm-pulpcore-python-diff-match-patch-20200713-2.el7pc.src.rpm tfm-pulpcore-python-distro-1.6.0-2.el7pc.src.rpm tfm-pulpcore-python-django-3.2.13-1.el7pc.src.rpm tfm-pulpcore-python-django-currentuser-0.5.3-3.el7pc.src.rpm tfm-pulpcore-python-django-filter-21.1-1.el7pc.src.rpm tfm-pulpcore-python-django-guardian-2.4.0-3.el7pc.src.rpm tfm-pulpcore-python-django-guid-3.2.0-2.el7pc.src.rpm tfm-pulpcore-python-django-import-export-2.6.1-1.el7pc.src.rpm tfm-pulpcore-python-django-lifecycle-0.9.3-1.el7pc.src.rpm tfm-pulpcore-python-django-prometheus-2.1.0-2.el7pc.src.rpm tfm-pulpcore-python-django-readonly-field-1.0.5-3.el7pc.src.rpm tfm-pulpcore-python-djangorestframework-3.12.4-4.el7pc.src.rpm tfm-pulpcore-python-djangorestframework-queryfields-1.0.0-4.el7pc.src.rpm tfm-pulpcore-python-drf-access-policy-1.1.0-1.el7pc.src.rpm tfm-pulpcore-python-drf-nested-routers-0.93.3-3.el7pc.src.rpm tfm-pulpcore-python-drf-spectacular-0.20.1-1.el7pc.src.rpm tfm-pulpcore-python-dynaconf-3.1.7-2.el7pc.src.rpm tfm-pulpcore-python-ecdsa-0.13.3-3.el7pc.src.rpm tfm-pulpcore-python-et-xmlfile-1.1.0-1.el7pc.src.rpm tfm-pulpcore-python-flake8-3.9.2-3.el7pc.src.rpm tfm-pulpcore-python-frozenlist-1.3.0-1.el7pc.src.rpm tfm-pulpcore-python-future-0.18.2-4.el7pc.src.rpm tfm-pulpcore-python-galaxy-importer-0.4.1-2.el7pc.src.rpm tfm-pulpcore-python-gnupg-0.4.7-2.el7pc.src.rpm tfm-pulpcore-python-gunicorn-20.1.0-3.el7pc.src.rpm tfm-pulpcore-python-idna-3.3-1.el7pc.src.rpm tfm-pulpcore-python-idna-ssl-1.1.0-4.el7pc.src.rpm tfm-pulpcore-python-importlib-metadata-1.7.0-2.el7pc.src.rpm tfm-pulpcore-python-inflection-0.5.1-2.el7pc.src.rpm tfm-pulpcore-python-iniparse-0.4-34.el7pc.src.rpm tfm-pulpcore-python-jinja2-3.0.2-1.el7pc.src.rpm tfm-pulpcore-python-jsonschema-3.2.0-7.el7pc.src.rpm tfm-pulpcore-python-lxml-4.7.1-1.el7pc.src.rpm tfm-pulpcore-python-markdown-3.3.4-4.el7pc.src.rpm tfm-pulpcore-python-markuppy-1.14-2.el7pc.src.rpm tfm-pulpcore-python-markupsafe-2.0.1-2.el7pc.src.rpm tfm-pulpcore-python-mccabe-0.6.1-2.el7pc.src.rpm tfm-pulpcore-python-multidict-5.2.0-1.el7pc.src.rpm tfm-pulpcore-python-naya-1.1.1-1.el7pc.src.rpm tfm-pulpcore-python-odfpy-1.4.1-5.el7pc.src.rpm tfm-pulpcore-python-openpyxl-3.0.9-1.el7pc.src.rpm tfm-pulpcore-python-packaging-21.2-1.el7pc.src.rpm tfm-pulpcore-python-parsley-1.3-1.el7pc.src.rpm tfm-pulpcore-python-pbr-5.6.0-1.el7pc.src.rpm tfm-pulpcore-python-productmd-1.33-2.el7pc.src.rpm tfm-pulpcore-python-prometheus-client-0.8.0-2.el7pc.src.rpm tfm-pulpcore-python-psycopg2-2.9.1-1.el7pc.src.rpm tfm-pulpcore-python-pulp-ansible-0.10.1-1.el7pc.src.rpm tfm-pulpcore-python-pulp-certguard-1.5.1-1.el7pc.src.rpm tfm-pulpcore-python-pulp-cli-0.14.0-1.el7pc.src.rpm tfm-pulpcore-python-pulp-container-2.9.2-1.el7pc.src.rpm tfm-pulpcore-python-pulp-deb-2.16.1-1.el7pc.src.rpm tfm-pulpcore-python-pulp-file-1.10.1-1.el7pc.src.rpm tfm-pulpcore-python-pulp-rpm-3.17.5-1.1.el7pc.src.rpm tfm-pulpcore-python-pulpcore-3.16.9-1.el7pc.src.rpm tfm-pulpcore-python-pyOpenSSL-19.1.0-2.el7pc.src.rpm tfm-pulpcore-python-pycairo-1.20.1-2.el7pc.src.rpm tfm-pulpcore-python-pycares-4.1.2-3.el7pc.src.rpm tfm-pulpcore-python-pycodestyle-2.7.0-4.el7pc.src.rpm tfm-pulpcore-python-pycparser-2.20-2.el7pc.src.rpm tfm-pulpcore-python-pycryptodomex-3.11.0-1.el7pc.src.rpm tfm-pulpcore-python-pyflakes-2.3.1-4.el7pc.src.rpm tfm-pulpcore-python-pygments-2.10.0-2.el7pc.src.rpm tfm-pulpcore-python-pygobject-3.40.1-1.el7pc.src.rpm tfm-pulpcore-python-pygtrie-2.4.2-2.el7pc.src.rpm tfm-pulpcore-python-pyjwkest-1.4.2-5.el7pc.src.rpm tfm-pulpcore-python-pyjwt-1.7.1-7.el7pc.src.rpm tfm-pulpcore-python-pyparsing-2.4.7-2.el7pc.src.rpm tfm-pulpcore-python-pyrsistent-0.18.0-1.el7pc.src.rpm tfm-pulpcore-python-pytz-2021.3-1.el7pc.src.rpm tfm-pulpcore-python-pyyaml-5.4.1-3.el7pc.src.rpm tfm-pulpcore-python-redis-3.5.3-2.el7pc.src.rpm tfm-pulpcore-python-requests-2.26.0-3.el7pc.src.rpm tfm-pulpcore-python-requirements-parser-0.2.0-2.el7pc.src.rpm tfm-pulpcore-python-rhsm-1.19.2-2.el7pc.src.rpm tfm-pulpcore-python-schema-0.7.5-1.el7pc.src.rpm tfm-pulpcore-python-semantic-version-2.8.5-2.el7pc.src.rpm tfm-pulpcore-python-six-1.16.0-1.el7pc.src.rpm tfm-pulpcore-python-sqlparse-0.4.2-2.el7pc.src.rpm tfm-pulpcore-python-tablib-3.1.0-1.el7pc.src.rpm tfm-pulpcore-python-toml-0.10.2-2.el7pc.src.rpm tfm-pulpcore-python-typing-extensions-3.10.0.2-1.el7pc.src.rpm tfm-pulpcore-python-uritemplate-4.1.1-1.el7pc.src.rpm tfm-pulpcore-python-url-normalize-1.4.3-3.el7pc.src.rpm tfm-pulpcore-python-urllib3-1.26.7-1.el7pc.src.rpm tfm-pulpcore-python-urlman-1.4.0-2.el7pc.src.rpm tfm-pulpcore-python-webencodings-0.5.1-2.el7pc.src.rpm tfm-pulpcore-python-whitenoise-5.3.0-1.el7pc.src.rpm tfm-pulpcore-python-xlrd-2.0.1-4.el7pc.src.rpm tfm-pulpcore-python-xlwt-1.3.0-2.el7pc.src.rpm tfm-pulpcore-python-yarl-1.7.2-1.el7pc.src.rpm tfm-pulpcore-python-zipp-3.4.0-3.el7pc.src.rpm tfm-rubygem-actioncable-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-actionmailbox-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-actionmailer-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-actionpack-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-actiontext-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-actionview-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-activejob-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-activemodel-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-activerecord-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-activerecord-import-1.1.0-1.el7sat.src.rpm tfm-rubygem-activerecord-session_store-2.0.0-1.el7sat.src.rpm tfm-rubygem-activestorage-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-activesupport-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-acts_as_list-1.0.3-2.el7sat.src.rpm tfm-rubygem-addressable-2.8.0-1.el7sat.src.rpm tfm-rubygem-algebrick-0.7.3-8.el7sat.src.rpm tfm-rubygem-amazing_print-1.1.0-2.el7sat.src.rpm tfm-rubygem-ancestry-3.0.7-2.el7sat.src.rpm tfm-rubygem-anemone-0.7.2-23.el7sat.src.rpm tfm-rubygem-angular-rails-templates-1.1.0-2.el7sat.src.rpm tfm-rubygem-ansi-1.5.0-3.el7sat.src.rpm tfm-rubygem-apipie-bindings-0.4.0-2.el7sat.src.rpm tfm-rubygem-apipie-dsl-2.3.0-2.el7sat.src.rpm tfm-rubygem-apipie-params-0.0.5-5.1.el7sat.src.rpm tfm-rubygem-apipie-rails-0.5.17-4.el7sat.src.rpm tfm-rubygem-audited-4.9.0-4.el7sat.src.rpm tfm-rubygem-azure_mgmt_compute-0.22.0-1.el7sat.src.rpm tfm-rubygem-azure_mgmt_network-0.26.1-2.el7sat.src.rpm tfm-rubygem-azure_mgmt_resources-0.18.2-1.el7sat.src.rpm tfm-rubygem-azure_mgmt_storage-0.23.0-1.el7sat.src.rpm tfm-rubygem-azure_mgmt_subscriptions-0.18.5-1.el7sat.src.rpm tfm-rubygem-bcrypt-3.1.12-4.1.el7sat.src.rpm tfm-rubygem-builder-3.2.4-2.el7sat.src.rpm tfm-rubygem-bundler_ext-0.4.1-6.el7sat.src.rpm tfm-rubygem-clamp-1.1.2-7.el7sat.src.rpm tfm-rubygem-coffee-rails-5.0.0-2.el7sat.src.rpm tfm-rubygem-coffee-script-2.4.1-5.el7sat.src.rpm tfm-rubygem-coffee-script-source-1.12.2-5.el7sat.src.rpm tfm-rubygem-colorize-0.8.1-2.el7sat.src.rpm tfm-rubygem-concurrent-ruby-1.1.6-3.el7sat.src.rpm tfm-rubygem-concurrent-ruby-edge-0.6.0-3.el7sat.src.rpm tfm-rubygem-connection_pool-2.2.2-3.el7sat.src.rpm tfm-rubygem-crass-1.0.6-2.el7sat.src.rpm tfm-rubygem-css_parser-1.4.7-5.el7sat.src.rpm tfm-rubygem-daemons-1.2.3-7.1.el7sat.src.rpm tfm-rubygem-deacon-1.0.0-5.el7sat.src.rpm tfm-rubygem-declarative-0.0.10-3.el7sat.src.rpm tfm-rubygem-declarative-option-0.1.0-3.el7sat.src.rpm tfm-rubygem-deep_cloneable-3.0.0-4.el7sat.src.rpm tfm-rubygem-deface-1.5.3-3.el7sat.src.rpm tfm-rubygem-diffy-3.0.1-6.1.el7sat.src.rpm tfm-rubygem-domain_name-0.5.20160310-5.el7sat.src.rpm tfm-rubygem-dynflow-1.6.4-1.el7sat.src.rpm tfm-rubygem-erubi-1.9.0-2.el7sat.src.rpm tfm-rubygem-excon-0.76.0-2.el7sat.src.rpm tfm-rubygem-execjs-2.7.0-5.el7sat.src.rpm tfm-rubygem-facter-4.0.51-2.el7sat.src.rpm tfm-rubygem-faraday-0.17.3-2.el7sat.src.rpm tfm-rubygem-faraday-cookie_jar-0.0.6-2.el7sat.src.rpm tfm-rubygem-faraday_middleware-0.13.1-3.el7sat.src.rpm tfm-rubygem-fast_gettext-1.4.1-5.el7sat.src.rpm tfm-rubygem-ffi-1.12.2-2.1.el7sat.src.rpm tfm-rubygem-fog-aws-3.6.5-2.el7sat.src.rpm tfm-rubygem-fog-core-2.1.0-4.el7sat.src.rpm tfm-rubygem-fog-google-1.11.0-2.el7sat.src.rpm tfm-rubygem-fog-json-1.2.0-4.el7sat.src.rpm tfm-rubygem-fog-kubevirt-1.3.3-2.el7sat.src.rpm tfm-rubygem-fog-libvirt-0.9.0-1.el7sat.src.rpm tfm-rubygem-fog-openstack-1.0.8-4.el7sat.src.rpm tfm-rubygem-fog-ovirt-2.0.1-2.el7sat.src.rpm tfm-rubygem-fog-vsphere-3.5.1-1.el7sat.src.rpm tfm-rubygem-fog-xml-0.1.2-9.el7sat.src.rpm tfm-rubygem-foreman-tasks-5.2.3-1.el7sat.src.rpm tfm-rubygem-foreman_ansible-7.0.4.1-1.el7sat.src.rpm tfm-rubygem-foreman_azure_rm-2.2.6-1.el7sat.src.rpm tfm-rubygem-foreman_bootdisk-19.0.4.1-1.el7sat.src.rpm tfm-rubygem-foreman_discovery-19.0.4-1.el7sat.src.rpm tfm-rubygem-foreman_hooks-0.3.17-2.el7sat.src.rpm tfm-rubygem-foreman_kubevirt-0.1.9-2.el7sat.src.rpm tfm-rubygem-foreman_leapp-0.1.9-1.el7sat.src.rpm tfm-rubygem-foreman_openscap-5.1.1-1.el7sat.src.rpm tfm-rubygem-foreman_puppet-2.0.6-1.el7sat.src.rpm tfm-rubygem-foreman_remote_execution-5.0.7-1.el7sat.src.rpm tfm-rubygem-foreman_rh_cloud-5.0.39-1.el7sat.src.rpm tfm-rubygem-foreman_templates-9.1.0-1.el7sat.src.rpm tfm-rubygem-foreman_theme_satellite-9.0.0.10-1.el7sat.src.rpm tfm-rubygem-foreman_virt_who_configure-0.5.8-1.el7sat.src.rpm tfm-rubygem-foreman_webhooks-2.0.1-1.1.el7sat.src.rpm tfm-rubygem-formatador-0.2.1-13.el7sat.src.rpm tfm-rubygem-friendly_id-5.3.0-2.el7sat.src.rpm tfm-rubygem-fx-0.5.0-2.el7sat.src.rpm tfm-rubygem-get_process_mem-0.2.7-2.1.el7sat.src.rpm tfm-rubygem-gettext_i18n_rails-1.8.0-3.el7sat.src.rpm tfm-rubygem-git-1.5.0-2.el7sat.src.rpm tfm-rubygem-gitlab-sidekiq-fetcher-0.6.0-2.el7sat.src.rpm tfm-rubygem-globalid-0.4.2-2.el7sat.src.rpm tfm-rubygem-google-api-client-0.33.2-2.el7sat.src.rpm tfm-rubygem-google-cloud-env-1.3.3-2.el7sat.src.rpm tfm-rubygem-googleauth-0.13.1-2.el7sat.src.rpm tfm-rubygem-graphql-1.8.14-3.el7sat.src.rpm tfm-rubygem-graphql-batch-0.3.10-3.el7sat.src.rpm tfm-rubygem-gssapi-1.2.0-8.el7sat.src.rpm tfm-rubygem-hammer_cli-3.1.0.1-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman-3.1.0.1-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_admin-1.1.0-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_ansible-0.3.4-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_discovery-1.1.0-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_kubevirt-0.1.5-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_leapp-0.1.1-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_openscap-0.1.13-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_puppet-0.0.5-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_tasks-0.0.17-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_templates-0.2.0-2.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_webhooks-0.0.2-1.el7sat.src.rpm tfm-rubygem-hammer_cli_katello-1.3.1.6-1.el7sat.src.rpm tfm-rubygem-hashie-3.6.0-3.el7sat.src.rpm tfm-rubygem-highline-2.0.3-2.el7sat.src.rpm tfm-rubygem-hocon-1.3.1-2.el7sat.src.rpm tfm-rubygem-http-3.3.0-2.el7sat.src.rpm tfm-rubygem-http-cookie-1.0.2-5.1.el7sat.src.rpm tfm-rubygem-http-form_data-2.1.1-2.el7sat.src.rpm tfm-rubygem-http_parser.rb-0.6.0-3.1.el7sat.src.rpm tfm-rubygem-httpclient-2.8.3-4.el7sat.src.rpm tfm-rubygem-i18n-1.8.2-2.el7sat.src.rpm tfm-rubygem-infoblox-3.0.0-4.el7sat.src.rpm tfm-rubygem-ipaddress-0.8.0-13.el7sat.src.rpm tfm-rubygem-jgrep-1.3.3-13.el7sat.src.rpm tfm-rubygem-journald-logger-2.0.4-3.el7sat.src.rpm tfm-rubygem-journald-native-1.0.11-4.1.el7sat.src.rpm tfm-rubygem-jwt-2.2.2-2.el7sat.src.rpm tfm-rubygem-kafo-6.4.0-1.el7sat.src.rpm tfm-rubygem-kafo_parsers-1.2.1-1.el7sat.src.rpm tfm-rubygem-kafo_wizards-0.0.2-2.el7sat.src.rpm tfm-rubygem-katello-4.3.0.42-1.el7sat.src.rpm tfm-rubygem-kubeclient-4.3.0-2.el7sat.src.rpm tfm-rubygem-ldap_fluff-0.6.0-1.el7sat.src.rpm tfm-rubygem-little-plugger-1.1.4-3.el7sat.src.rpm tfm-rubygem-locale-2.0.9-15.el7sat.src.rpm tfm-rubygem-logging-2.3.0-2.el7sat.src.rpm tfm-rubygem-logging-journald-2.0.0-3.el7sat.src.rpm tfm-rubygem-loofah-2.4.0-2.el7sat.src.rpm tfm-rubygem-mail-2.7.1-2.el7sat.src.rpm tfm-rubygem-marcel-1.0.1-1.el7sat.src.rpm tfm-rubygem-memoist-0.16.0-3.el7sat.src.rpm tfm-rubygem-method_source-0.9.2-3.el7sat.src.rpm tfm-rubygem-mime-types-3.3.1-2.el7sat.src.rpm tfm-rubygem-mime-types-data-3.2018.0812-5.el7sat.src.rpm tfm-rubygem-mini_mime-1.0.2-2.el7sat.src.rpm tfm-rubygem-mini_portile2-2.5.1-1.el7sat.src.rpm tfm-rubygem-mqtt-0.5.0-1.el7sat.src.rpm tfm-rubygem-ms_rest-0.7.6-1.el7sat.src.rpm tfm-rubygem-ms_rest_azure-0.12.0-1.el7sat.src.rpm tfm-rubygem-msgpack-1.3.3-2.1.el7sat.src.rpm tfm-rubygem-multi_json-1.14.1-3.el7sat.src.rpm tfm-rubygem-multipart-post-2.0.0-3.el7sat.src.rpm tfm-rubygem-mustermann-1.1.1-1.el7sat.src.rpm tfm-rubygem-net-ldap-0.17.0-2.el7sat.src.rpm tfm-rubygem-net-ping-2.0.1-5.el7sat.src.rpm tfm-rubygem-net-scp-1.2.1-5.el7sat.src.rpm tfm-rubygem-net-ssh-4.2.0-3.el7sat.src.rpm tfm-rubygem-net-ssh-krb-0.4.0-4.el7sat.src.rpm tfm-rubygem-net_http_unix-0.2.2-2.el7sat.src.rpm tfm-rubygem-netrc-0.11.0-6.el7sat.src.rpm tfm-rubygem-newt-0.9.7-3.1.el7sat.src.rpm tfm-rubygem-nio4r-2.5.4-2.1.el7sat.src.rpm tfm-rubygem-nokogiri-1.11.3-2.el7sat.src.rpm tfm-rubygem-oauth-0.5.4-5.el7sat.src.rpm tfm-rubygem-openscap-0.4.9-7.el7sat.src.rpm tfm-rubygem-openscap_parser-1.0.2-2.el7sat.src.rpm tfm-rubygem-optimist-3.0.0-3.el7sat.src.rpm tfm-rubygem-os-1.0.0-3.el7sat.src.rpm tfm-rubygem-ovirt-engine-sdk-4.4.0-2.1.el7sat.src.rpm tfm-rubygem-ovirt_provision_plugin-2.0.3-3.el7sat.src.rpm tfm-rubygem-parallel-1.19.1-2.el7sat.src.rpm tfm-rubygem-parse-cron-0.1.4-5.el7sat.src.rpm tfm-rubygem-pg-1.1.4-4.1.el7sat.src.rpm tfm-rubygem-polyglot-0.3.5-3.1.el7sat.src.rpm tfm-rubygem-powerbar-2.0.1-3.el7sat.src.rpm tfm-rubygem-prometheus-client-1.0.0-3.el7sat.src.rpm tfm-rubygem-promise.rb-0.7.4-3.el7sat.src.rpm tfm-rubygem-public_suffix-3.0.3-3.el7sat.src.rpm tfm-rubygem-pulp_ansible_client-0.10.1-1.el7sat.src.rpm tfm-rubygem-pulp_certguard_client-1.5.0-1.el7sat.src.rpm tfm-rubygem-pulp_container_client-2.9.0-1.el7sat.src.rpm tfm-rubygem-pulp_deb_client-2.16.0-1.el7sat.src.rpm tfm-rubygem-pulp_file_client-1.10.0-1.el7sat.src.rpm tfm-rubygem-pulp_ostree_client-2.0.0-0.1.a1.el7sat.src.rpm tfm-rubygem-pulp_python_client-3.5.2-1.el7sat.src.rpm tfm-rubygem-pulp_rpm_client-3.17.4-1.el7sat.src.rpm tfm-rubygem-pulpcore_client-3.16.7-1.el7sat.src.rpm tfm-rubygem-puma-5.6.2-1.el7sat.src.rpm tfm-rubygem-puma-status-1.3-1.el7sat.src.rpm tfm-rubygem-qpid_proton-0.33.0-5.el7sat.src.rpm tfm-rubygem-quantile-0.2.0-5.el7sat.src.rpm tfm-rubygem-rabl-0.14.3-2.el7sat.src.rpm tfm-rubygem-racc-1.5.2-1.el7sat.src.rpm tfm-rubygem-rack-2.2.3-2.el7sat.src.rpm tfm-rubygem-rack-cors-1.0.2-3.el7sat.src.rpm tfm-rubygem-rack-jsonp-1.3.1-10.el7sat.src.rpm tfm-rubygem-rack-protection-2.1.0-2.el7sat.src.rpm tfm-rubygem-rack-test-1.1.0-5.el7sat.src.rpm tfm-rubygem-rails-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-rails-dom-testing-2.0.3-7.el7sat.src.rpm tfm-rubygem-rails-html-sanitizer-1.3.0-2.el7sat.src.rpm tfm-rubygem-rails-i18n-6.0.0-3.el7sat.src.rpm tfm-rubygem-railties-6.0.4.7-1.el7sat.src.rpm tfm-rubygem-rainbow-2.2.2-1.el7sat.src.rpm tfm-rubygem-rb-inotify-0.9.7-6.el7sat.src.rpm tfm-rubygem-rbnacl-4.0.2-2.el7sat.src.rpm tfm-rubygem-rbvmomi-2.2.0-4.el7sat.src.rpm tfm-rubygem-record_tag_helper-1.0.1-4.el7sat.src.rpm tfm-rubygem-recursive-open-struct-1.1.0-2.el7sat.src.rpm tfm-rubygem-redfish_client-0.5.2-2.el7sat.src.rpm tfm-rubygem-redis-4.5.1-1.el7sat.src.rpm tfm-rubygem-representable-3.0.4-3.el7sat.src.rpm tfm-rubygem-responders-3.0.0-4.el7sat.src.rpm tfm-rubygem-rest-client-2.0.2-4.el7sat.src.rpm tfm-rubygem-retriable-3.1.2-3.el7sat.src.rpm tfm-rubygem-rkerberos-0.1.5-20.1.el7sat.src.rpm tfm-rubygem-roadie-3.4.0-4.el7sat.src.rpm tfm-rubygem-roadie-rails-2.1.1-3.el7sat.src.rpm tfm-rubygem-robotex-1.0.0-22.el7sat.src.rpm tfm-rubygem-rsec-0.4.3-5.el7sat.src.rpm tfm-rubygem-ruby-libvirt-0.7.1-2.1.el7sat.src.rpm tfm-rubygem-ruby2_keywords-0.0.4-1.el7sat.src.rpm tfm-rubygem-ruby2ruby-2.4.2-4.el7sat.src.rpm tfm-rubygem-ruby_parser-3.10.1-4.el7sat.src.rpm tfm-rubygem-rubyipmi-0.11.0-1.el7sat.src.rpm tfm-rubygem-runcible-2.13.1-2.el7sat.src.rpm tfm-rubygem-safemode-1.3.6-2.el7sat.src.rpm tfm-rubygem-scoped_search-4.1.9-2.el7sat.src.rpm tfm-rubygem-sd_notify-0.1.0-2.el7sat.src.rpm tfm-rubygem-secure_headers-6.3.0-3.el7sat.src.rpm tfm-rubygem-sequel-5.42.0-2.el7sat.src.rpm tfm-rubygem-server_sent_events-0.1.2-2.el7sat.src.rpm tfm-rubygem-sexp_processor-4.10.0-7.el7sat.src.rpm tfm-rubygem-sidekiq-5.2.10-1.el7sat.src.rpm tfm-rubygem-signet-0.14.0-2.el7sat.src.rpm tfm-rubygem-sinatra-2.1.0-3.el7sat.src.rpm tfm-rubygem-smart_proxy_ansible-3.3.1-2.el7sat.src.rpm tfm-rubygem-smart_proxy_container_gateway-1.0.6-1.el7sat.src.rpm tfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-6.el7sat.src.rpm tfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-5.el7sat.src.rpm tfm-rubygem-smart_proxy_discovery-1.0.5-8.el7sat.src.rpm tfm-rubygem-smart_proxy_discovery_image-1.3.2-3.el7sat.src.rpm tfm-rubygem-smart_proxy_dns_infoblox-1.1.0-6.el7sat.src.rpm tfm-rubygem-smart_proxy_dynflow-0.6.3-1.el7sat.src.rpm tfm-rubygem-smart_proxy_dynflow_core-0.4.1-1.el7sat.src.rpm tfm-rubygem-smart_proxy_openscap-0.9.2-1.el7sat.src.rpm tfm-rubygem-smart_proxy_pulp-3.2.0-2.el7sat.src.rpm tfm-rubygem-smart_proxy_remote_execution_ssh-0.5.3-1.el7sat.src.rpm tfm-rubygem-smart_proxy_shellhooks-0.9.2-2.el7sat.src.rpm tfm-rubygem-sprockets-4.0.2-2.el7sat.src.rpm tfm-rubygem-sprockets-rails-3.2.1-7.el7sat.src.rpm tfm-rubygem-sqlite3-1.3.13-7.1.el7sat.src.rpm tfm-rubygem-sshkey-1.9.0-5.el7sat.src.rpm tfm-rubygem-statsd-instrument-2.1.4-4.el7sat.src.rpm tfm-rubygem-stomp-1.4.9-2.el7sat.src.rpm tfm-rubygem-thor-1.0.1-3.el7sat.src.rpm tfm-rubygem-thread_safe-0.3.6-6.el7sat.src.rpm tfm-rubygem-tilt-2.0.8-5.el7sat.src.rpm tfm-rubygem-timeliness-0.3.10-2.el7sat.src.rpm tfm-rubygem-tzinfo-1.2.6-2.el7sat.src.rpm tfm-rubygem-uber-0.1.0-3.el7sat.src.rpm tfm-rubygem-unf-0.1.3-9.el7sat.src.rpm tfm-rubygem-unf_ext-0.0.7.2-4.1.el7sat.src.rpm tfm-rubygem-unicode-0.4.4.4-4.1.el7sat.src.rpm tfm-rubygem-unicode-display_width-1.7.0-2.el7sat.src.rpm tfm-rubygem-validates_lengths_from_database-0.5.0-8.el7sat.src.rpm tfm-rubygem-webpack-rails-0.9.8-6.1.el7sat.src.rpm tfm-rubygem-websocket-driver-0.7.1-2.1.el7sat.src.rpm tfm-rubygem-websocket-extensions-0.1.5-2.el7sat.src.rpm tfm-rubygem-will_paginate-3.1.7-4.el7sat.src.rpm tfm-rubygem-xmlrpc-0.3.0-3.el7sat.src.rpm tfm-rubygem-zeitwerk-2.2.2-2.el7sat.src.rpm yggdrasil-worker-forwarder-0.0.1-1.el7sat.src.rpm noarch: ansible-collection-redhat-satellite-3.3.0-1.el7sat.noarch.rpm ansible-collection-redhat-satellite_operations-1.2.3-1.el7sat.noarch.rpm ansible-runner-1.4.7-1.el7ar.noarch.rpm ansiblerole-foreman_scap_client-0.2.0-2.el7sat.noarch.rpm ansiblerole-insights-client-1.7.1-2.el7sat.noarch.rpm candlepin-4.1.13-1.el7sat.noarch.rpm candlepin-selinux-4.1.13-1.el7sat.noarch.rpm foreman-3.1.1.21-2.el7sat.noarch.rpm foreman-bootloaders-redhat-202005201200-1.el7sat.noarch.rpm foreman-bootloaders-redhat-tftpboot-202005201200-1.el7sat.noarch.rpm foreman-cli-3.1.1.21-2.el7sat.noarch.rpm foreman-debug-3.1.1.21-2.el7sat.noarch.rpm foreman-discovery-image-3.8.2-1.el7sat.noarch.rpm foreman-dynflow-sidekiq-3.1.1.21-2.el7sat.noarch.rpm foreman-ec2-3.1.1.21-2.el7sat.noarch.rpm foreman-gce-3.1.1.21-2.el7sat.noarch.rpm foreman-installer-3.1.2.6-1.el7sat.noarch.rpm foreman-installer-katello-3.1.2.6-1.el7sat.noarch.rpm foreman-journald-3.1.1.21-2.el7sat.noarch.rpm foreman-libvirt-3.1.1.21-2.el7sat.noarch.rpm foreman-openstack-3.1.1.21-2.el7sat.noarch.rpm foreman-ovirt-3.1.1.21-2.el7sat.noarch.rpm foreman-postgresql-3.1.1.21-2.el7sat.noarch.rpm foreman-proxy-3.1.1.1-1.el7sat.noarch.rpm foreman-proxy-journald-3.1.1.1-1.el7sat.noarch.rpm foreman-selinux-3.1.2.1-1.el7sat.noarch.rpm foreman-service-3.1.1.21-2.el7sat.noarch.rpm foreman-telemetry-3.1.1.21-2.el7sat.noarch.rpm foreman-vmware-3.1.1.21-2.el7sat.noarch.rpm katello-4.3.0-3.el7sat.noarch.rpm katello-certs-tools-2.9.0-1.el7sat.noarch.rpm katello-client-bootstrap-1.7.9-1.el7sat.noarch.rpm katello-common-4.3.0-3.el7sat.noarch.rpm katello-debug-4.3.0-3.el7sat.noarch.rpm katello-selinux-4.0.2-1.el7sat.noarch.rpm keycloak-httpd-client-install-1.2.2-2.el7sat.noarch.rpm puppet-agent-oauth-0.5.1-3.el7sat.noarch.rpm puppet-foreman_scap_client-0.4.0-1.el7sat.noarch.rpm puppetlabs-stdlib-5.2.0-1.el7sat.noarch.rpm puppetserver-7.4.2-1.el7sat.noarch.rpm python-gofer-2.12.5-7.el7sat.noarch.rpm python-gofer-qpid-2.12.5-7.el7sat.noarch.rpm python-qpid-1.35.0-5.el7.noarch.rpm python2-ansible-runner-1.4.7-1.el7ar.noarch.rpm python2-daemon-2.1.2-7.2.el7sat.noarch.rpm python2-jinja2-2.10-10.el7sat.noarch.rpm python2-keycloak-httpd-client-install-1.2.2-2.el7sat.noarch.rpm python2-lockfile-0.11.0-10.el7ar.noarch.rpm python2-pexpect-4.6-1.el7at.noarch.rpm python2-ptyprocess-0.5.2-3.el7at.noarch.rpm qpid-dispatch-tools-1.14.0-1.el7_9.noarch.rpm qpid-tools-1.36.0-32.el7_9amq.noarch.rpm redhat-access-insights-puppet-1.0.1-1.el7sat.noarch.rpm rhel8-kickstart-setup-0.0.2-1.el7sat.noarch.rpm rubygem-clamp-1.1.2-7.el7sat.noarch.rpm rubygem-fast_gettext-1.1.0-4.el7sat.noarch.rpm rubygem-foreman_maintain-1.0.12-1.el7sat.noarch.rpm rubygem-foreman_scap_client-0.5.0-1.el7sat.noarch.rpm rubygem-highline-2.0.3-2.el7sat.noarch.rpm rubygem-oauth-0.5.4-2.el7sat.noarch.rpm satellite-6.11.0-2.el7sat.noarch.rpm satellite-cli-6.11.0-2.el7sat.noarch.rpm satellite-common-6.11.0-2.el7sat.noarch.rpm satellite-installer-6.11.0.7-1.el7sat.noarch.rpm satellite-maintain-0.0.1-1.el7sat.noarch.rpm tfm-pulpcore-python3-aiodns-3.0.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-aiofiles-0.7.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-aiohttp-xmlrpc-1.5.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-aioredis-2.0.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-aiosignal-1.2.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-ansible-builder-1.0.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-asgiref-3.4.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-async-lru-1.0.2-2.el7pc.noarch.rpm tfm-pulpcore-python3-async-timeout-4.0.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-asyncio-throttle-1.0.2-2.el7pc.noarch.rpm tfm-pulpcore-python3-attrs-21.2.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-backoff-1.11.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-bindep-2.10.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-bleach-3.3.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-bleach-allowlist-1.0.3-2.el7pc.noarch.rpm tfm-pulpcore-python3-certifi-2020.6.20-2.el7pc.noarch.rpm tfm-pulpcore-python3-chardet-3.0.4-3.el7pc.noarch.rpm tfm-pulpcore-python3-charset-normalizer-2.0.7-1.el7pc.noarch.rpm tfm-pulpcore-python3-click-8.0.3-1.el7pc.noarch.rpm tfm-pulpcore-python3-click-shell-2.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-colorama-0.4.4-2.el7pc.noarch.rpm tfm-pulpcore-python3-contextlib2-21.6.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-dateutil-2.8.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-debian-0.1.42-1.el7pc.noarch.rpm tfm-pulpcore-python3-defusedxml-0.7.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-diff-match-patch-20200713-2.el7pc.noarch.rpm tfm-pulpcore-python3-distro-1.6.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-django-3.2.13-1.el7pc.noarch.rpm tfm-pulpcore-python3-django-currentuser-0.5.3-3.el7pc.noarch.rpm tfm-pulpcore-python3-django-filter-21.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-django-guardian-2.4.0-3.el7pc.noarch.rpm tfm-pulpcore-python3-django-guid-3.2.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-django-import-export-2.6.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-django-lifecycle-0.9.3-1.el7pc.noarch.rpm tfm-pulpcore-python3-django-prometheus-2.1.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-django-readonly-field-1.0.5-3.el7pc.noarch.rpm tfm-pulpcore-python3-djangorestframework-3.12.4-4.el7pc.noarch.rpm tfm-pulpcore-python3-djangorestframework-queryfields-1.0.0-4.el7pc.noarch.rpm tfm-pulpcore-python3-drf-access-policy-1.1.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-drf-nested-routers-0.93.3-3.el7pc.noarch.rpm tfm-pulpcore-python3-drf-spectacular-0.20.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-dynaconf-3.1.7-2.el7pc.noarch.rpm tfm-pulpcore-python3-ecdsa-0.13.3-3.el7pc.noarch.rpm tfm-pulpcore-python3-et-xmlfile-1.1.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-flake8-3.9.2-3.el7pc.noarch.rpm tfm-pulpcore-python3-future-0.18.2-4.el7pc.noarch.rpm tfm-pulpcore-python3-galaxy-importer-0.4.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-gnupg-0.4.7-2.el7pc.noarch.rpm tfm-pulpcore-python3-gunicorn-20.1.0-3.el7pc.noarch.rpm tfm-pulpcore-python3-idna-3.3-1.el7pc.noarch.rpm tfm-pulpcore-python3-idna-ssl-1.1.0-4.el7pc.noarch.rpm tfm-pulpcore-python3-importlib-metadata-1.7.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-inflection-0.5.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-iniparse-0.4-34.el7pc.noarch.rpm tfm-pulpcore-python3-jinja2-3.0.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-jsonschema-3.2.0-7.el7pc.noarch.rpm tfm-pulpcore-python3-markdown-3.3.4-4.el7pc.noarch.rpm tfm-pulpcore-python3-markuppy-1.14-2.el7pc.noarch.rpm tfm-pulpcore-python3-mccabe-0.6.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-naya-1.1.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-odfpy-1.4.1-5.el7pc.noarch.rpm tfm-pulpcore-python3-openpyxl-3.0.9-1.el7pc.noarch.rpm tfm-pulpcore-python3-packaging-21.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-parsley-1.3-1.el7pc.noarch.rpm tfm-pulpcore-python3-pbr-5.6.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-productmd-1.33-2.el7pc.noarch.rpm tfm-pulpcore-python3-prometheus-client-0.8.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-ansible-0.10.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-certguard-1.5.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-cli-0.14.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-container-2.9.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-deb-2.16.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-file-1.10.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-rpm-3.17.5-1.1.el7pc.noarch.rpm tfm-pulpcore-python3-pulpcore-3.16.9-1.el7pc.noarch.rpm tfm-pulpcore-python3-pyOpenSSL-19.1.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-pycodestyle-2.7.0-4.el7pc.noarch.rpm tfm-pulpcore-python3-pycparser-2.20-2.el7pc.noarch.rpm tfm-pulpcore-python3-pyflakes-2.3.1-4.el7pc.noarch.rpm tfm-pulpcore-python3-pygments-2.10.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-pygtrie-2.4.2-2.el7pc.noarch.rpm tfm-pulpcore-python3-pyjwkest-1.4.2-5.el7pc.noarch.rpm tfm-pulpcore-python3-pyjwt-1.7.1-7.el7pc.noarch.rpm tfm-pulpcore-python3-pyparsing-2.4.7-2.el7pc.noarch.rpm tfm-pulpcore-python3-pytz-2021.3-1.el7pc.noarch.rpm tfm-pulpcore-python3-redis-3.5.3-2.el7pc.noarch.rpm tfm-pulpcore-python3-requests-2.26.0-3.el7pc.noarch.rpm tfm-pulpcore-python3-requirements-parser-0.2.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-schema-0.7.5-1.el7pc.noarch.rpm tfm-pulpcore-python3-semantic-version-2.8.5-2.el7pc.noarch.rpm tfm-pulpcore-python3-six-1.16.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-sqlparse-0.4.2-2.el7pc.noarch.rpm tfm-pulpcore-python3-tablib-3.1.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-toml-0.10.2-2.el7pc.noarch.rpm tfm-pulpcore-python3-typing-extensions-3.10.0.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-uritemplate-4.1.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-url-normalize-1.4.3-3.el7pc.noarch.rpm tfm-pulpcore-python3-urllib3-1.26.7-1.el7pc.noarch.rpm tfm-pulpcore-python3-urlman-1.4.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-webencodings-0.5.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-whitenoise-5.3.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-xlrd-2.0.1-4.el7pc.noarch.rpm tfm-pulpcore-python3-xlwt-1.3.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-zipp-3.4.0-3.el7pc.noarch.rpm tfm-rubygem-actioncable-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-actionmailbox-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-actionmailer-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-actionpack-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-actiontext-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-actionview-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-activejob-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-activemodel-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-activerecord-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-activerecord-import-1.1.0-1.el7sat.noarch.rpm tfm-rubygem-activerecord-session_store-2.0.0-1.el7sat.noarch.rpm tfm-rubygem-activestorage-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-activesupport-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-acts_as_list-1.0.3-2.el7sat.noarch.rpm tfm-rubygem-addressable-2.8.0-1.el7sat.noarch.rpm tfm-rubygem-algebrick-0.7.3-8.el7sat.noarch.rpm tfm-rubygem-amazing_print-1.1.0-2.el7sat.noarch.rpm tfm-rubygem-ancestry-3.0.7-2.el7sat.noarch.rpm tfm-rubygem-anemone-0.7.2-23.el7sat.noarch.rpm tfm-rubygem-angular-rails-templates-1.1.0-2.el7sat.noarch.rpm tfm-rubygem-ansi-1.5.0-3.el7sat.noarch.rpm tfm-rubygem-apipie-bindings-0.4.0-2.el7sat.noarch.rpm tfm-rubygem-apipie-dsl-2.3.0-2.el7sat.noarch.rpm tfm-rubygem-apipie-params-0.0.5-5.1.el7sat.noarch.rpm tfm-rubygem-apipie-rails-0.5.17-4.el7sat.noarch.rpm tfm-rubygem-audited-4.9.0-4.el7sat.noarch.rpm tfm-rubygem-azure_mgmt_compute-0.22.0-1.el7sat.noarch.rpm tfm-rubygem-azure_mgmt_network-0.26.1-2.el7sat.noarch.rpm tfm-rubygem-azure_mgmt_resources-0.18.2-1.el7sat.noarch.rpm tfm-rubygem-azure_mgmt_storage-0.23.0-1.el7sat.noarch.rpm tfm-rubygem-azure_mgmt_subscriptions-0.18.5-1.el7sat.noarch.rpm tfm-rubygem-builder-3.2.4-2.el7sat.noarch.rpm tfm-rubygem-bundler_ext-0.4.1-6.el7sat.noarch.rpm tfm-rubygem-clamp-1.1.2-7.el7sat.noarch.rpm tfm-rubygem-coffee-rails-5.0.0-2.el7sat.noarch.rpm tfm-rubygem-coffee-script-2.4.1-5.el7sat.noarch.rpm tfm-rubygem-coffee-script-source-1.12.2-5.el7sat.noarch.rpm tfm-rubygem-colorize-0.8.1-2.el7sat.noarch.rpm tfm-rubygem-concurrent-ruby-1.1.6-3.el7sat.noarch.rpm tfm-rubygem-concurrent-ruby-edge-0.6.0-3.el7sat.noarch.rpm tfm-rubygem-connection_pool-2.2.2-3.el7sat.noarch.rpm tfm-rubygem-crass-1.0.6-2.el7sat.noarch.rpm tfm-rubygem-css_parser-1.4.7-5.el7sat.noarch.rpm tfm-rubygem-daemons-1.2.3-7.1.el7sat.noarch.rpm tfm-rubygem-deacon-1.0.0-5.el7sat.noarch.rpm tfm-rubygem-declarative-0.0.10-3.el7sat.noarch.rpm tfm-rubygem-declarative-option-0.1.0-3.el7sat.noarch.rpm tfm-rubygem-deep_cloneable-3.0.0-4.el7sat.noarch.rpm tfm-rubygem-deface-1.5.3-3.el7sat.noarch.rpm tfm-rubygem-diffy-3.0.1-6.1.el7sat.noarch.rpm tfm-rubygem-domain_name-0.5.20160310-5.el7sat.noarch.rpm tfm-rubygem-dynflow-1.6.4-1.el7sat.noarch.rpm tfm-rubygem-erubi-1.9.0-2.el7sat.noarch.rpm tfm-rubygem-excon-0.76.0-2.el7sat.noarch.rpm tfm-rubygem-execjs-2.7.0-5.el7sat.noarch.rpm tfm-rubygem-faraday-0.17.3-2.el7sat.noarch.rpm tfm-rubygem-faraday-cookie_jar-0.0.6-2.el7sat.noarch.rpm tfm-rubygem-faraday_middleware-0.13.1-3.el7sat.noarch.rpm tfm-rubygem-fast_gettext-1.4.1-5.el7sat.noarch.rpm tfm-rubygem-fog-aws-3.6.5-2.el7sat.noarch.rpm tfm-rubygem-fog-core-2.1.0-4.el7sat.noarch.rpm tfm-rubygem-fog-google-1.11.0-2.el7sat.noarch.rpm tfm-rubygem-fog-json-1.2.0-4.el7sat.noarch.rpm tfm-rubygem-fog-kubevirt-1.3.3-2.el7sat.noarch.rpm tfm-rubygem-fog-libvirt-0.9.0-1.el7sat.noarch.rpm tfm-rubygem-fog-openstack-1.0.8-4.el7sat.noarch.rpm tfm-rubygem-fog-ovirt-2.0.1-2.el7sat.noarch.rpm tfm-rubygem-fog-vsphere-3.5.1-1.el7sat.noarch.rpm tfm-rubygem-fog-xml-0.1.2-9.el7sat.noarch.rpm tfm-rubygem-foreman-tasks-5.2.3-1.el7sat.noarch.rpm tfm-rubygem-foreman_ansible-7.0.4.1-1.el7sat.noarch.rpm tfm-rubygem-foreman_azure_rm-2.2.6-1.el7sat.noarch.rpm tfm-rubygem-foreman_bootdisk-19.0.4.1-1.el7sat.noarch.rpm tfm-rubygem-foreman_discovery-19.0.4-1.el7sat.noarch.rpm tfm-rubygem-foreman_hooks-0.3.17-2.el7sat.noarch.rpm tfm-rubygem-foreman_kubevirt-0.1.9-2.el7sat.noarch.rpm tfm-rubygem-foreman_leapp-0.1.9-1.el7sat.noarch.rpm tfm-rubygem-foreman_openscap-5.1.1-1.el7sat.noarch.rpm tfm-rubygem-foreman_puppet-2.0.6-1.el7sat.noarch.rpm tfm-rubygem-foreman_remote_execution-5.0.7-1.el7sat.noarch.rpm tfm-rubygem-foreman_remote_execution-cockpit-5.0.7-1.el7sat.noarch.rpm tfm-rubygem-foreman_rh_cloud-5.0.39-1.el7sat.noarch.rpm tfm-rubygem-foreman_templates-9.1.0-1.el7sat.noarch.rpm tfm-rubygem-foreman_theme_satellite-9.0.0.10-1.el7sat.noarch.rpm tfm-rubygem-foreman_virt_who_configure-0.5.8-1.el7sat.noarch.rpm tfm-rubygem-foreman_webhooks-2.0.1-1.1.el7sat.noarch.rpm tfm-rubygem-formatador-0.2.1-13.el7sat.noarch.rpm tfm-rubygem-friendly_id-5.3.0-2.el7sat.noarch.rpm tfm-rubygem-fx-0.5.0-2.el7sat.noarch.rpm tfm-rubygem-get_process_mem-0.2.7-2.1.el7sat.noarch.rpm tfm-rubygem-gettext_i18n_rails-1.8.0-3.el7sat.noarch.rpm tfm-rubygem-git-1.5.0-2.el7sat.noarch.rpm tfm-rubygem-gitlab-sidekiq-fetcher-0.6.0-2.el7sat.noarch.rpm tfm-rubygem-globalid-0.4.2-2.el7sat.noarch.rpm tfm-rubygem-google-api-client-0.33.2-2.el7sat.noarch.rpm tfm-rubygem-google-cloud-env-1.3.3-2.el7sat.noarch.rpm tfm-rubygem-googleauth-0.13.1-2.el7sat.noarch.rpm tfm-rubygem-graphql-1.8.14-3.el7sat.noarch.rpm tfm-rubygem-graphql-batch-0.3.10-3.el7sat.noarch.rpm tfm-rubygem-gssapi-1.2.0-8.el7sat.noarch.rpm tfm-rubygem-hammer_cli-3.1.0.1-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman-3.1.0.1-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_admin-1.1.0-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_ansible-0.3.4-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_discovery-1.1.0-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_kubevirt-0.1.5-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_leapp-0.1.1-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_openscap-0.1.13-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_puppet-0.0.5-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_tasks-0.0.17-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_templates-0.2.0-2.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_webhooks-0.0.2-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_katello-1.3.1.6-1.el7sat.noarch.rpm tfm-rubygem-hashie-3.6.0-3.el7sat.noarch.rpm tfm-rubygem-highline-2.0.3-2.el7sat.noarch.rpm tfm-rubygem-hocon-1.3.1-2.el7sat.noarch.rpm tfm-rubygem-http-3.3.0-2.el7sat.noarch.rpm tfm-rubygem-http-cookie-1.0.2-5.1.el7sat.noarch.rpm tfm-rubygem-http-form_data-2.1.1-2.el7sat.noarch.rpm tfm-rubygem-httpclient-2.8.3-4.el7sat.noarch.rpm tfm-rubygem-i18n-1.8.2-2.el7sat.noarch.rpm tfm-rubygem-infoblox-3.0.0-4.el7sat.noarch.rpm tfm-rubygem-ipaddress-0.8.0-13.el7sat.noarch.rpm tfm-rubygem-jgrep-1.3.3-13.el7sat.noarch.rpm tfm-rubygem-journald-logger-2.0.4-3.el7sat.noarch.rpm tfm-rubygem-jwt-2.2.2-2.el7sat.noarch.rpm tfm-rubygem-kafo-6.4.0-1.el7sat.noarch.rpm tfm-rubygem-kafo_parsers-1.2.1-1.el7sat.noarch.rpm tfm-rubygem-kafo_wizards-0.0.2-2.el7sat.noarch.rpm tfm-rubygem-katello-4.3.0.42-1.el7sat.noarch.rpm tfm-rubygem-kubeclient-4.3.0-2.el7sat.noarch.rpm tfm-rubygem-ldap_fluff-0.6.0-1.el7sat.noarch.rpm tfm-rubygem-little-plugger-1.1.4-3.el7sat.noarch.rpm tfm-rubygem-locale-2.0.9-15.el7sat.noarch.rpm tfm-rubygem-logging-2.3.0-2.el7sat.noarch.rpm tfm-rubygem-logging-journald-2.0.0-3.el7sat.noarch.rpm tfm-rubygem-loofah-2.4.0-2.el7sat.noarch.rpm tfm-rubygem-mail-2.7.1-2.el7sat.noarch.rpm tfm-rubygem-marcel-1.0.1-1.el7sat.noarch.rpm tfm-rubygem-memoist-0.16.0-3.el7sat.noarch.rpm tfm-rubygem-method_source-0.9.2-3.el7sat.noarch.rpm tfm-rubygem-mime-types-3.3.1-2.el7sat.noarch.rpm tfm-rubygem-mime-types-data-3.2018.0812-5.el7sat.noarch.rpm tfm-rubygem-mini_mime-1.0.2-2.el7sat.noarch.rpm tfm-rubygem-mini_portile2-2.5.1-1.el7sat.noarch.rpm tfm-rubygem-mqtt-0.5.0-1.el7sat.noarch.rpm tfm-rubygem-ms_rest-0.7.6-1.el7sat.noarch.rpm tfm-rubygem-ms_rest_azure-0.12.0-1.el7sat.noarch.rpm tfm-rubygem-multi_json-1.14.1-3.el7sat.noarch.rpm tfm-rubygem-multipart-post-2.0.0-3.el7sat.noarch.rpm tfm-rubygem-mustermann-1.1.1-1.el7sat.noarch.rpm tfm-rubygem-net-ldap-0.17.0-2.el7sat.noarch.rpm tfm-rubygem-net-ping-2.0.1-5.el7sat.noarch.rpm tfm-rubygem-net-scp-1.2.1-5.el7sat.noarch.rpm tfm-rubygem-net-ssh-4.2.0-3.el7sat.noarch.rpm tfm-rubygem-net-ssh-krb-0.4.0-4.el7sat.noarch.rpm tfm-rubygem-net_http_unix-0.2.2-2.el7sat.noarch.rpm tfm-rubygem-netrc-0.11.0-6.el7sat.noarch.rpm tfm-rubygem-oauth-0.5.4-5.el7sat.noarch.rpm tfm-rubygem-openscap-0.4.9-7.el7sat.noarch.rpm tfm-rubygem-openscap_parser-1.0.2-2.el7sat.noarch.rpm tfm-rubygem-optimist-3.0.0-3.el7sat.noarch.rpm tfm-rubygem-os-1.0.0-3.el7sat.noarch.rpm tfm-rubygem-ovirt_provision_plugin-2.0.3-3.el7sat.noarch.rpm tfm-rubygem-parallel-1.19.1-2.el7sat.noarch.rpm tfm-rubygem-parse-cron-0.1.4-5.el7sat.noarch.rpm tfm-rubygem-polyglot-0.3.5-3.1.el7sat.noarch.rpm tfm-rubygem-powerbar-2.0.1-3.el7sat.noarch.rpm tfm-rubygem-prometheus-client-1.0.0-3.el7sat.noarch.rpm tfm-rubygem-promise.rb-0.7.4-3.el7sat.noarch.rpm tfm-rubygem-public_suffix-3.0.3-3.el7sat.noarch.rpm tfm-rubygem-pulp_ansible_client-0.10.1-1.el7sat.noarch.rpm tfm-rubygem-pulp_certguard_client-1.5.0-1.el7sat.noarch.rpm tfm-rubygem-pulp_container_client-2.9.0-1.el7sat.noarch.rpm tfm-rubygem-pulp_deb_client-2.16.0-1.el7sat.noarch.rpm tfm-rubygem-pulp_file_client-1.10.0-1.el7sat.noarch.rpm tfm-rubygem-pulp_ostree_client-2.0.0-0.1.a1.el7sat.noarch.rpm tfm-rubygem-pulp_python_client-3.5.2-1.el7sat.noarch.rpm tfm-rubygem-pulp_rpm_client-3.17.4-1.el7sat.noarch.rpm tfm-rubygem-pulpcore_client-3.16.7-1.el7sat.noarch.rpm tfm-rubygem-puma-status-1.3-1.el7sat.noarch.rpm tfm-rubygem-quantile-0.2.0-5.el7sat.noarch.rpm tfm-rubygem-rabl-0.14.3-2.el7sat.noarch.rpm tfm-rubygem-rack-2.2.3-2.el7sat.noarch.rpm tfm-rubygem-rack-cors-1.0.2-3.el7sat.noarch.rpm tfm-rubygem-rack-jsonp-1.3.1-10.el7sat.noarch.rpm tfm-rubygem-rack-protection-2.1.0-2.el7sat.noarch.rpm tfm-rubygem-rack-test-1.1.0-5.el7sat.noarch.rpm tfm-rubygem-rails-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-rails-dom-testing-2.0.3-7.el7sat.noarch.rpm tfm-rubygem-rails-html-sanitizer-1.3.0-2.el7sat.noarch.rpm tfm-rubygem-rails-i18n-6.0.0-3.el7sat.noarch.rpm tfm-rubygem-railties-6.0.4.7-1.el7sat.noarch.rpm tfm-rubygem-rainbow-2.2.2-1.el7sat.noarch.rpm tfm-rubygem-rb-inotify-0.9.7-6.el7sat.noarch.rpm tfm-rubygem-rbnacl-4.0.2-2.el7sat.noarch.rpm tfm-rubygem-rbvmomi-2.2.0-4.el7sat.noarch.rpm tfm-rubygem-record_tag_helper-1.0.1-4.el7sat.noarch.rpm tfm-rubygem-recursive-open-struct-1.1.0-2.el7sat.noarch.rpm tfm-rubygem-redfish_client-0.5.2-2.el7sat.noarch.rpm tfm-rubygem-redis-4.5.1-1.el7sat.noarch.rpm tfm-rubygem-representable-3.0.4-3.el7sat.noarch.rpm tfm-rubygem-responders-3.0.0-4.el7sat.noarch.rpm tfm-rubygem-rest-client-2.0.2-4.el7sat.noarch.rpm tfm-rubygem-retriable-3.1.2-3.el7sat.noarch.rpm tfm-rubygem-roadie-3.4.0-4.el7sat.noarch.rpm tfm-rubygem-roadie-rails-2.1.1-3.el7sat.noarch.rpm tfm-rubygem-robotex-1.0.0-22.el7sat.noarch.rpm tfm-rubygem-rsec-0.4.3-5.el7sat.noarch.rpm tfm-rubygem-ruby2_keywords-0.0.4-1.el7sat.noarch.rpm tfm-rubygem-ruby2ruby-2.4.2-4.el7sat.noarch.rpm tfm-rubygem-ruby_parser-3.10.1-4.el7sat.noarch.rpm tfm-rubygem-rubyipmi-0.11.0-1.el7sat.noarch.rpm tfm-rubygem-runcible-2.13.1-2.el7sat.noarch.rpm tfm-rubygem-safemode-1.3.6-2.el7sat.noarch.rpm tfm-rubygem-scoped_search-4.1.9-2.el7sat.noarch.rpm tfm-rubygem-sd_notify-0.1.0-2.el7sat.noarch.rpm tfm-rubygem-secure_headers-6.3.0-3.el7sat.noarch.rpm tfm-rubygem-sequel-5.42.0-2.el7sat.noarch.rpm tfm-rubygem-server_sent_events-0.1.2-2.el7sat.noarch.rpm tfm-rubygem-sexp_processor-4.10.0-7.el7sat.noarch.rpm tfm-rubygem-sidekiq-5.2.10-1.el7sat.noarch.rpm tfm-rubygem-signet-0.14.0-2.el7sat.noarch.rpm tfm-rubygem-sinatra-2.1.0-3.el7sat.noarch.rpm tfm-rubygem-smart_proxy_ansible-3.3.1-2.el7sat.noarch.rpm tfm-rubygem-smart_proxy_container_gateway-1.0.6-1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-6.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-5.el7sat.noarch.rpm tfm-rubygem-smart_proxy_discovery-1.0.5-8.el7sat.noarch.rpm tfm-rubygem-smart_proxy_discovery_image-1.3.2-3.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dns_infoblox-1.1.0-6.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dynflow-0.6.3-1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dynflow_core-0.4.1-1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_openscap-0.9.2-1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_pulp-3.2.0-2.el7sat.noarch.rpm tfm-rubygem-smart_proxy_remote_execution_ssh-0.5.3-1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_shellhooks-0.9.2-2.el7sat.noarch.rpm tfm-rubygem-sprockets-4.0.2-2.el7sat.noarch.rpm tfm-rubygem-sprockets-rails-3.2.1-7.el7sat.noarch.rpm tfm-rubygem-sshkey-1.9.0-5.el7sat.noarch.rpm tfm-rubygem-statsd-instrument-2.1.4-4.el7sat.noarch.rpm tfm-rubygem-stomp-1.4.9-2.el7sat.noarch.rpm tfm-rubygem-thor-1.0.1-3.el7sat.noarch.rpm tfm-rubygem-thread_safe-0.3.6-6.el7sat.noarch.rpm tfm-rubygem-tilt-2.0.8-5.el7sat.noarch.rpm tfm-rubygem-timeliness-0.3.10-2.el7sat.noarch.rpm tfm-rubygem-tzinfo-1.2.6-2.el7sat.noarch.rpm tfm-rubygem-uber-0.1.0-3.el7sat.noarch.rpm tfm-rubygem-unf-0.1.3-9.el7sat.noarch.rpm tfm-rubygem-unicode-display_width-1.7.0-2.el7sat.noarch.rpm tfm-rubygem-validates_lengths_from_database-0.5.0-8.el7sat.noarch.rpm tfm-rubygem-webpack-rails-0.9.8-6.1.el7sat.noarch.rpm tfm-rubygem-websocket-extensions-0.1.5-2.el7sat.noarch.rpm tfm-rubygem-will_paginate-3.1.7-4.el7sat.noarch.rpm tfm-rubygem-xmlrpc-0.3.0-3.el7sat.noarch.rpm tfm-rubygem-zeitwerk-2.2.2-2.el7sat.noarch.rpm x86_64: createrepo_c-0.20.0-1.el7pc.x86_64.rpm createrepo_c-debuginfo-0.20.0-1.el7pc.x86_64.rpm createrepo_c-libs-0.20.0-1.el7pc.x86_64.rpm dynflow-utils-1.6.3-1.el7sat.x86_64.rpm foreman-discovery-image-service-1.0.0-4.1.el7sat.x86_64.rpm foreman-discovery-image-service-tui-1.0.0-4.1.el7sat.x86_64.rpm hfsplus-tools-332.14-12.el7.x86_64.rpm hfsplus-tools-debuginfo-332.14-12.el7.x86_64.rpm libcomps-0.1.18-1.el7pc.x86_64.rpm libcomps-debuginfo-0.1.18-1.el7pc.x86_64.rpm libmodulemd2-2.9.3-1.el7pc.x86_64.rpm libmodulemd2-debuginfo-2.9.3-1.el7pc.x86_64.rpm libsodium-1.0.17-3.el7sat.x86_64.rpm libsodium-debuginfo-1.0.17-3.el7sat.x86_64.rpm libsolv-0.7.22-1.el7pc.x86_64.rpm libsolv-debuginfo-0.7.22-1.el7pc.x86_64.rpm libsolv0-0.6.34-4.el7sat.x86_64.rpm libsolv0-debuginfo-0.6.34-4.el7sat.x86_64.rpm libwebsockets-2.4.2-2.el7.x86_64.rpm libwebsockets-debuginfo-2.4.2-2.el7.x86_64.rpm livecd-tools-20.4-1.6.el7sat.x86_64.rpm pcp-mmvstatsd-0.4-2.el7sat.x86_64.rpm pulpcore-selinux-1.3.0-1.el7pc.x86_64.rpm puppet-agent-7.12.1-1.el7sat.x86_64.rpm python-imgcreate-20.4-1.6.el7sat.x86_64.rpm python-markupsafe-debuginfo-0.23-21.el7sat.x86_64.rpm python-psutil-debuginfo-5.7.2-2.el7sat.x86_64.rpm python-qpid-proton-0.33.0-6.el7_9.x86_64.rpm python-qpid-qmf-1.36.0-32.el7_9amq.x86_64.rpm python-saslwrapper-0.22-5.el7sat.x86_64.rpm python2-libcomps-0.1.15-5.pulp.el7sat.x86_64.rpm python2-libcomps-debuginfo-0.1.15-5.pulp.el7sat.x86_64.rpm python2-markupsafe-0.23-21.el7sat.x86_64.rpm python2-psutil-5.7.2-2.el7sat.x86_64.rpm qpid-cpp-client-1.36.0-32.el7_9amq.x86_64.rpm qpid-cpp-client-devel-1.36.0-32.el7_9amq.x86_64.rpm qpid-cpp-debuginfo-1.36.0-32.el7_9amq.x86_64.rpm qpid-cpp-server-1.36.0-32.el7_9amq.x86_64.rpm qpid-cpp-server-linearstore-1.36.0-32.el7_9amq.x86_64.rpm qpid-dispatch-debuginfo-1.14.0-1.el7_9.x86_64.rpm qpid-dispatch-router-1.14.0-1.el7_9.x86_64.rpm qpid-proton-c-0.33.0-6.el7_9.x86_64.rpm qpid-proton-debuginfo-0.33.0-6.el7_9.x86_64.rpm qpid-qmf-1.36.0-32.el7_9amq.x86_64.rpm rh-postgresql12-postgresql-evr-0.0.2-1.el7sat.x86_64.rpm rubygem-facter-2.4.1-2.el7sat.x86_64.rpm saslwrapper-0.22-5.el7sat.x86_64.rpm saslwrapper-debuginfo-0.22-5.el7sat.x86_64.rpm tfm-pulpcore-python-aiohttp-debuginfo-3.8.1-2.el7pc.x86_64.rpm tfm-pulpcore-python-brotli-debuginfo-1.0.9-1.el7pc.x86_64.rpm tfm-pulpcore-python-cchardet-debuginfo-2.1.7-1.el7pc.x86_64.rpm tfm-pulpcore-python-cffi-debuginfo-1.15.0-1.el7pc.x86_64.rpm tfm-pulpcore-python-cryptography-debuginfo-3.1.1-1.el7pc.x86_64.rpm tfm-pulpcore-python-frozenlist-debuginfo-1.3.0-1.el7pc.x86_64.rpm tfm-pulpcore-python-lxml-debuginfo-4.7.1-1.el7pc.x86_64.rpm tfm-pulpcore-python-markupsafe-debuginfo-2.0.1-2.el7pc.x86_64.rpm tfm-pulpcore-python-multidict-debuginfo-5.2.0-1.el7pc.x86_64.rpm tfm-pulpcore-python-psycopg2-debuginfo-2.9.1-1.el7pc.x86_64.rpm tfm-pulpcore-python-pycairo-debuginfo-1.20.1-2.el7pc.x86_64.rpm tfm-pulpcore-python-pycares-debuginfo-4.1.2-3.el7pc.x86_64.rpm tfm-pulpcore-python-pycryptodomex-debuginfo-3.11.0-1.el7pc.x86_64.rpm tfm-pulpcore-python-pygobject-debuginfo-3.40.1-1.el7pc.x86_64.rpm tfm-pulpcore-python-pyrsistent-debuginfo-0.18.0-1.el7pc.x86_64.rpm tfm-pulpcore-python-rhsm-debuginfo-1.19.2-2.el7pc.x86_64.rpm tfm-pulpcore-python-yarl-debuginfo-1.7.2-1.el7pc.x86_64.rpm tfm-pulpcore-python3-aiohttp-3.8.1-2.el7pc.x86_64.rpm tfm-pulpcore-python3-brotli-1.0.9-1.el7pc.x86_64.rpm tfm-pulpcore-python3-cchardet-2.1.7-1.el7pc.x86_64.rpm tfm-pulpcore-python3-cffi-1.15.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-createrepo_c-0.20.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-cryptography-3.1.1-1.el7pc.x86_64.rpm tfm-pulpcore-python3-frozenlist-1.3.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-libcomps-0.1.18-1.el7pc.x86_64.rpm tfm-pulpcore-python3-lxml-4.7.1-1.el7pc.x86_64.rpm tfm-pulpcore-python3-markupsafe-2.0.1-2.el7pc.x86_64.rpm tfm-pulpcore-python3-multidict-5.2.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-psycopg2-2.9.1-1.el7pc.x86_64.rpm tfm-pulpcore-python3-pycairo-1.20.1-2.el7pc.x86_64.rpm tfm-pulpcore-python3-pycares-4.1.2-3.el7pc.x86_64.rpm tfm-pulpcore-python3-pycryptodomex-3.11.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-pygobject-3.40.1-1.el7pc.x86_64.rpm tfm-pulpcore-python3-pyrsistent-0.18.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-pyyaml-5.4.1-3.el7pc.x86_64.rpm tfm-pulpcore-python3-rhsm-1.19.2-2.el7pc.x86_64.rpm tfm-pulpcore-python3-setuptools-1.0-4.el7pc.x86_64.rpm tfm-pulpcore-python3-solv-0.7.22-1.el7pc.x86_64.rpm tfm-pulpcore-python3-yarl-1.7.2-1.el7pc.x86_64.rpm tfm-pulpcore-runtime-1.0-4.el7pc.x86_64.rpm tfm-rubygem-bcrypt-3.1.12-4.1.el7sat.x86_64.rpm tfm-rubygem-bcrypt-debuginfo-3.1.12-4.1.el7sat.x86_64.rpm tfm-rubygem-facter-4.0.51-2.el7sat.x86_64.rpm tfm-rubygem-ffi-1.12.2-2.1.el7sat.x86_64.rpm tfm-rubygem-ffi-debuginfo-1.12.2-2.1.el7sat.x86_64.rpm tfm-rubygem-http_parser.rb-0.6.0-3.1.el7sat.x86_64.rpm tfm-rubygem-http_parser.rb-debuginfo-0.6.0-3.1.el7sat.x86_64.rpm tfm-rubygem-journald-native-1.0.11-4.1.el7sat.x86_64.rpm tfm-rubygem-journald-native-debuginfo-1.0.11-4.1.el7sat.x86_64.rpm tfm-rubygem-msgpack-1.3.3-2.1.el7sat.x86_64.rpm tfm-rubygem-msgpack-debuginfo-1.3.3-2.1.el7sat.x86_64.rpm tfm-rubygem-newt-0.9.7-3.1.el7sat.x86_64.rpm tfm-rubygem-newt-debuginfo-0.9.7-3.1.el7sat.x86_64.rpm tfm-rubygem-nio4r-2.5.4-2.1.el7sat.x86_64.rpm tfm-rubygem-nio4r-debuginfo-2.5.4-2.1.el7sat.x86_64.rpm tfm-rubygem-nokogiri-1.11.3-2.el7sat.x86_64.rpm tfm-rubygem-nokogiri-debuginfo-1.11.3-2.el7sat.x86_64.rpm tfm-rubygem-ovirt-engine-sdk-4.4.0-2.1.el7sat.x86_64.rpm tfm-rubygem-ovirt-engine-sdk-debuginfo-4.4.0-2.1.el7sat.x86_64.rpm tfm-rubygem-pg-1.1.4-4.1.el7sat.x86_64.rpm tfm-rubygem-pg-debuginfo-1.1.4-4.1.el7sat.x86_64.rpm tfm-rubygem-puma-5.6.2-1.el7sat.x86_64.rpm tfm-rubygem-puma-debuginfo-5.6.2-1.el7sat.x86_64.rpm tfm-rubygem-qpid_proton-0.33.0-5.el7sat.x86_64.rpm tfm-rubygem-qpid_proton-debuginfo-0.33.0-5.el7sat.x86_64.rpm tfm-rubygem-racc-1.5.2-1.el7sat.x86_64.rpm tfm-rubygem-racc-debuginfo-1.5.2-1.el7sat.x86_64.rpm tfm-rubygem-rkerberos-0.1.5-20.1.el7sat.x86_64.rpm tfm-rubygem-rkerberos-debuginfo-0.1.5-20.1.el7sat.x86_64.rpm tfm-rubygem-ruby-libvirt-0.7.1-2.1.el7sat.x86_64.rpm tfm-rubygem-ruby-libvirt-debuginfo-0.7.1-2.1.el7sat.x86_64.rpm tfm-rubygem-sqlite3-1.3.13-7.1.el7sat.x86_64.rpm tfm-rubygem-sqlite3-debuginfo-1.3.13-7.1.el7sat.x86_64.rpm tfm-rubygem-unf_ext-0.0.7.2-4.1.el7sat.x86_64.rpm tfm-rubygem-unf_ext-debuginfo-0.0.7.2-4.1.el7sat.x86_64.rpm tfm-rubygem-unicode-0.4.4.4-4.1.el7sat.x86_64.rpm tfm-rubygem-unicode-debuginfo-0.4.4.4-4.1.el7sat.x86_64.rpm tfm-rubygem-websocket-driver-0.7.1-2.1.el7sat.x86_64.rpm tfm-rubygem-websocket-driver-debuginfo-0.7.1-2.1.el7sat.x86_64.rpm tfm-runtime-7.0-1.el7sat.x86_64.rpm yggdrasil-worker-forwarder-0.0.1-1.el7sat.x86_64.rpm Red Hat Satellite 6.11 for RHEL 7: Source: ansible-collection-redhat-satellite-3.3.0-1.el7sat.src.rpm ansible-collection-redhat-satellite_operations-1.2.3-1.el7sat.src.rpm ansible-runner-1.4.7-1.el7ar.src.rpm ansiblerole-foreman_scap_client-0.2.0-2.el7sat.src.rpm ansiblerole-insights-client-1.7.1-2.el7sat.src.rpm createrepo_c-0.20.0-1.el7pc.src.rpm dynflow-utils-1.6.3-1.el7sat.src.rpm foreman-3.1.1.21-2.el7sat.src.rpm foreman-bootloaders-redhat-202005201200-1.el7sat.src.rpm foreman-discovery-image-3.8.2-1.el7sat.src.rpm foreman-discovery-image-service-1.0.0-4.1.el7sat.src.rpm foreman-installer-3.1.2.6-1.el7sat.src.rpm foreman-proxy-3.1.1.1-1.el7sat.src.rpm foreman-selinux-3.1.2.1-1.el7sat.src.rpm hfsplus-tools-332.14-12.el7.src.rpm katello-4.3.0-3.el7sat.src.rpm katello-certs-tools-2.9.0-1.el7sat.src.rpm katello-client-bootstrap-1.7.9-1.el7sat.src.rpm libcomps-0.1.18-1.el7pc.src.rpm libmodulemd2-2.9.3-1.el7pc.src.rpm libsodium-1.0.17-3.el7sat.src.rpm libsolv-0.7.22-1.el7pc.src.rpm libsolv0-0.6.34-4.el7sat.src.rpm libwebsockets-2.4.2-2.el7.src.rpm livecd-tools-20.4-1.6.el7sat.src.rpm pulpcore-selinux-1.3.0-1.el7pc.src.rpm puppet-agent-7.12.1-1.el7sat.src.rpm puppet-agent-oauth-0.5.1-3.el7sat.src.rpm puppet-foreman_scap_client-0.4.0-1.el7sat.src.rpm puppetlabs-stdlib-5.2.0-1.el7sat.src.rpm puppetserver-7.4.2-1.el7sat.src.rpm python-daemon-2.1.2-7.2.el7sat.src.rpm python-lockfile-0.11.0-10.el7ar.src.rpm python-pexpect-4.6-1.el7at.src.rpm python-psutil-5.7.2-2.el7sat.src.rpm python-ptyprocess-0.5.2-3.el7at.src.rpm python-qpid-1.35.0-5.el7.src.rpm python2-libcomps-0.1.15-5.pulp.el7sat.src.rpm qpid-cpp-1.36.0-32.el7_9amq.src.rpm qpid-dispatch-1.14.0-1.el7_9.src.rpm qpid-proton-0.33.0-6.el7_9.src.rpm redhat-access-insights-puppet-1.0.1-1.el7sat.src.rpm rubygem-clamp-1.1.2-7.el7sat.src.rpm rubygem-fast_gettext-1.1.0-4.el7sat.src.rpm rubygem-foreman_maintain-1.0.12-1.el7sat.src.rpm rubygem-highline-2.0.3-2.el7sat.src.rpm rubygem-newt-0.9.6-3.el7sat.src.rpm rubygem-oauth-0.5.4-2.el7sat.src.rpm saslwrapper-0.22-5.el7sat.src.rpm satellite-6.11.0-2.el7sat.src.rpm satellite-installer-6.11.0.7-1.el7sat.src.rpm satellite-maintain-0.0.1-1.el7sat.src.rpm tfm-7.0-1.el7sat.src.rpm tfm-pulpcore-1.0-4.el7pc.src.rpm tfm-pulpcore-python-aiodns-3.0.0-2.el7pc.src.rpm tfm-pulpcore-python-aiofiles-0.7.0-2.el7pc.src.rpm tfm-pulpcore-python-aiohttp-3.8.1-2.el7pc.src.rpm tfm-pulpcore-python-aiohttp-xmlrpc-1.5.0-1.el7pc.src.rpm tfm-pulpcore-python-aioredis-2.0.0-2.el7pc.src.rpm tfm-pulpcore-python-aiosignal-1.2.0-1.el7pc.src.rpm tfm-pulpcore-python-ansible-builder-1.0.1-2.el7pc.src.rpm tfm-pulpcore-python-asgiref-3.4.1-1.el7pc.src.rpm tfm-pulpcore-python-async-lru-1.0.2-2.el7pc.src.rpm tfm-pulpcore-python-async-timeout-4.0.2-1.el7pc.src.rpm tfm-pulpcore-python-asyncio-throttle-1.0.2-2.el7pc.src.rpm tfm-pulpcore-python-attrs-21.2.0-2.el7pc.src.rpm tfm-pulpcore-python-backoff-1.11.1-1.el7pc.src.rpm tfm-pulpcore-python-bindep-2.10.1-1.el7pc.src.rpm tfm-pulpcore-python-bleach-3.3.1-1.el7pc.src.rpm tfm-pulpcore-python-bleach-allowlist-1.0.3-2.el7pc.src.rpm tfm-pulpcore-python-brotli-1.0.9-1.el7pc.src.rpm tfm-pulpcore-python-cchardet-2.1.7-1.el7pc.src.rpm tfm-pulpcore-python-certifi-2020.6.20-2.el7pc.src.rpm tfm-pulpcore-python-cffi-1.15.0-1.el7pc.src.rpm tfm-pulpcore-python-chardet-3.0.4-3.el7pc.src.rpm tfm-pulpcore-python-charset-normalizer-2.0.7-1.el7pc.src.rpm tfm-pulpcore-python-click-8.0.3-1.el7pc.src.rpm tfm-pulpcore-python-click-shell-2.1-2.el7pc.src.rpm tfm-pulpcore-python-colorama-0.4.4-2.el7pc.src.rpm tfm-pulpcore-python-contextlib2-21.6.0-2.el7pc.src.rpm tfm-pulpcore-python-cryptography-3.1.1-1.el7pc.src.rpm tfm-pulpcore-python-dateutil-2.8.2-1.el7pc.src.rpm tfm-pulpcore-python-debian-0.1.42-1.el7pc.src.rpm tfm-pulpcore-python-defusedxml-0.7.1-2.el7pc.src.rpm tfm-pulpcore-python-diff-match-patch-20200713-2.el7pc.src.rpm tfm-pulpcore-python-distro-1.6.0-2.el7pc.src.rpm tfm-pulpcore-python-django-3.2.13-1.el7pc.src.rpm tfm-pulpcore-python-django-currentuser-0.5.3-3.el7pc.src.rpm tfm-pulpcore-python-django-filter-21.1-1.el7pc.src.rpm tfm-pulpcore-python-django-guardian-2.4.0-3.el7pc.src.rpm tfm-pulpcore-python-django-guid-3.2.0-2.el7pc.src.rpm tfm-pulpcore-python-django-import-export-2.6.1-1.el7pc.src.rpm tfm-pulpcore-python-django-lifecycle-0.9.3-1.el7pc.src.rpm tfm-pulpcore-python-django-prometheus-2.1.0-2.el7pc.src.rpm tfm-pulpcore-python-django-readonly-field-1.0.5-3.el7pc.src.rpm tfm-pulpcore-python-djangorestframework-3.12.4-4.el7pc.src.rpm tfm-pulpcore-python-djangorestframework-queryfields-1.0.0-4.el7pc.src.rpm tfm-pulpcore-python-drf-access-policy-1.1.0-1.el7pc.src.rpm tfm-pulpcore-python-drf-nested-routers-0.93.3-3.el7pc.src.rpm tfm-pulpcore-python-drf-spectacular-0.20.1-1.el7pc.src.rpm tfm-pulpcore-python-dynaconf-3.1.7-2.el7pc.src.rpm tfm-pulpcore-python-ecdsa-0.13.3-3.el7pc.src.rpm tfm-pulpcore-python-et-xmlfile-1.1.0-1.el7pc.src.rpm tfm-pulpcore-python-flake8-3.9.2-3.el7pc.src.rpm tfm-pulpcore-python-frozenlist-1.3.0-1.el7pc.src.rpm tfm-pulpcore-python-future-0.18.2-4.el7pc.src.rpm tfm-pulpcore-python-galaxy-importer-0.4.1-2.el7pc.src.rpm tfm-pulpcore-python-gnupg-0.4.7-2.el7pc.src.rpm tfm-pulpcore-python-gunicorn-20.1.0-3.el7pc.src.rpm tfm-pulpcore-python-idna-3.3-1.el7pc.src.rpm tfm-pulpcore-python-idna-ssl-1.1.0-4.el7pc.src.rpm tfm-pulpcore-python-importlib-metadata-1.7.0-2.el7pc.src.rpm tfm-pulpcore-python-inflection-0.5.1-2.el7pc.src.rpm tfm-pulpcore-python-iniparse-0.4-34.el7pc.src.rpm tfm-pulpcore-python-jinja2-3.0.2-1.el7pc.src.rpm tfm-pulpcore-python-jsonschema-3.2.0-7.el7pc.src.rpm tfm-pulpcore-python-lxml-4.7.1-1.el7pc.src.rpm tfm-pulpcore-python-markdown-3.3.4-4.el7pc.src.rpm tfm-pulpcore-python-markuppy-1.14-2.el7pc.src.rpm tfm-pulpcore-python-markupsafe-2.0.1-2.el7pc.src.rpm tfm-pulpcore-python-mccabe-0.6.1-2.el7pc.src.rpm tfm-pulpcore-python-multidict-5.2.0-1.el7pc.src.rpm tfm-pulpcore-python-naya-1.1.1-1.el7pc.src.rpm tfm-pulpcore-python-odfpy-1.4.1-5.el7pc.src.rpm tfm-pulpcore-python-openpyxl-3.0.9-1.el7pc.src.rpm tfm-pulpcore-python-packaging-21.2-1.el7pc.src.rpm tfm-pulpcore-python-parsley-1.3-1.el7pc.src.rpm tfm-pulpcore-python-pbr-5.6.0-1.el7pc.src.rpm tfm-pulpcore-python-productmd-1.33-2.el7pc.src.rpm tfm-pulpcore-python-prometheus-client-0.8.0-2.el7pc.src.rpm tfm-pulpcore-python-psycopg2-2.9.1-1.el7pc.src.rpm tfm-pulpcore-python-pulp-ansible-0.10.1-1.el7pc.src.rpm tfm-pulpcore-python-pulp-certguard-1.5.1-1.el7pc.src.rpm tfm-pulpcore-python-pulp-cli-0.14.0-1.el7pc.src.rpm tfm-pulpcore-python-pulp-container-2.9.2-1.el7pc.src.rpm tfm-pulpcore-python-pulp-deb-2.16.1-1.el7pc.src.rpm tfm-pulpcore-python-pulp-file-1.10.1-1.el7pc.src.rpm tfm-pulpcore-python-pulp-rpm-3.17.5-1.1.el7pc.src.rpm tfm-pulpcore-python-pulpcore-3.16.9-1.el7pc.src.rpm tfm-pulpcore-python-pyOpenSSL-19.1.0-2.el7pc.src.rpm tfm-pulpcore-python-pycairo-1.20.1-2.el7pc.src.rpm tfm-pulpcore-python-pycares-4.1.2-3.el7pc.src.rpm tfm-pulpcore-python-pycodestyle-2.7.0-4.el7pc.src.rpm tfm-pulpcore-python-pycparser-2.20-2.el7pc.src.rpm tfm-pulpcore-python-pycryptodomex-3.11.0-1.el7pc.src.rpm tfm-pulpcore-python-pyflakes-2.3.1-4.el7pc.src.rpm tfm-pulpcore-python-pygments-2.10.0-2.el7pc.src.rpm tfm-pulpcore-python-pygobject-3.40.1-1.el7pc.src.rpm tfm-pulpcore-python-pygtrie-2.4.2-2.el7pc.src.rpm tfm-pulpcore-python-pyjwkest-1.4.2-5.el7pc.src.rpm tfm-pulpcore-python-pyjwt-1.7.1-7.el7pc.src.rpm tfm-pulpcore-python-pyparsing-2.4.7-2.el7pc.src.rpm tfm-pulpcore-python-pyrsistent-0.18.0-1.el7pc.src.rpm tfm-pulpcore-python-pytz-2021.3-1.el7pc.src.rpm tfm-pulpcore-python-pyyaml-5.4.1-3.el7pc.src.rpm tfm-pulpcore-python-redis-3.5.3-2.el7pc.src.rpm tfm-pulpcore-python-requests-2.26.0-3.el7pc.src.rpm tfm-pulpcore-python-requirements-parser-0.2.0-2.el7pc.src.rpm tfm-pulpcore-python-rhsm-1.19.2-2.el7pc.src.rpm tfm-pulpcore-python-schema-0.7.5-1.el7pc.src.rpm tfm-pulpcore-python-semantic-version-2.8.5-2.el7pc.src.rpm tfm-pulpcore-python-six-1.16.0-1.el7pc.src.rpm tfm-pulpcore-python-sqlparse-0.4.2-2.el7pc.src.rpm tfm-pulpcore-python-tablib-3.1.0-1.el7pc.src.rpm tfm-pulpcore-python-toml-0.10.2-2.el7pc.src.rpm tfm-pulpcore-python-typing-extensions-3.10.0.2-1.el7pc.src.rpm tfm-pulpcore-python-uritemplate-4.1.1-1.el7pc.src.rpm tfm-pulpcore-python-url-normalize-1.4.3-3.el7pc.src.rpm tfm-pulpcore-python-urllib3-1.26.7-1.el7pc.src.rpm tfm-pulpcore-python-urlman-1.4.0-2.el7pc.src.rpm tfm-pulpcore-python-webencodings-0.5.1-2.el7pc.src.rpm tfm-pulpcore-python-whitenoise-5.3.0-1.el7pc.src.rpm tfm-pulpcore-python-xlrd-2.0.1-4.el7pc.src.rpm tfm-pulpcore-python-xlwt-1.3.0-2.el7pc.src.rpm tfm-pulpcore-python-yarl-1.7.2-1.el7pc.src.rpm tfm-pulpcore-python-zipp-3.4.0-3.el7pc.src.rpm tfm-rubygem-algebrick-0.7.3-8.el7sat.src.rpm tfm-rubygem-ansi-1.5.0-3.el7sat.src.rpm tfm-rubygem-apipie-params-0.0.5-5.1.el7sat.src.rpm tfm-rubygem-bundler_ext-0.4.1-6.el7sat.src.rpm tfm-rubygem-clamp-1.1.2-7.el7sat.src.rpm tfm-rubygem-concurrent-ruby-1.1.6-3.el7sat.src.rpm tfm-rubygem-concurrent-ruby-edge-0.6.0-3.el7sat.src.rpm tfm-rubygem-domain_name-0.5.20160310-5.el7sat.src.rpm tfm-rubygem-dynflow-1.6.4-1.el7sat.src.rpm tfm-rubygem-excon-0.76.0-2.el7sat.src.rpm tfm-rubygem-faraday-0.17.3-2.el7sat.src.rpm tfm-rubygem-faraday_middleware-0.13.1-3.el7sat.src.rpm tfm-rubygem-fast_gettext-1.4.1-5.el7sat.src.rpm tfm-rubygem-ffi-1.12.2-2.1.el7sat.src.rpm tfm-rubygem-gssapi-1.2.0-8.el7sat.src.rpm tfm-rubygem-hashie-3.6.0-3.el7sat.src.rpm tfm-rubygem-highline-2.0.3-2.el7sat.src.rpm tfm-rubygem-http-cookie-1.0.2-5.1.el7sat.src.rpm tfm-rubygem-infoblox-3.0.0-4.el7sat.src.rpm tfm-rubygem-journald-logger-2.0.4-3.el7sat.src.rpm tfm-rubygem-journald-native-1.0.11-4.1.el7sat.src.rpm tfm-rubygem-jwt-2.2.2-2.el7sat.src.rpm tfm-rubygem-kafo-6.4.0-1.el7sat.src.rpm tfm-rubygem-kafo_parsers-1.2.1-1.el7sat.src.rpm tfm-rubygem-kafo_wizards-0.0.2-2.el7sat.src.rpm tfm-rubygem-little-plugger-1.1.4-3.el7sat.src.rpm tfm-rubygem-logging-2.3.0-2.el7sat.src.rpm tfm-rubygem-logging-journald-2.0.0-3.el7sat.src.rpm tfm-rubygem-mime-types-3.3.1-2.el7sat.src.rpm tfm-rubygem-mime-types-data-3.2018.0812-5.el7sat.src.rpm tfm-rubygem-mini_portile2-2.5.1-1.el7sat.src.rpm tfm-rubygem-mqtt-0.5.0-1.el7sat.src.rpm tfm-rubygem-msgpack-1.3.3-2.1.el7sat.src.rpm tfm-rubygem-multi_json-1.14.1-3.el7sat.src.rpm tfm-rubygem-multipart-post-2.0.0-3.el7sat.src.rpm tfm-rubygem-mustermann-1.1.1-1.el7sat.src.rpm tfm-rubygem-net-ssh-4.2.0-3.el7sat.src.rpm tfm-rubygem-net-ssh-krb-0.4.0-4.el7sat.src.rpm tfm-rubygem-netrc-0.11.0-6.el7sat.src.rpm tfm-rubygem-newt-0.9.7-3.1.el7sat.src.rpm tfm-rubygem-nokogiri-1.11.3-2.el7sat.src.rpm tfm-rubygem-openscap-0.4.9-7.el7sat.src.rpm tfm-rubygem-openscap_parser-1.0.2-2.el7sat.src.rpm tfm-rubygem-powerbar-2.0.1-3.el7sat.src.rpm tfm-rubygem-racc-1.5.2-1.el7sat.src.rpm tfm-rubygem-rack-2.2.3-2.el7sat.src.rpm tfm-rubygem-rack-protection-2.1.0-2.el7sat.src.rpm tfm-rubygem-rb-inotify-0.9.7-6.el7sat.src.rpm tfm-rubygem-rbnacl-4.0.2-2.el7sat.src.rpm tfm-rubygem-redfish_client-0.5.2-2.el7sat.src.rpm tfm-rubygem-rest-client-2.0.2-4.el7sat.src.rpm tfm-rubygem-rkerberos-0.1.5-20.1.el7sat.src.rpm tfm-rubygem-rsec-0.4.3-5.el7sat.src.rpm tfm-rubygem-ruby-libvirt-0.7.1-2.1.el7sat.src.rpm tfm-rubygem-ruby2_keywords-0.0.4-1.el7sat.src.rpm tfm-rubygem-rubyipmi-0.11.0-1.el7sat.src.rpm tfm-rubygem-sd_notify-0.1.0-2.el7sat.src.rpm tfm-rubygem-sequel-5.42.0-2.el7sat.src.rpm tfm-rubygem-server_sent_events-0.1.2-2.el7sat.src.rpm tfm-rubygem-sinatra-2.1.0-3.el7sat.src.rpm tfm-rubygem-smart_proxy_ansible-3.3.1-2.el7sat.src.rpm tfm-rubygem-smart_proxy_container_gateway-1.0.6-1.el7sat.src.rpm tfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-6.el7sat.src.rpm tfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-5.el7sat.src.rpm tfm-rubygem-smart_proxy_discovery-1.0.5-8.el7sat.src.rpm tfm-rubygem-smart_proxy_discovery_image-1.3.2-3.el7sat.src.rpm tfm-rubygem-smart_proxy_dns_infoblox-1.1.0-6.el7sat.src.rpm tfm-rubygem-smart_proxy_dynflow-0.6.3-1.el7sat.src.rpm tfm-rubygem-smart_proxy_dynflow_core-0.4.1-1.el7sat.src.rpm tfm-rubygem-smart_proxy_openscap-0.9.2-1.el7sat.src.rpm tfm-rubygem-smart_proxy_pulp-3.2.0-2.el7sat.src.rpm tfm-rubygem-smart_proxy_remote_execution_ssh-0.5.3-1.el7sat.src.rpm tfm-rubygem-smart_proxy_shellhooks-0.9.2-2.el7sat.src.rpm tfm-rubygem-sqlite3-1.3.13-7.1.el7sat.src.rpm tfm-rubygem-statsd-instrument-2.1.4-4.el7sat.src.rpm tfm-rubygem-tilt-2.0.8-5.el7sat.src.rpm tfm-rubygem-unf-0.1.3-9.el7sat.src.rpm tfm-rubygem-unf_ext-0.0.7.2-4.1.el7sat.src.rpm tfm-rubygem-xmlrpc-0.3.0-3.el7sat.src.rpm noarch: ansible-collection-redhat-satellite-3.3.0-1.el7sat.noarch.rpm ansible-collection-redhat-satellite_operations-1.2.3-1.el7sat.noarch.rpm ansible-runner-1.4.7-1.el7ar.noarch.rpm ansiblerole-foreman_scap_client-0.2.0-2.el7sat.noarch.rpm ansiblerole-insights-client-1.7.1-2.el7sat.noarch.rpm foreman-bootloaders-redhat-202005201200-1.el7sat.noarch.rpm foreman-bootloaders-redhat-tftpboot-202005201200-1.el7sat.noarch.rpm foreman-debug-3.1.1.21-2.el7sat.noarch.rpm foreman-discovery-image-3.8.2-1.el7sat.noarch.rpm foreman-installer-3.1.2.6-1.el7sat.noarch.rpm foreman-installer-katello-3.1.2.6-1.el7sat.noarch.rpm foreman-proxy-3.1.1.1-1.el7sat.noarch.rpm foreman-proxy-content-4.3.0-3.el7sat.noarch.rpm foreman-proxy-journald-3.1.1.1-1.el7sat.noarch.rpm foreman-proxy-selinux-3.1.2.1-1.el7sat.noarch.rpm katello-certs-tools-2.9.0-1.el7sat.noarch.rpm katello-client-bootstrap-1.7.9-1.el7sat.noarch.rpm katello-common-4.3.0-3.el7sat.noarch.rpm katello-debug-4.3.0-3.el7sat.noarch.rpm puppet-agent-oauth-0.5.1-3.el7sat.noarch.rpm puppet-foreman_scap_client-0.4.0-1.el7sat.noarch.rpm puppetlabs-stdlib-5.2.0-1.el7sat.noarch.rpm puppetserver-7.4.2-1.el7sat.noarch.rpm python-qpid-1.35.0-5.el7.noarch.rpm python2-ansible-runner-1.4.7-1.el7ar.noarch.rpm python2-daemon-2.1.2-7.2.el7sat.noarch.rpm python2-lockfile-0.11.0-10.el7ar.noarch.rpm python2-pexpect-4.6-1.el7at.noarch.rpm python2-ptyprocess-0.5.2-3.el7at.noarch.rpm qpid-tools-1.36.0-32.el7_9amq.noarch.rpm redhat-access-insights-puppet-1.0.1-1.el7sat.noarch.rpm rubygem-clamp-1.1.2-7.el7sat.noarch.rpm rubygem-fast_gettext-1.1.0-4.el7sat.noarch.rpm rubygem-foreman_maintain-1.0.12-1.el7sat.noarch.rpm rubygem-highline-2.0.3-2.el7sat.noarch.rpm rubygem-oauth-0.5.4-2.el7sat.noarch.rpm satellite-capsule-6.11.0-2.el7sat.noarch.rpm satellite-common-6.11.0-2.el7sat.noarch.rpm satellite-installer-6.11.0.7-1.el7sat.noarch.rpm satellite-maintain-0.0.1-1.el7sat.noarch.rpm tfm-pulpcore-python3-aiodns-3.0.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-aiofiles-0.7.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-aiohttp-xmlrpc-1.5.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-aioredis-2.0.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-aiosignal-1.2.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-ansible-builder-1.0.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-asgiref-3.4.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-async-lru-1.0.2-2.el7pc.noarch.rpm tfm-pulpcore-python3-async-timeout-4.0.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-asyncio-throttle-1.0.2-2.el7pc.noarch.rpm tfm-pulpcore-python3-attrs-21.2.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-backoff-1.11.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-bindep-2.10.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-bleach-3.3.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-bleach-allowlist-1.0.3-2.el7pc.noarch.rpm tfm-pulpcore-python3-certifi-2020.6.20-2.el7pc.noarch.rpm tfm-pulpcore-python3-chardet-3.0.4-3.el7pc.noarch.rpm tfm-pulpcore-python3-charset-normalizer-2.0.7-1.el7pc.noarch.rpm tfm-pulpcore-python3-click-8.0.3-1.el7pc.noarch.rpm tfm-pulpcore-python3-click-shell-2.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-colorama-0.4.4-2.el7pc.noarch.rpm tfm-pulpcore-python3-contextlib2-21.6.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-dateutil-2.8.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-debian-0.1.42-1.el7pc.noarch.rpm tfm-pulpcore-python3-defusedxml-0.7.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-diff-match-patch-20200713-2.el7pc.noarch.rpm tfm-pulpcore-python3-distro-1.6.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-django-3.2.13-1.el7pc.noarch.rpm tfm-pulpcore-python3-django-currentuser-0.5.3-3.el7pc.noarch.rpm tfm-pulpcore-python3-django-filter-21.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-django-guardian-2.4.0-3.el7pc.noarch.rpm tfm-pulpcore-python3-django-guid-3.2.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-django-import-export-2.6.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-django-lifecycle-0.9.3-1.el7pc.noarch.rpm tfm-pulpcore-python3-django-prometheus-2.1.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-django-readonly-field-1.0.5-3.el7pc.noarch.rpm tfm-pulpcore-python3-djangorestframework-3.12.4-4.el7pc.noarch.rpm tfm-pulpcore-python3-djangorestframework-queryfields-1.0.0-4.el7pc.noarch.rpm tfm-pulpcore-python3-drf-access-policy-1.1.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-drf-nested-routers-0.93.3-3.el7pc.noarch.rpm tfm-pulpcore-python3-drf-spectacular-0.20.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-dynaconf-3.1.7-2.el7pc.noarch.rpm tfm-pulpcore-python3-ecdsa-0.13.3-3.el7pc.noarch.rpm tfm-pulpcore-python3-et-xmlfile-1.1.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-flake8-3.9.2-3.el7pc.noarch.rpm tfm-pulpcore-python3-future-0.18.2-4.el7pc.noarch.rpm tfm-pulpcore-python3-galaxy-importer-0.4.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-gnupg-0.4.7-2.el7pc.noarch.rpm tfm-pulpcore-python3-gunicorn-20.1.0-3.el7pc.noarch.rpm tfm-pulpcore-python3-idna-3.3-1.el7pc.noarch.rpm tfm-pulpcore-python3-idna-ssl-1.1.0-4.el7pc.noarch.rpm tfm-pulpcore-python3-importlib-metadata-1.7.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-inflection-0.5.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-iniparse-0.4-34.el7pc.noarch.rpm tfm-pulpcore-python3-jinja2-3.0.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-jsonschema-3.2.0-7.el7pc.noarch.rpm tfm-pulpcore-python3-markdown-3.3.4-4.el7pc.noarch.rpm tfm-pulpcore-python3-markuppy-1.14-2.el7pc.noarch.rpm tfm-pulpcore-python3-mccabe-0.6.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-naya-1.1.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-odfpy-1.4.1-5.el7pc.noarch.rpm tfm-pulpcore-python3-openpyxl-3.0.9-1.el7pc.noarch.rpm tfm-pulpcore-python3-packaging-21.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-parsley-1.3-1.el7pc.noarch.rpm tfm-pulpcore-python3-pbr-5.6.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-productmd-1.33-2.el7pc.noarch.rpm tfm-pulpcore-python3-prometheus-client-0.8.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-ansible-0.10.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-certguard-1.5.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-cli-0.14.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-container-2.9.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-deb-2.16.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-file-1.10.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-pulp-rpm-3.17.5-1.1.el7pc.noarch.rpm tfm-pulpcore-python3-pulpcore-3.16.9-1.el7pc.noarch.rpm tfm-pulpcore-python3-pyOpenSSL-19.1.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-pycodestyle-2.7.0-4.el7pc.noarch.rpm tfm-pulpcore-python3-pycparser-2.20-2.el7pc.noarch.rpm tfm-pulpcore-python3-pyflakes-2.3.1-4.el7pc.noarch.rpm tfm-pulpcore-python3-pygments-2.10.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-pygtrie-2.4.2-2.el7pc.noarch.rpm tfm-pulpcore-python3-pyjwkest-1.4.2-5.el7pc.noarch.rpm tfm-pulpcore-python3-pyjwt-1.7.1-7.el7pc.noarch.rpm tfm-pulpcore-python3-pyparsing-2.4.7-2.el7pc.noarch.rpm tfm-pulpcore-python3-pytz-2021.3-1.el7pc.noarch.rpm tfm-pulpcore-python3-redis-3.5.3-2.el7pc.noarch.rpm tfm-pulpcore-python3-requests-2.26.0-3.el7pc.noarch.rpm tfm-pulpcore-python3-requirements-parser-0.2.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-schema-0.7.5-1.el7pc.noarch.rpm tfm-pulpcore-python3-semantic-version-2.8.5-2.el7pc.noarch.rpm tfm-pulpcore-python3-six-1.16.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-sqlparse-0.4.2-2.el7pc.noarch.rpm tfm-pulpcore-python3-tablib-3.1.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-toml-0.10.2-2.el7pc.noarch.rpm tfm-pulpcore-python3-typing-extensions-3.10.0.2-1.el7pc.noarch.rpm tfm-pulpcore-python3-uritemplate-4.1.1-1.el7pc.noarch.rpm tfm-pulpcore-python3-url-normalize-1.4.3-3.el7pc.noarch.rpm tfm-pulpcore-python3-urllib3-1.26.7-1.el7pc.noarch.rpm tfm-pulpcore-python3-urlman-1.4.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-webencodings-0.5.1-2.el7pc.noarch.rpm tfm-pulpcore-python3-whitenoise-5.3.0-1.el7pc.noarch.rpm tfm-pulpcore-python3-xlrd-2.0.1-4.el7pc.noarch.rpm tfm-pulpcore-python3-xlwt-1.3.0-2.el7pc.noarch.rpm tfm-pulpcore-python3-zipp-3.4.0-3.el7pc.noarch.rpm tfm-rubygem-algebrick-0.7.3-8.el7sat.noarch.rpm tfm-rubygem-ansi-1.5.0-3.el7sat.noarch.rpm tfm-rubygem-apipie-params-0.0.5-5.1.el7sat.noarch.rpm tfm-rubygem-bundler_ext-0.4.1-6.el7sat.noarch.rpm tfm-rubygem-clamp-1.1.2-7.el7sat.noarch.rpm tfm-rubygem-concurrent-ruby-1.1.6-3.el7sat.noarch.rpm tfm-rubygem-concurrent-ruby-edge-0.6.0-3.el7sat.noarch.rpm tfm-rubygem-domain_name-0.5.20160310-5.el7sat.noarch.rpm tfm-rubygem-dynflow-1.6.4-1.el7sat.noarch.rpm tfm-rubygem-excon-0.76.0-2.el7sat.noarch.rpm tfm-rubygem-faraday-0.17.3-2.el7sat.noarch.rpm tfm-rubygem-faraday_middleware-0.13.1-3.el7sat.noarch.rpm tfm-rubygem-fast_gettext-1.4.1-5.el7sat.noarch.rpm tfm-rubygem-gssapi-1.2.0-8.el7sat.noarch.rpm tfm-rubygem-hashie-3.6.0-3.el7sat.noarch.rpm tfm-rubygem-highline-2.0.3-2.el7sat.noarch.rpm tfm-rubygem-http-cookie-1.0.2-5.1.el7sat.noarch.rpm tfm-rubygem-infoblox-3.0.0-4.el7sat.noarch.rpm tfm-rubygem-journald-logger-2.0.4-3.el7sat.noarch.rpm tfm-rubygem-jwt-2.2.2-2.el7sat.noarch.rpm tfm-rubygem-kafo-6.4.0-1.el7sat.noarch.rpm tfm-rubygem-kafo_parsers-1.2.1-1.el7sat.noarch.rpm tfm-rubygem-kafo_wizards-0.0.2-2.el7sat.noarch.rpm tfm-rubygem-little-plugger-1.1.4-3.el7sat.noarch.rpm tfm-rubygem-logging-2.3.0-2.el7sat.noarch.rpm tfm-rubygem-logging-journald-2.0.0-3.el7sat.noarch.rpm tfm-rubygem-mime-types-3.3.1-2.el7sat.noarch.rpm tfm-rubygem-mime-types-data-3.2018.0812-5.el7sat.noarch.rpm tfm-rubygem-mini_portile2-2.5.1-1.el7sat.noarch.rpm tfm-rubygem-mqtt-0.5.0-1.el7sat.noarch.rpm tfm-rubygem-multi_json-1.14.1-3.el7sat.noarch.rpm tfm-rubygem-multipart-post-2.0.0-3.el7sat.noarch.rpm tfm-rubygem-mustermann-1.1.1-1.el7sat.noarch.rpm tfm-rubygem-net-ssh-4.2.0-3.el7sat.noarch.rpm tfm-rubygem-net-ssh-krb-0.4.0-4.el7sat.noarch.rpm tfm-rubygem-netrc-0.11.0-6.el7sat.noarch.rpm tfm-rubygem-openscap-0.4.9-7.el7sat.noarch.rpm tfm-rubygem-openscap_parser-1.0.2-2.el7sat.noarch.rpm tfm-rubygem-powerbar-2.0.1-3.el7sat.noarch.rpm tfm-rubygem-rack-2.2.3-2.el7sat.noarch.rpm tfm-rubygem-rack-protection-2.1.0-2.el7sat.noarch.rpm tfm-rubygem-rb-inotify-0.9.7-6.el7sat.noarch.rpm tfm-rubygem-rbnacl-4.0.2-2.el7sat.noarch.rpm tfm-rubygem-redfish_client-0.5.2-2.el7sat.noarch.rpm tfm-rubygem-rest-client-2.0.2-4.el7sat.noarch.rpm tfm-rubygem-rsec-0.4.3-5.el7sat.noarch.rpm tfm-rubygem-ruby2_keywords-0.0.4-1.el7sat.noarch.rpm tfm-rubygem-rubyipmi-0.11.0-1.el7sat.noarch.rpm tfm-rubygem-sd_notify-0.1.0-2.el7sat.noarch.rpm tfm-rubygem-sequel-5.42.0-2.el7sat.noarch.rpm tfm-rubygem-server_sent_events-0.1.2-2.el7sat.noarch.rpm tfm-rubygem-sinatra-2.1.0-3.el7sat.noarch.rpm tfm-rubygem-smart_proxy_ansible-3.3.1-2.el7sat.noarch.rpm tfm-rubygem-smart_proxy_container_gateway-1.0.6-1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dhcp_infoblox-0.0.16-6.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dhcp_remote_isc-0.0.5-5.el7sat.noarch.rpm tfm-rubygem-smart_proxy_discovery-1.0.5-8.el7sat.noarch.rpm tfm-rubygem-smart_proxy_discovery_image-1.3.2-3.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dns_infoblox-1.1.0-6.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dynflow-0.6.3-1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_dynflow_core-0.4.1-1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_openscap-0.9.2-1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_pulp-3.2.0-2.el7sat.noarch.rpm tfm-rubygem-smart_proxy_remote_execution_ssh-0.5.3-1.el7sat.noarch.rpm tfm-rubygem-smart_proxy_shellhooks-0.9.2-2.el7sat.noarch.rpm tfm-rubygem-statsd-instrument-2.1.4-4.el7sat.noarch.rpm tfm-rubygem-tilt-2.0.8-5.el7sat.noarch.rpm tfm-rubygem-unf-0.1.3-9.el7sat.noarch.rpm tfm-rubygem-xmlrpc-0.3.0-3.el7sat.noarch.rpm x86_64: createrepo_c-0.20.0-1.el7pc.x86_64.rpm createrepo_c-debuginfo-0.20.0-1.el7pc.x86_64.rpm createrepo_c-libs-0.20.0-1.el7pc.x86_64.rpm dynflow-utils-1.6.3-1.el7sat.x86_64.rpm foreman-discovery-image-service-1.0.0-4.1.el7sat.x86_64.rpm foreman-discovery-image-service-tui-1.0.0-4.1.el7sat.x86_64.rpm hfsplus-tools-332.14-12.el7.x86_64.rpm hfsplus-tools-debuginfo-332.14-12.el7.x86_64.rpm libcomps-0.1.18-1.el7pc.x86_64.rpm libcomps-debuginfo-0.1.18-1.el7pc.x86_64.rpm libmodulemd2-2.9.3-1.el7pc.x86_64.rpm libmodulemd2-debuginfo-2.9.3-1.el7pc.x86_64.rpm libsodium-1.0.17-3.el7sat.x86_64.rpm libsodium-debuginfo-1.0.17-3.el7sat.x86_64.rpm libsolv-0.7.22-1.el7pc.x86_64.rpm libsolv-debuginfo-0.7.22-1.el7pc.x86_64.rpm libsolv0-0.6.34-4.el7sat.x86_64.rpm libsolv0-debuginfo-0.6.34-4.el7sat.x86_64.rpm libwebsockets-2.4.2-2.el7.x86_64.rpm libwebsockets-debuginfo-2.4.2-2.el7.x86_64.rpm livecd-tools-20.4-1.6.el7sat.x86_64.rpm pulpcore-selinux-1.3.0-1.el7pc.x86_64.rpm puppet-agent-7.12.1-1.el7sat.x86_64.rpm python-imgcreate-20.4-1.6.el7sat.x86_64.rpm python-psutil-debuginfo-5.7.2-2.el7sat.x86_64.rpm python-qpid-proton-0.33.0-6.el7_9.x86_64.rpm python-qpid-qmf-1.36.0-32.el7_9amq.x86_64.rpm python-saslwrapper-0.22-5.el7sat.x86_64.rpm python2-libcomps-0.1.15-5.pulp.el7sat.x86_64.rpm python2-libcomps-debuginfo-0.1.15-5.pulp.el7sat.x86_64.rpm python2-psutil-5.7.2-2.el7sat.x86_64.rpm qpid-cpp-client-1.36.0-32.el7_9amq.x86_64.rpm qpid-cpp-debuginfo-1.36.0-32.el7_9amq.x86_64.rpm qpid-cpp-server-1.36.0-32.el7_9amq.x86_64.rpm qpid-cpp-server-linearstore-1.36.0-32.el7_9amq.x86_64.rpm qpid-dispatch-debuginfo-1.14.0-1.el7_9.x86_64.rpm qpid-dispatch-router-1.14.0-1.el7_9.x86_64.rpm qpid-proton-c-0.33.0-6.el7_9.x86_64.rpm qpid-proton-debuginfo-0.33.0-6.el7_9.x86_64.rpm qpid-qmf-1.36.0-32.el7_9amq.x86_64.rpm rubygem-newt-0.9.6-3.el7sat.x86_64.rpm rubygem-newt-debuginfo-0.9.6-3.el7sat.x86_64.rpm saslwrapper-0.22-5.el7sat.x86_64.rpm saslwrapper-debuginfo-0.22-5.el7sat.x86_64.rpm tfm-pulpcore-python-aiohttp-debuginfo-3.8.1-2.el7pc.x86_64.rpm tfm-pulpcore-python-brotli-debuginfo-1.0.9-1.el7pc.x86_64.rpm tfm-pulpcore-python-cchardet-debuginfo-2.1.7-1.el7pc.x86_64.rpm tfm-pulpcore-python-cffi-debuginfo-1.15.0-1.el7pc.x86_64.rpm tfm-pulpcore-python-cryptography-debuginfo-3.1.1-1.el7pc.x86_64.rpm tfm-pulpcore-python-frozenlist-debuginfo-1.3.0-1.el7pc.x86_64.rpm tfm-pulpcore-python-lxml-debuginfo-4.7.1-1.el7pc.x86_64.rpm tfm-pulpcore-python-markupsafe-debuginfo-2.0.1-2.el7pc.x86_64.rpm tfm-pulpcore-python-multidict-debuginfo-5.2.0-1.el7pc.x86_64.rpm tfm-pulpcore-python-psycopg2-debuginfo-2.9.1-1.el7pc.x86_64.rpm tfm-pulpcore-python-pycairo-debuginfo-1.20.1-2.el7pc.x86_64.rpm tfm-pulpcore-python-pycares-debuginfo-4.1.2-3.el7pc.x86_64.rpm tfm-pulpcore-python-pycryptodomex-debuginfo-3.11.0-1.el7pc.x86_64.rpm tfm-pulpcore-python-pygobject-debuginfo-3.40.1-1.el7pc.x86_64.rpm tfm-pulpcore-python-pyrsistent-debuginfo-0.18.0-1.el7pc.x86_64.rpm tfm-pulpcore-python-rhsm-debuginfo-1.19.2-2.el7pc.x86_64.rpm tfm-pulpcore-python-yarl-debuginfo-1.7.2-1.el7pc.x86_64.rpm tfm-pulpcore-python3-aiohttp-3.8.1-2.el7pc.x86_64.rpm tfm-pulpcore-python3-brotli-1.0.9-1.el7pc.x86_64.rpm tfm-pulpcore-python3-cchardet-2.1.7-1.el7pc.x86_64.rpm tfm-pulpcore-python3-cffi-1.15.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-createrepo_c-0.20.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-cryptography-3.1.1-1.el7pc.x86_64.rpm tfm-pulpcore-python3-frozenlist-1.3.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-libcomps-0.1.18-1.el7pc.x86_64.rpm tfm-pulpcore-python3-lxml-4.7.1-1.el7pc.x86_64.rpm tfm-pulpcore-python3-markupsafe-2.0.1-2.el7pc.x86_64.rpm tfm-pulpcore-python3-multidict-5.2.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-psycopg2-2.9.1-1.el7pc.x86_64.rpm tfm-pulpcore-python3-pycairo-1.20.1-2.el7pc.x86_64.rpm tfm-pulpcore-python3-pycares-4.1.2-3.el7pc.x86_64.rpm tfm-pulpcore-python3-pycryptodomex-3.11.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-pygobject-3.40.1-1.el7pc.x86_64.rpm tfm-pulpcore-python3-pyrsistent-0.18.0-1.el7pc.x86_64.rpm tfm-pulpcore-python3-pyyaml-5.4.1-3.el7pc.x86_64.rpm tfm-pulpcore-python3-rhsm-1.19.2-2.el7pc.x86_64.rpm tfm-pulpcore-python3-setuptools-1.0-4.el7pc.x86_64.rpm tfm-pulpcore-python3-solv-0.7.22-1.el7pc.x86_64.rpm tfm-pulpcore-python3-yarl-1.7.2-1.el7pc.x86_64.rpm tfm-pulpcore-runtime-1.0-4.el7pc.x86_64.rpm tfm-rubygem-ffi-1.12.2-2.1.el7sat.x86_64.rpm tfm-rubygem-ffi-debuginfo-1.12.2-2.1.el7sat.x86_64.rpm tfm-rubygem-journald-native-1.0.11-4.1.el7sat.x86_64.rpm tfm-rubygem-journald-native-debuginfo-1.0.11-4.1.el7sat.x86_64.rpm tfm-rubygem-msgpack-1.3.3-2.1.el7sat.x86_64.rpm tfm-rubygem-msgpack-debuginfo-1.3.3-2.1.el7sat.x86_64.rpm tfm-rubygem-newt-0.9.7-3.1.el7sat.x86_64.rpm tfm-rubygem-newt-debuginfo-0.9.7-3.1.el7sat.x86_64.rpm tfm-rubygem-nokogiri-1.11.3-2.el7sat.x86_64.rpm tfm-rubygem-nokogiri-debuginfo-1.11.3-2.el7sat.x86_64.rpm tfm-rubygem-racc-1.5.2-1.el7sat.x86_64.rpm tfm-rubygem-racc-debuginfo-1.5.2-1.el7sat.x86_64.rpm tfm-rubygem-rkerberos-0.1.5-20.1.el7sat.x86_64.rpm tfm-rubygem-rkerberos-debuginfo-0.1.5-20.1.el7sat.x86_64.rpm tfm-rubygem-ruby-libvirt-0.7.1-2.1.el7sat.x86_64.rpm tfm-rubygem-ruby-libvirt-debuginfo-0.7.1-2.1.el7sat.x86_64.rpm tfm-rubygem-sqlite3-1.3.13-7.1.el7sat.x86_64.rpm tfm-rubygem-sqlite3-debuginfo-1.3.13-7.1.el7sat.x86_64.rpm tfm-rubygem-unf_ext-0.0.7.2-4.1.el7sat.x86_64.rpm tfm-rubygem-unf_ext-debuginfo-0.0.7.2-4.1.el7sat.x86_64.rpm tfm-runtime-7.0-1.el7sat.x86_64.rpm Red Hat Satellite 6.11 for RHEL 7: Source: rubygem-clamp-1.1.2-7.el7sat.src.rpm rubygem-foreman_maintain-1.0.12-1.el7sat.src.rpm rubygem-highline-2.0.3-2.el7sat.src.rpm satellite-clone-3.1.0-2.el7sat.src.rpm satellite-maintain-0.0.1-1.el7sat.src.rpm noarch: rubygem-clamp-1.1.2-7.el7sat.noarch.rpm rubygem-foreman_maintain-1.0.12-1.el7sat.noarch.rpm rubygem-highline-2.0.3-2.el7sat.noarch.rpm satellite-clone-3.1.0-2.el7sat.noarch.rpm satellite-maintain-0.0.1-1.el7sat.noarch.rpm Red Hat Satellite 6.11 for RHEL 7: Source: foreman-3.1.1.21-2.el7sat.src.rpm satellite-6.11.0-2.el7sat.src.rpm tfm-7.0-1.el7sat.src.rpm tfm-rubygem-amazing_print-1.1.0-2.el7sat.src.rpm tfm-rubygem-apipie-bindings-0.4.0-2.el7sat.src.rpm tfm-rubygem-clamp-1.1.2-7.el7sat.src.rpm tfm-rubygem-domain_name-0.5.20160310-5.el7sat.src.rpm tfm-rubygem-fast_gettext-1.4.1-5.el7sat.src.rpm tfm-rubygem-hammer_cli-3.1.0.1-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman-3.1.0.1-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_admin-1.1.0-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_ansible-0.3.4-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_discovery-1.1.0-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_openscap-0.1.13-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_tasks-0.0.17-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_templates-0.2.0-2.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el7sat.src.rpm tfm-rubygem-hammer_cli_foreman_webhooks-0.0.2-1.el7sat.src.rpm tfm-rubygem-hammer_cli_katello-1.3.1.6-1.el7sat.src.rpm tfm-rubygem-hashie-3.6.0-3.el7sat.src.rpm tfm-rubygem-highline-2.0.3-2.el7sat.src.rpm tfm-rubygem-http-cookie-1.0.2-5.1.el7sat.src.rpm tfm-rubygem-jwt-2.2.2-2.el7sat.src.rpm tfm-rubygem-little-plugger-1.1.4-3.el7sat.src.rpm tfm-rubygem-locale-2.0.9-15.el7sat.src.rpm tfm-rubygem-logging-2.3.0-2.el7sat.src.rpm tfm-rubygem-mime-types-3.3.1-2.el7sat.src.rpm tfm-rubygem-mime-types-data-3.2018.0812-5.el7sat.src.rpm tfm-rubygem-multi_json-1.14.1-3.el7sat.src.rpm tfm-rubygem-netrc-0.11.0-6.el7sat.src.rpm tfm-rubygem-oauth-0.5.4-5.el7sat.src.rpm tfm-rubygem-powerbar-2.0.1-3.el7sat.src.rpm tfm-rubygem-rest-client-2.0.2-4.el7sat.src.rpm tfm-rubygem-unf-0.1.3-9.el7sat.src.rpm tfm-rubygem-unf_ext-0.0.7.2-4.1.el7sat.src.rpm tfm-rubygem-unicode-0.4.4.4-4.1.el7sat.src.rpm tfm-rubygem-unicode-display_width-1.7.0-2.el7sat.src.rpm noarch: foreman-cli-3.1.1.21-2.el7sat.noarch.rpm satellite-cli-6.11.0-2.el7sat.noarch.rpm tfm-rubygem-amazing_print-1.1.0-2.el7sat.noarch.rpm tfm-rubygem-apipie-bindings-0.4.0-2.el7sat.noarch.rpm tfm-rubygem-clamp-1.1.2-7.el7sat.noarch.rpm tfm-rubygem-domain_name-0.5.20160310-5.el7sat.noarch.rpm tfm-rubygem-fast_gettext-1.4.1-5.el7sat.noarch.rpm tfm-rubygem-hammer_cli-3.1.0.1-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman-3.1.0.1-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_admin-1.1.0-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_ansible-0.3.4-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_discovery-1.1.0-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_openscap-0.1.13-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_tasks-0.0.17-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_templates-0.2.0-2.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_foreman_webhooks-0.0.2-1.el7sat.noarch.rpm tfm-rubygem-hammer_cli_katello-1.3.1.6-1.el7sat.noarch.rpm tfm-rubygem-hashie-3.6.0-3.el7sat.noarch.rpm tfm-rubygem-highline-2.0.3-2.el7sat.noarch.rpm tfm-rubygem-http-cookie-1.0.2-5.1.el7sat.noarch.rpm tfm-rubygem-jwt-2.2.2-2.el7sat.noarch.rpm tfm-rubygem-little-plugger-1.1.4-3.el7sat.noarch.rpm tfm-rubygem-locale-2.0.9-15.el7sat.noarch.rpm tfm-rubygem-logging-2.3.0-2.el7sat.noarch.rpm tfm-rubygem-mime-types-3.3.1-2.el7sat.noarch.rpm tfm-rubygem-mime-types-data-3.2018.0812-5.el7sat.noarch.rpm tfm-rubygem-multi_json-1.14.1-3.el7sat.noarch.rpm tfm-rubygem-netrc-0.11.0-6.el7sat.noarch.rpm tfm-rubygem-oauth-0.5.4-5.el7sat.noarch.rpm tfm-rubygem-powerbar-2.0.1-3.el7sat.noarch.rpm tfm-rubygem-rest-client-2.0.2-4.el7sat.noarch.rpm tfm-rubygem-unf-0.1.3-9.el7sat.noarch.rpm tfm-rubygem-unicode-display_width-1.7.0-2.el7sat.noarch.rpm x86_64: tfm-rubygem-unf_ext-0.0.7.2-4.1.el7sat.x86_64.rpm tfm-rubygem-unf_ext-debuginfo-0.0.7.2-4.1.el7sat.x86_64.rpm tfm-rubygem-unicode-0.4.4.4-4.1.el7sat.x86_64.rpm tfm-rubygem-unicode-debuginfo-0.4.4.4-4.1.el7sat.x86_64.rpm tfm-runtime-7.0-1.el7sat.x86_64.rpm Red Hat Satellite 6.11 for RHEL 8: Source: ansible-collection-redhat-satellite-3.3.0-1.el8sat.src.rpm ansible-collection-redhat-satellite_operations-1.2.3-1.el8sat.src.rpm ansible-lint-5.0.8-3.el8pc.src.rpm ansible-runner-1.4.7-1.el8ar.src.rpm ansiblerole-foreman_scap_client-0.2.0-2.el8sat.src.rpm ansiblerole-insights-client-1.7.1-2.el8sat.src.rpm candlepin-4.1.13-1.el8sat.src.rpm createrepo_c-0.20.0-1.el8pc.src.rpm dynflow-utils-1.6.3-1.el8sat.src.rpm foreman-3.1.1.21-2.el8sat.src.rpm foreman-bootloaders-redhat-202005201200-1.el8sat.src.rpm foreman-discovery-image-3.8.2-1.el8sat.src.rpm foreman-discovery-image-service-1.0.0-4.1.el8sat.src.rpm foreman-installer-3.1.2.6-1.el8sat.src.rpm foreman-proxy-3.1.1.1-1.el8sat.src.rpm foreman-selinux-3.1.2.1-1.el8sat.src.rpm katello-4.3.0-3.el8sat.src.rpm katello-certs-tools-2.9.0-1.el8sat.src.rpm katello-client-bootstrap-1.7.9-1.el8sat.src.rpm katello-selinux-4.0.2-1.el8sat.src.rpm libcomps-0.1.18-1.el8pc.src.rpm libdb-5.3.28-42.el8_4.src.rpm libsodium-1.0.17-3.el8sat.src.rpm libsolv-0.7.22-1.el8pc.src.rpm libwebsockets-2.4.2-2.el8.src.rpm postgresql-evr-0.0.2-1.el8sat.src.rpm pulpcore-selinux-1.3.0-1.el8pc.src.rpm puppet-agent-7.12.1-1.el8sat.src.rpm puppet-agent-oauth-0.5.1-3.el8sat.src.rpm puppet-foreman_scap_client-0.4.0-1.el8sat.src.rpm puppetlabs-stdlib-5.2.0-1.el8sat.src.rpm puppetserver-7.4.2-1.el8sat.src.rpm python-aiodns-3.0.0-2.el8pc.src.rpm python-aiofiles-0.7.0-2.el8pc.src.rpm python-aiohttp-3.8.1-2.el8pc.src.rpm python-aiohttp-xmlrpc-1.5.0-1.el8pc.src.rpm python-aioredis-2.0.0-2.el8pc.src.rpm python-aiosignal-1.2.0-1.el8pc.src.rpm python-ansible-builder-1.0.1-2.el8pc.src.rpm python-asgiref-3.4.1-1.el8pc.src.rpm python-async-lru-1.0.2-2.el8pc.src.rpm python-async-timeout-4.0.2-1.el8pc.src.rpm python-asyncio-throttle-1.0.2-2.el8pc.src.rpm python-attrs-21.2.0-2.el8pc.src.rpm python-backoff-1.11.1-1.el8pc.src.rpm python-bindep-2.10.1-1.el8pc.src.rpm python-bleach-3.3.1-1.el8pc.src.rpm python-bleach-allowlist-1.0.3-2.el8pc.src.rpm python-bracex-2.2-1.el8pc.src.rpm python-brotli-1.0.9-1.el8pc.src.rpm python-cchardet-2.1.7-1.el8pc.src.rpm python-certifi-2020.6.20-2.el8pc.src.rpm python-cffi-1.15.0-1.el8pc.src.rpm python-charset-normalizer-2.0.7-1.el8pc.src.rpm python-click-8.0.3-1.el8pc.src.rpm python-click-shell-2.1-2.el8pc.src.rpm python-colorama-0.4.4-2.el8pc.src.rpm python-commonmark-0.9.1-4.el8pc.src.rpm python-contextlib2-21.6.0-2.el8pc.src.rpm python-cryptography-3.1.1-1.el8pc.src.rpm python-daemon-2.1.2-9.el8ar.src.rpm python-dataclasses-0.8-2.el8pc.src.rpm python-dateutil-2.8.2-1.el8pc.src.rpm python-debian-0.1.42-1.el8pc.src.rpm python-defusedxml-0.7.1-2.el8pc.src.rpm python-diff-match-patch-20200713-2.el8pc.src.rpm python-distro-1.6.0-2.el8pc.src.rpm python-django-3.2.13-1.el8pc.src.rpm python-django-currentuser-0.5.3-3.el8pc.src.rpm python-django-filter-21.1-1.el8pc.src.rpm python-django-guardian-2.4.0-3.el8pc.src.rpm python-django-guid-3.2.0-2.el8pc.src.rpm python-django-import-export-2.6.1-1.el8pc.src.rpm python-django-lifecycle-0.9.3-1.el8pc.src.rpm python-django-prometheus-2.1.0-2.el8pc.src.rpm python-django-readonly-field-1.0.5-3.el8pc.src.rpm python-djangorestframework-3.12.4-4.el8pc.src.rpm python-djangorestframework-queryfields-1.0.0-4.el8pc.src.rpm python-drf-access-policy-1.1.0-1.el8pc.src.rpm python-drf-nested-routers-0.93.3-3.el8pc.src.rpm python-drf-spectacular-0.20.1-1.el8pc.src.rpm python-dynaconf-3.1.7-2.el8pc.src.rpm python-ecdsa-0.13.3-3.el8pc.src.rpm python-enrich-1.2.6-3.el8pc.src.rpm python-et-xmlfile-1.1.0-1.el8pc.src.rpm python-flake8-3.9.2-3.el8pc.src.rpm python-frozenlist-1.3.0-1.el8pc.src.rpm python-future-0.18.2-4.el8pc.src.rpm python-galaxy-importer-0.4.1-2.el8pc.src.rpm python-gnupg-0.4.7-2.el8pc.src.rpm python-gunicorn-20.1.0-3.el8pc.src.rpm python-idna-3.3-1.el8pc.src.rpm python-idna-ssl-1.1.0-4.el8pc.src.rpm python-importlib-metadata-1.7.0-2.el8pc.src.rpm python-inflection-0.5.1-2.el8pc.src.rpm python-iniparse-0.4-34.el8pc.src.rpm python-jinja2-3.0.2-1.el8pc.src.rpm python-jsonschema-3.2.0-7.el8pc.src.rpm python-lockfile-0.11.0-8.el8ar.src.rpm python-lxml-4.7.1-1.el8pc.src.rpm python-markdown-3.3.4-4.el8pc.src.rpm python-markuppy-1.14-2.el8pc.src.rpm python-markupsafe-2.0.1-2.el8pc.src.rpm python-mccabe-0.6.1-2.el8pc.src.rpm python-multidict-5.2.0-1.el8pc.src.rpm python-naya-1.1.1-1.el8pc.src.rpm python-odfpy-1.4.1-5.el8pc.src.rpm python-openpyxl-3.0.9-1.el8pc.src.rpm python-packaging-21.2-1.el8pc.src.rpm python-parsley-1.3-1.el8pc.src.rpm python-pbr-5.6.0-1.el8pc.src.rpm python-pexpect-4.6-2.el8ar.src.rpm python-productmd-1.33-2.el8pc.src.rpm python-prometheus-client-0.8.0-2.el8pc.src.rpm python-psutil-5.7.2-2.el8sat.src.rpm python-psycopg2-2.9.1-1.el8pc.src.rpm python-pulp-ansible-0.10.1-1.el8pc.src.rpm python-pulp-certguard-1.5.1-1.el8pc.src.rpm python-pulp-cli-0.14.0-1.el8pc.src.rpm python-pulp-container-2.9.2-1.el8pc.src.rpm python-pulp-deb-2.16.1-1.el8pc.src.rpm python-pulp-file-1.10.1-1.el8pc.src.rpm python-pulp-rpm-3.17.5-1.1.el8pc.src.rpm python-pulpcore-3.16.9-1.el8pc.src.rpm python-pyOpenSSL-19.1.0-2.el8pc.src.rpm python-pycairo-1.20.1-2.el8pc.src.rpm python-pycares-4.1.2-3.el8pc.src.rpm python-pycodestyle-2.7.0-4.el8pc.src.rpm python-pycparser-2.20-2.el8pc.src.rpm python-pycryptodomex-3.11.0-1.el8pc.src.rpm python-pyflakes-2.3.1-4.el8pc.src.rpm python-pygments-2.10.0-2.el8pc.src.rpm python-pygobject-3.40.1-1.el8pc.src.rpm python-pygtrie-2.4.2-2.el8pc.src.rpm python-pyjwkest-1.4.2-5.el8pc.src.rpm python-pyjwt-1.7.1-7.el8pc.src.rpm python-pyparsing-2.4.7-2.el8pc.src.rpm python-pyrsistent-0.18.0-1.el8pc.src.rpm python-pytz-2021.3-1.el8pc.src.rpm python-pyyaml-5.4.1-3.el8pc.src.rpm python-qpid-1.37.0-1.el8.src.rpm python-redis-3.5.3-2.el8pc.src.rpm python-requests-2.26.0-3.el8pc.src.rpm python-requirements-parser-0.2.0-2.el8pc.src.rpm python-rhsm-1.19.2-2.el8pc.src.rpm python-rich-10.12.0-1.el8pc.src.rpm python-ruamel-yaml-0.17.17-1.el8pc.src.rpm python-ruamel-yaml-clib-0.2.6-1.el8pc.src.rpm python-schema-0.7.5-1.el8pc.src.rpm python-semantic-version-2.8.5-2.el8pc.src.rpm python-six-1.16.0-1.el8pc.src.rpm python-sqlparse-0.4.2-2.el8pc.src.rpm python-tablib-3.1.0-1.el8pc.src.rpm python-tenacity-7.0.0-2.el8pc.src.rpm python-toml-0.10.2-2.el8pc.src.rpm python-typing-extensions-3.10.0.2-1.el8pc.src.rpm python-uritemplate-4.1.1-1.el8pc.src.rpm python-url-normalize-1.4.3-3.el8pc.src.rpm python-urllib3-1.26.7-1.el8pc.src.rpm python-urlman-1.4.0-2.el8pc.src.rpm python-wcmatch-8.3-1.el8pc.src.rpm python-webencodings-0.5.1-2.el8pc.src.rpm python-whitenoise-5.3.0-1.el8pc.src.rpm python-xlrd-2.0.1-4.el8pc.src.rpm python-xlwt-1.3.0-2.el8pc.src.rpm python-yarl-1.7.2-1.el8pc.src.rpm python-zipp-3.4.0-3.el8pc.src.rpm qpid-cpp-1.39.0-7.el8amq.src.rpm qpid-dispatch-1.14.0-6.el8.src.rpm qpid-proton-0.33.0-4.el8.src.rpm redhat-access-insights-puppet-1.0.1-1.el8sat.src.rpm rubygem-actioncable-6.0.4.7-1.el8sat.src.rpm rubygem-actionmailbox-6.0.4.7-1.el8sat.src.rpm rubygem-actionmailer-6.0.4.7-1.el8sat.src.rpm rubygem-actionpack-6.0.4.7-1.el8sat.src.rpm rubygem-actiontext-6.0.4.7-1.el8sat.src.rpm rubygem-actionview-6.0.4.7-1.el8sat.src.rpm rubygem-activejob-6.0.4.7-1.el8sat.src.rpm rubygem-activemodel-6.0.4.7-1.el8sat.src.rpm rubygem-activerecord-6.0.4.7-1.el8sat.src.rpm rubygem-activerecord-import-1.1.0-1.el8sat.src.rpm rubygem-activerecord-session_store-2.0.0-1.el8sat.src.rpm rubygem-activestorage-6.0.4.7-1.el8sat.src.rpm rubygem-activesupport-6.0.4.7-1.el8sat.src.rpm rubygem-acts_as_list-1.0.3-2.el8sat.src.rpm rubygem-addressable-2.8.0-1.el8sat.src.rpm rubygem-algebrick-0.7.3-8.el8sat.src.rpm rubygem-amazing_print-1.1.0-2.el8sat.src.rpm rubygem-ancestry-3.0.7-2.el8sat.src.rpm rubygem-anemone-0.7.2-23.el8sat.src.rpm rubygem-angular-rails-templates-1.1.0-2.el8sat.src.rpm rubygem-ansi-1.5.0-3.el8sat.src.rpm rubygem-apipie-bindings-0.4.0-2.el8sat.src.rpm rubygem-apipie-dsl-2.4.0-1.el8sat.src.rpm rubygem-apipie-params-0.0.5-5.1.el8sat.src.rpm rubygem-apipie-rails-0.5.17-4.el8sat.src.rpm rubygem-audited-4.9.0-4.el8sat.src.rpm rubygem-azure_mgmt_compute-0.22.0-1.el8sat.src.rpm rubygem-azure_mgmt_network-0.26.1-2.el8sat.src.rpm rubygem-azure_mgmt_resources-0.18.2-1.el8sat.src.rpm rubygem-azure_mgmt_storage-0.23.0-1.el8sat.src.rpm rubygem-azure_mgmt_subscriptions-0.18.5-1.el8sat.src.rpm rubygem-bcrypt-3.1.12-4.1.el8sat.src.rpm rubygem-builder-3.2.4-2.el8sat.src.rpm rubygem-bundler_ext-0.4.1-6.el8sat.src.rpm rubygem-clamp-1.1.2-7.el8sat.src.rpm rubygem-coffee-rails-5.0.0-2.el8sat.src.rpm rubygem-coffee-script-2.4.1-5.el8sat.src.rpm rubygem-coffee-script-source-1.12.2-5.el8sat.src.rpm rubygem-colorize-0.8.1-2.el8sat.src.rpm rubygem-concurrent-ruby-1.1.6-3.el8sat.src.rpm rubygem-concurrent-ruby-edge-0.6.0-3.el8sat.src.rpm rubygem-connection_pool-2.2.2-3.el8sat.src.rpm rubygem-crass-1.0.6-2.el8sat.src.rpm rubygem-css_parser-1.4.7-5.el8sat.src.rpm rubygem-daemons-1.2.3-7.1.el8sat.src.rpm rubygem-deacon-1.0.0-5.el8sat.src.rpm rubygem-declarative-0.0.10-3.el8sat.src.rpm rubygem-declarative-option-0.1.0-3.el8sat.src.rpm rubygem-deep_cloneable-3.0.0-4.el8sat.src.rpm rubygem-deface-1.5.3-3.el8sat.src.rpm rubygem-diffy-3.0.1-6.1.el8sat.src.rpm rubygem-domain_name-0.5.20160310-5.el8sat.src.rpm rubygem-dynflow-1.6.4-1.el8sat.src.rpm rubygem-erubi-1.9.0-2.el8sat.src.rpm rubygem-excon-0.76.0-2.el8sat.src.rpm rubygem-execjs-2.7.0-5.el8sat.src.rpm rubygem-facter-4.0.51-2.el8sat.src.rpm rubygem-faraday-0.17.3-2.el8sat.src.rpm rubygem-faraday-cookie_jar-0.0.6-2.el8sat.src.rpm rubygem-faraday_middleware-0.13.1-3.el8sat.src.rpm rubygem-fast_gettext-1.4.1-5.el8sat.src.rpm rubygem-ffi-1.12.2-2.1.el8sat.src.rpm rubygem-fog-aws-3.6.5-2.el8sat.src.rpm rubygem-fog-core-2.1.0-4.el8sat.src.rpm rubygem-fog-google-1.11.0-2.el8sat.src.rpm rubygem-fog-json-1.2.0-4.el8sat.src.rpm rubygem-fog-kubevirt-1.3.3-2.el8sat.src.rpm rubygem-fog-libvirt-0.9.0-1.el8sat.src.rpm rubygem-fog-openstack-1.0.8-4.el8sat.src.rpm rubygem-fog-ovirt-2.0.1-2.el8sat.src.rpm rubygem-fog-vsphere-3.5.1-1.el8sat.src.rpm rubygem-fog-xml-0.1.2-9.el8sat.src.rpm rubygem-foreman-tasks-5.2.3-1.el8sat.src.rpm rubygem-foreman_ansible-7.0.4.1-1.el8sat.src.rpm rubygem-foreman_azure_rm-2.2.6-1.el8sat.src.rpm rubygem-foreman_bootdisk-19.0.4.1-1.el8sat.src.rpm rubygem-foreman_discovery-19.0.4-1.el8sat.src.rpm rubygem-foreman_hooks-0.3.17-2.el8sat.src.rpm rubygem-foreman_kubevirt-0.1.9-2.el8sat.src.rpm rubygem-foreman_leapp-0.1.9-1.el8sat.src.rpm rubygem-foreman_maintain-1.0.12-1.el8sat.src.rpm rubygem-foreman_openscap-5.1.1-1.el8sat.src.rpm rubygem-foreman_puppet-2.0.6-1.el8sat.src.rpm rubygem-foreman_remote_execution-5.0.7-1.el8sat.src.rpm rubygem-foreman_rh_cloud-5.0.39-1.el8sat.src.rpm rubygem-foreman_scap_client-0.5.0-1.el8sat.src.rpm rubygem-foreman_templates-9.1.0-1.el8sat.src.rpm rubygem-foreman_theme_satellite-9.0.0.10-1.el8sat.src.rpm rubygem-foreman_virt_who_configure-0.5.8-1.el8sat.src.rpm rubygem-foreman_webhooks-2.0.1-1.1.el8sat.src.rpm rubygem-formatador-0.2.1-13.el8sat.src.rpm rubygem-friendly_id-5.3.0-2.el8sat.src.rpm rubygem-fx-0.5.0-2.el8sat.src.rpm rubygem-get_process_mem-0.2.7-2.1.el8sat.src.rpm rubygem-gettext_i18n_rails-1.8.0-3.el8sat.src.rpm rubygem-git-1.5.0-2.el8sat.src.rpm rubygem-gitlab-sidekiq-fetcher-0.6.0-2.el8sat.src.rpm rubygem-globalid-0.4.2-2.el8sat.src.rpm rubygem-google-api-client-0.33.2-2.el8sat.src.rpm rubygem-google-cloud-env-1.3.3-2.el8sat.src.rpm rubygem-googleauth-0.13.1-2.el8sat.src.rpm rubygem-graphql-1.8.14-3.el8sat.src.rpm rubygem-graphql-batch-0.3.10-3.el8sat.src.rpm rubygem-gssapi-1.2.0-8.el8sat.src.rpm rubygem-hammer_cli-3.1.0.1-1.el8sat.src.rpm rubygem-hammer_cli_foreman-3.1.0.1-1.el8sat.src.rpm rubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.src.rpm rubygem-hammer_cli_foreman_ansible-0.3.4-1.el8sat.src.rpm rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.src.rpm rubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el8sat.src.rpm rubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.src.rpm rubygem-hammer_cli_foreman_kubevirt-0.1.5-1.el8sat.src.rpm rubygem-hammer_cli_foreman_leapp-0.1.1-1.el8sat.src.rpm rubygem-hammer_cli_foreman_openscap-0.1.13-1.el8sat.src.rpm rubygem-hammer_cli_foreman_puppet-0.0.5-1.el8sat.src.rpm rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.src.rpm rubygem-hammer_cli_foreman_tasks-0.0.17-1.el8sat.src.rpm rubygem-hammer_cli_foreman_templates-0.2.0-2.el8sat.src.rpm rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el8sat.src.rpm rubygem-hammer_cli_foreman_webhooks-0.0.2-1.el8sat.src.rpm rubygem-hammer_cli_katello-1.3.1.6-1.el8sat.src.rpm rubygem-hashie-3.6.0-3.el8sat.src.rpm rubygem-highline-2.0.3-2.el8sat.src.rpm rubygem-hocon-1.3.1-2.el8sat.src.rpm rubygem-http-3.3.0-2.el8sat.src.rpm rubygem-http-cookie-1.0.2-5.1.el8sat.src.rpm rubygem-http-form_data-2.1.1-2.el8sat.src.rpm rubygem-http_parser.rb-0.6.0-3.1.el8sat.src.rpm rubygem-httpclient-2.8.3-4.el8sat.src.rpm rubygem-i18n-1.8.2-2.el8sat.src.rpm rubygem-infoblox-3.0.0-4.el8sat.src.rpm rubygem-ipaddress-0.8.0-13.el8sat.src.rpm rubygem-jgrep-1.3.3-11.el8sat.src.rpm rubygem-journald-logger-2.0.4-3.el8sat.src.rpm rubygem-journald-native-1.0.11-4.1.el8sat.src.rpm rubygem-jwt-2.2.2-2.el8sat.src.rpm rubygem-kafo-6.4.0-1.el8sat.src.rpm rubygem-kafo_parsers-1.2.1-1.el8sat.src.rpm rubygem-kafo_wizards-0.0.2-2.el8sat.src.rpm rubygem-katello-4.3.0.42-1.el8sat.src.rpm rubygem-kubeclient-4.3.0-2.el8sat.src.rpm rubygem-ldap_fluff-0.6.0-1.el8sat.src.rpm rubygem-little-plugger-1.1.4-3.el8sat.src.rpm rubygem-locale-2.0.9-15.el8sat.src.rpm rubygem-logging-2.3.0-2.el8sat.src.rpm rubygem-logging-journald-2.0.0-3.el8sat.src.rpm rubygem-loofah-2.4.0-2.el8sat.src.rpm rubygem-mail-2.7.1-2.el8sat.src.rpm rubygem-marcel-1.0.1-1.el8sat.src.rpm rubygem-memoist-0.16.0-3.el8sat.src.rpm rubygem-method_source-0.9.2-3.el8sat.src.rpm rubygem-mime-types-3.3.1-2.el8sat.src.rpm rubygem-mime-types-data-3.2018.0812-5.el8sat.src.rpm rubygem-mini_mime-1.0.2-2.el8sat.src.rpm rubygem-mini_portile2-2.5.1-1.el8sat.src.rpm rubygem-mqtt-0.5.0-1.el8sat.src.rpm rubygem-ms_rest-0.7.6-1.el8sat.src.rpm rubygem-ms_rest_azure-0.12.0-1.el8sat.src.rpm rubygem-msgpack-1.3.3-2.1.el8sat.src.rpm rubygem-multi_json-1.14.1-3.el8sat.src.rpm rubygem-multipart-post-2.0.0-3.el8sat.src.rpm rubygem-mustermann-1.1.1-1.el8sat.src.rpm rubygem-net-ldap-0.17.0-2.el8sat.src.rpm rubygem-net-ping-2.0.1-5.el8sat.src.rpm rubygem-net-scp-1.2.1-5.el8sat.src.rpm rubygem-net-ssh-4.2.0-3.el8sat.src.rpm rubygem-net-ssh-krb-0.4.0-4.el8sat.src.rpm rubygem-net_http_unix-0.2.2-2.el8sat.src.rpm rubygem-netrc-0.11.0-6.el8sat.src.rpm rubygem-newt-0.9.7-3.1.el8sat.src.rpm rubygem-nio4r-2.5.4-2.1.el8sat.src.rpm rubygem-nokogiri-1.11.3-2.el8sat.src.rpm rubygem-oauth-0.5.4-5.el8sat.src.rpm rubygem-openscap-0.4.9-7.el8sat.src.rpm rubygem-openscap_parser-1.0.2-2.el8sat.src.rpm rubygem-optimist-3.0.0-3.el8sat.src.rpm rubygem-os-1.0.0-3.el8sat.src.rpm rubygem-ovirt-engine-sdk-4.4.0-2.1.el8sat.src.rpm rubygem-ovirt_provision_plugin-2.0.3-3.el8sat.src.rpm rubygem-parallel-1.19.1-2.el8sat.src.rpm rubygem-parse-cron-0.1.4-5.el8sat.src.rpm rubygem-polyglot-0.3.5-3.1.el8sat.src.rpm rubygem-powerbar-2.0.1-3.el8sat.src.rpm rubygem-prometheus-client-1.0.0-3.el8sat.src.rpm rubygem-promise.rb-0.7.4-3.el8sat.src.rpm rubygem-public_suffix-3.0.3-3.el8sat.src.rpm rubygem-pulp_ansible_client-0.10.1-1.el8sat.src.rpm rubygem-pulp_certguard_client-1.5.0-1.el8sat.src.rpm rubygem-pulp_container_client-2.9.0-1.el8sat.src.rpm rubygem-pulp_deb_client-2.16.0-1.el8sat.src.rpm rubygem-pulp_file_client-1.10.0-1.el8sat.src.rpm rubygem-pulp_ostree_client-2.0.0-0.1.a1.el8sat.src.rpm rubygem-pulp_python_client-3.5.2-1.el8sat.src.rpm rubygem-pulp_rpm_client-3.17.4-1.el8sat.src.rpm rubygem-pulpcore_client-3.16.7-1.el8sat.src.rpm rubygem-puma-5.6.2-1.el8sat.src.rpm rubygem-puma-status-1.3-1.el8sat.src.rpm rubygem-qpid_proton-0.33.0-5.el8sat.src.rpm rubygem-quantile-0.2.0-5.el8sat.src.rpm rubygem-rabl-0.14.3-2.el8sat.src.rpm rubygem-rack-2.2.3-2.el8sat.src.rpm rubygem-rack-cors-1.0.2-3.el8sat.src.rpm rubygem-rack-jsonp-1.3.1-10.el8sat.src.rpm rubygem-rack-protection-2.1.0-2.el8sat.src.rpm rubygem-rack-test-1.1.0-5.el8sat.src.rpm rubygem-rails-6.0.4.7-1.el8sat.src.rpm rubygem-rails-dom-testing-2.0.3-7.el8sat.src.rpm rubygem-rails-html-sanitizer-1.3.0-2.el8sat.src.rpm rubygem-rails-i18n-6.0.0-3.el8sat.src.rpm rubygem-railties-6.0.4.7-1.el8sat.src.rpm rubygem-rainbow-2.2.2-1.el8sat.src.rpm rubygem-rb-inotify-0.9.7-6.el8sat.src.rpm rubygem-rbnacl-4.0.2-2.el8sat.src.rpm rubygem-rbvmomi-2.2.0-4.el8sat.src.rpm rubygem-record_tag_helper-1.0.1-4.el8sat.src.rpm rubygem-recursive-open-struct-1.1.0-2.el8sat.src.rpm rubygem-redfish_client-0.5.2-2.el8sat.src.rpm rubygem-redis-4.5.1-1.el8sat.src.rpm rubygem-representable-3.0.4-3.el8sat.src.rpm rubygem-responders-3.0.0-4.el8sat.src.rpm rubygem-rest-client-2.0.2-4.el8sat.src.rpm rubygem-retriable-3.1.2-3.el8sat.src.rpm rubygem-rkerberos-0.1.5-20.1.el8sat.src.rpm rubygem-roadie-3.4.0-4.el8sat.src.rpm rubygem-roadie-rails-2.1.1-3.el8sat.src.rpm rubygem-robotex-1.0.0-22.el8sat.src.rpm rubygem-rsec-0.4.3-5.el8sat.src.rpm rubygem-ruby-libvirt-0.7.1-2.1.el8sat.src.rpm rubygem-ruby2_keywords-0.0.4-1.el8sat.src.rpm rubygem-ruby2ruby-2.4.2-4.el8sat.src.rpm rubygem-ruby_parser-3.10.1-4.el8sat.src.rpm rubygem-rubyipmi-0.11.0-1.el8sat.src.rpm rubygem-runcible-2.13.1-2.el8sat.src.rpm rubygem-safemode-1.3.6-2.el8sat.src.rpm rubygem-scoped_search-4.1.9-2.el8sat.src.rpm rubygem-sd_notify-0.1.0-2.el8sat.src.rpm rubygem-secure_headers-6.3.0-3.el8sat.src.rpm rubygem-sequel-5.42.0-2.el8sat.src.rpm rubygem-server_sent_events-0.1.2-2.el8sat.src.rpm rubygem-sexp_processor-4.10.0-7.el8sat.src.rpm rubygem-sidekiq-5.2.10-1.el8sat.src.rpm rubygem-signet-0.14.0-2.el8sat.src.rpm rubygem-sinatra-2.1.0-3.el8sat.src.rpm rubygem-smart_proxy_ansible-3.3.1-2.el8sat.src.rpm rubygem-smart_proxy_container_gateway-1.0.6-1.el8sat.src.rpm rubygem-smart_proxy_dhcp_infoblox-0.0.16-6.el8sat.src.rpm rubygem-smart_proxy_dhcp_remote_isc-0.0.5-5.el8sat.src.rpm rubygem-smart_proxy_discovery-1.0.5-8.el8sat.src.rpm rubygem-smart_proxy_discovery_image-1.3.2-3.el8sat.src.rpm rubygem-smart_proxy_dns_infoblox-1.1.0-6.el8sat.src.rpm rubygem-smart_proxy_dynflow-0.6.3-1.el8sat.src.rpm rubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.src.rpm rubygem-smart_proxy_openscap-0.9.2-1.el8sat.src.rpm rubygem-smart_proxy_pulp-3.2.0-2.el8sat.src.rpm rubygem-smart_proxy_remote_execution_ssh-0.5.3-1.el8sat.src.rpm rubygem-smart_proxy_shellhooks-0.9.2-2.el8sat.src.rpm rubygem-sprockets-4.0.2-2.el8sat.src.rpm rubygem-sprockets-rails-3.2.1-7.el8sat.src.rpm rubygem-sqlite3-1.3.13-7.1.el8sat.src.rpm rubygem-sshkey-1.9.0-5.el8sat.src.rpm rubygem-statsd-instrument-2.1.4-4.el8sat.src.rpm rubygem-stomp-1.4.9-2.el8sat.src.rpm rubygem-thor-1.0.1-3.el8sat.src.rpm rubygem-thread_safe-0.3.6-6.el8sat.src.rpm rubygem-tilt-2.0.8-5.el8sat.src.rpm rubygem-timeliness-0.3.10-2.el8sat.src.rpm rubygem-tzinfo-1.2.6-2.el8sat.src.rpm rubygem-uber-0.1.0-3.el8sat.src.rpm rubygem-unf-0.1.3-9.el8sat.src.rpm rubygem-unf_ext-0.0.7.2-4.1.el8sat.src.rpm rubygem-unicode-0.4.4.4-4.1.el8sat.src.rpm rubygem-unicode-display_width-1.7.0-2.el8sat.src.rpm rubygem-validates_lengths_from_database-0.5.0-8.el8sat.src.rpm rubygem-webpack-rails-0.9.8-6.1.el8sat.src.rpm rubygem-websocket-driver-0.7.1-2.1.el8sat.src.rpm rubygem-websocket-extensions-0.1.5-2.el8sat.src.rpm rubygem-will_paginate-3.1.7-4.el8sat.src.rpm rubygem-zeitwerk-2.2.2-2.el8sat.src.rpm saslwrapper-0.22-6.el8sat.src.rpm satellite-6.11.0-2.el8sat.src.rpm satellite-installer-6.11.0.7-1.el8sat.src.rpm satellite-maintain-0.0.1-1.el8sat.src.rpm yggdrasil-worker-forwarder-0.0.1-1.el8sat.src.rpm noarch: ansible-collection-redhat-satellite-3.3.0-1.el8sat.noarch.rpm ansible-collection-redhat-satellite_operations-1.2.3-1.el8sat.noarch.rpm ansible-lint-5.0.8-3.el8pc.noarch.rpm ansible-runner-1.4.7-1.el8ar.noarch.rpm ansiblerole-foreman_scap_client-0.2.0-2.el8sat.noarch.rpm ansiblerole-insights-client-1.7.1-2.el8sat.noarch.rpm candlepin-4.1.13-1.el8sat.noarch.rpm candlepin-selinux-4.1.13-1.el8sat.noarch.rpm foreman-3.1.1.21-2.el8sat.noarch.rpm foreman-bootloaders-redhat-202005201200-1.el8sat.noarch.rpm foreman-bootloaders-redhat-tftpboot-202005201200-1.el8sat.noarch.rpm foreman-cli-3.1.1.21-2.el8sat.noarch.rpm foreman-debug-3.1.1.21-2.el8sat.noarch.rpm foreman-discovery-image-3.8.2-1.el8sat.noarch.rpm foreman-dynflow-sidekiq-3.1.1.21-2.el8sat.noarch.rpm foreman-ec2-3.1.1.21-2.el8sat.noarch.rpm foreman-gce-3.1.1.21-2.el8sat.noarch.rpm foreman-installer-3.1.2.6-1.el8sat.noarch.rpm foreman-installer-katello-3.1.2.6-1.el8sat.noarch.rpm foreman-journald-3.1.1.21-2.el8sat.noarch.rpm foreman-libvirt-3.1.1.21-2.el8sat.noarch.rpm foreman-openstack-3.1.1.21-2.el8sat.noarch.rpm foreman-ovirt-3.1.1.21-2.el8sat.noarch.rpm foreman-postgresql-3.1.1.21-2.el8sat.noarch.rpm foreman-proxy-3.1.1.1-1.el8sat.noarch.rpm foreman-proxy-journald-3.1.1.1-1.el8sat.noarch.rpm foreman-selinux-3.1.2.1-1.el8sat.noarch.rpm foreman-service-3.1.1.21-2.el8sat.noarch.rpm foreman-telemetry-3.1.1.21-2.el8sat.noarch.rpm foreman-vmware-3.1.1.21-2.el8sat.noarch.rpm katello-4.3.0-3.el8sat.noarch.rpm katello-certs-tools-2.9.0-1.el8sat.noarch.rpm katello-client-bootstrap-1.7.9-1.el8sat.noarch.rpm katello-common-4.3.0-3.el8sat.noarch.rpm katello-debug-4.3.0-3.el8sat.noarch.rpm katello-selinux-4.0.2-1.el8sat.noarch.rpm puppet-agent-oauth-0.5.1-3.el8sat.noarch.rpm puppet-foreman_scap_client-0.4.0-1.el8sat.noarch.rpm puppetlabs-stdlib-5.2.0-1.el8sat.noarch.rpm puppetserver-7.4.2-1.el8sat.noarch.rpm python2-qpid-1.37.0-1.el8.noarch.rpm python3-ansible-runner-1.4.7-1.el8ar.noarch.rpm python3-daemon-2.1.2-9.el8ar.noarch.rpm python3-lockfile-0.11.0-8.el8ar.noarch.rpm python3-pexpect-4.6-2.el8ar.noarch.rpm python38-aiodns-3.0.0-2.el8pc.noarch.rpm python38-aiofiles-0.7.0-2.el8pc.noarch.rpm python38-aiohttp-xmlrpc-1.5.0-1.el8pc.noarch.rpm python38-aioredis-2.0.0-2.el8pc.noarch.rpm python38-aiosignal-1.2.0-1.el8pc.noarch.rpm python38-ansible-builder-1.0.1-2.el8pc.noarch.rpm python38-asgiref-3.4.1-1.el8pc.noarch.rpm python38-async-lru-1.0.2-2.el8pc.noarch.rpm python38-async-timeout-4.0.2-1.el8pc.noarch.rpm python38-asyncio-throttle-1.0.2-2.el8pc.noarch.rpm python38-attrs-21.2.0-2.el8pc.noarch.rpm python38-backoff-1.11.1-1.el8pc.noarch.rpm python38-bindep-2.10.1-1.el8pc.noarch.rpm python38-bleach-3.3.1-1.el8pc.noarch.rpm python38-bleach-allowlist-1.0.3-2.el8pc.noarch.rpm python38-bracex-2.2-1.el8pc.noarch.rpm python38-certifi-2020.6.20-2.el8pc.noarch.rpm python38-charset-normalizer-2.0.7-1.el8pc.noarch.rpm python38-click-8.0.3-1.el8pc.noarch.rpm python38-click-shell-2.1-2.el8pc.noarch.rpm python38-colorama-0.4.4-2.el8pc.noarch.rpm python38-commonmark-0.9.1-4.el8pc.noarch.rpm python38-contextlib2-21.6.0-2.el8pc.noarch.rpm python38-dataclasses-0.8-2.el8pc.noarch.rpm python38-dateutil-2.8.2-1.el8pc.noarch.rpm python38-debian-0.1.42-1.el8pc.noarch.rpm python38-defusedxml-0.7.1-2.el8pc.noarch.rpm python38-diff-match-patch-20200713-2.el8pc.noarch.rpm python38-distro-1.6.0-2.el8pc.noarch.rpm python38-django-3.2.13-1.el8pc.noarch.rpm python38-django-currentuser-0.5.3-3.el8pc.noarch.rpm python38-django-filter-21.1-1.el8pc.noarch.rpm python38-django-guardian-2.4.0-3.el8pc.noarch.rpm python38-django-guid-3.2.0-2.el8pc.noarch.rpm python38-django-import-export-2.6.1-1.el8pc.noarch.rpm python38-django-lifecycle-0.9.3-1.el8pc.noarch.rpm python38-django-prometheus-2.1.0-2.el8pc.noarch.rpm python38-django-readonly-field-1.0.5-3.el8pc.noarch.rpm python38-djangorestframework-3.12.4-4.el8pc.noarch.rpm python38-djangorestframework-queryfields-1.0.0-4.el8pc.noarch.rpm python38-drf-access-policy-1.1.0-1.el8pc.noarch.rpm python38-drf-nested-routers-0.93.3-3.el8pc.noarch.rpm python38-drf-spectacular-0.20.1-1.el8pc.noarch.rpm python38-dynaconf-3.1.7-2.el8pc.noarch.rpm python38-ecdsa-0.13.3-3.el8pc.noarch.rpm python38-enrich-1.2.6-3.el8pc.noarch.rpm python38-et-xmlfile-1.1.0-1.el8pc.noarch.rpm python38-flake8-3.9.2-3.el8pc.noarch.rpm python38-future-0.18.2-4.el8pc.noarch.rpm python38-galaxy-importer-0.4.1-2.el8pc.noarch.rpm python38-gnupg-0.4.7-2.el8pc.noarch.rpm python38-gunicorn-20.1.0-3.el8pc.noarch.rpm python38-idna-3.3-1.el8pc.noarch.rpm python38-idna-ssl-1.1.0-4.el8pc.noarch.rpm python38-importlib-metadata-1.7.0-2.el8pc.noarch.rpm python38-inflection-0.5.1-2.el8pc.noarch.rpm python38-iniparse-0.4-34.el8pc.noarch.rpm python38-jinja2-3.0.2-1.el8pc.noarch.rpm python38-jsonschema-3.2.0-7.el8pc.noarch.rpm python38-markdown-3.3.4-4.el8pc.noarch.rpm python38-markuppy-1.14-2.el8pc.noarch.rpm python38-mccabe-0.6.1-2.el8pc.noarch.rpm python38-naya-1.1.1-1.el8pc.noarch.rpm python38-odfpy-1.4.1-5.el8pc.noarch.rpm python38-openpyxl-3.0.9-1.el8pc.noarch.rpm python38-packaging-21.2-1.el8pc.noarch.rpm python38-parsley-1.3-1.el8pc.noarch.rpm python38-pbr-5.6.0-1.el8pc.noarch.rpm python38-productmd-1.33-2.el8pc.noarch.rpm python38-prometheus-client-0.8.0-2.el8pc.noarch.rpm python38-pulp-ansible-0.10.1-1.el8pc.noarch.rpm python38-pulp-certguard-1.5.1-1.el8pc.noarch.rpm python38-pulp-cli-0.14.0-1.el8pc.noarch.rpm python38-pulp-container-2.9.2-1.el8pc.noarch.rpm python38-pulp-deb-2.16.1-1.el8pc.noarch.rpm python38-pulp-file-1.10.1-1.el8pc.noarch.rpm python38-pulp-rpm-3.17.5-1.1.el8pc.noarch.rpm python38-pulpcore-3.16.9-1.el8pc.noarch.rpm python38-pyOpenSSL-19.1.0-2.el8pc.noarch.rpm python38-pycodestyle-2.7.0-4.el8pc.noarch.rpm python38-pycparser-2.20-2.el8pc.noarch.rpm python38-pyflakes-2.3.1-4.el8pc.noarch.rpm python38-pygments-2.10.0-2.el8pc.noarch.rpm python38-pygtrie-2.4.2-2.el8pc.noarch.rpm python38-pyjwkest-1.4.2-5.el8pc.noarch.rpm python38-pyjwt-1.7.1-7.el8pc.noarch.rpm python38-pyparsing-2.4.7-2.el8pc.noarch.rpm python38-pytz-2021.3-1.el8pc.noarch.rpm python38-redis-3.5.3-2.el8pc.noarch.rpm python38-requests-2.26.0-3.el8pc.noarch.rpm python38-requirements-parser-0.2.0-2.el8pc.noarch.rpm python38-rich-10.12.0-1.el8pc.noarch.rpm python38-ruamel-yaml-0.17.17-1.el8pc.noarch.rpm python38-schema-0.7.5-1.el8pc.noarch.rpm python38-semantic-version-2.8.5-2.el8pc.noarch.rpm python38-six-1.16.0-1.el8pc.noarch.rpm python38-sqlparse-0.4.2-2.el8pc.noarch.rpm python38-tablib-3.1.0-1.el8pc.noarch.rpm python38-tenacity-7.0.0-2.el8pc.noarch.rpm python38-toml-0.10.2-2.el8pc.noarch.rpm python38-typing-extensions-3.10.0.2-1.el8pc.noarch.rpm python38-uritemplate-4.1.1-1.el8pc.noarch.rpm python38-url-normalize-1.4.3-3.el8pc.noarch.rpm python38-urllib3-1.26.7-1.el8pc.noarch.rpm python38-urlman-1.4.0-2.el8pc.noarch.rpm python38-wcmatch-8.3-1.el8pc.noarch.rpm python38-webencodings-0.5.1-2.el8pc.noarch.rpm python38-whitenoise-5.3.0-1.el8pc.noarch.rpm python38-xlrd-2.0.1-4.el8pc.noarch.rpm python38-xlwt-1.3.0-2.el8pc.noarch.rpm python38-zipp-3.4.0-3.el8pc.noarch.rpm qpid-dispatch-tools-1.14.0-6.el8.noarch.rpm qpid-tools-1.39.0-7.el8amq.noarch.rpm redhat-access-insights-puppet-1.0.1-1.el8sat.noarch.rpm rubygem-actioncable-6.0.4.7-1.el8sat.noarch.rpm rubygem-actionmailbox-6.0.4.7-1.el8sat.noarch.rpm rubygem-actionmailer-6.0.4.7-1.el8sat.noarch.rpm rubygem-actionpack-6.0.4.7-1.el8sat.noarch.rpm rubygem-actiontext-6.0.4.7-1.el8sat.noarch.rpm rubygem-actionview-6.0.4.7-1.el8sat.noarch.rpm rubygem-activejob-6.0.4.7-1.el8sat.noarch.rpm rubygem-activemodel-6.0.4.7-1.el8sat.noarch.rpm rubygem-activerecord-6.0.4.7-1.el8sat.noarch.rpm rubygem-activerecord-import-1.1.0-1.el8sat.noarch.rpm rubygem-activerecord-session_store-2.0.0-1.el8sat.noarch.rpm rubygem-activestorage-6.0.4.7-1.el8sat.noarch.rpm rubygem-activesupport-6.0.4.7-1.el8sat.noarch.rpm rubygem-acts_as_list-1.0.3-2.el8sat.noarch.rpm rubygem-addressable-2.8.0-1.el8sat.noarch.rpm rubygem-algebrick-0.7.3-8.el8sat.noarch.rpm rubygem-amazing_print-1.1.0-2.el8sat.noarch.rpm rubygem-ancestry-3.0.7-2.el8sat.noarch.rpm rubygem-anemone-0.7.2-23.el8sat.noarch.rpm rubygem-angular-rails-templates-1.1.0-2.el8sat.noarch.rpm rubygem-ansi-1.5.0-3.el8sat.noarch.rpm rubygem-apipie-bindings-0.4.0-2.el8sat.noarch.rpm rubygem-apipie-dsl-2.4.0-1.el8sat.noarch.rpm rubygem-apipie-params-0.0.5-5.1.el8sat.noarch.rpm rubygem-apipie-rails-0.5.17-4.el8sat.noarch.rpm rubygem-audited-4.9.0-4.el8sat.noarch.rpm rubygem-azure_mgmt_compute-0.22.0-1.el8sat.noarch.rpm rubygem-azure_mgmt_network-0.26.1-2.el8sat.noarch.rpm rubygem-azure_mgmt_resources-0.18.2-1.el8sat.noarch.rpm rubygem-azure_mgmt_storage-0.23.0-1.el8sat.noarch.rpm rubygem-azure_mgmt_subscriptions-0.18.5-1.el8sat.noarch.rpm rubygem-builder-3.2.4-2.el8sat.noarch.rpm rubygem-bundler_ext-0.4.1-6.el8sat.noarch.rpm rubygem-clamp-1.1.2-7.el8sat.noarch.rpm rubygem-coffee-rails-5.0.0-2.el8sat.noarch.rpm rubygem-coffee-script-2.4.1-5.el8sat.noarch.rpm rubygem-coffee-script-source-1.12.2-5.el8sat.noarch.rpm rubygem-colorize-0.8.1-2.el8sat.noarch.rpm rubygem-concurrent-ruby-1.1.6-3.el8sat.noarch.rpm rubygem-concurrent-ruby-edge-0.6.0-3.el8sat.noarch.rpm rubygem-connection_pool-2.2.2-3.el8sat.noarch.rpm rubygem-crass-1.0.6-2.el8sat.noarch.rpm rubygem-css_parser-1.4.7-5.el8sat.noarch.rpm rubygem-daemons-1.2.3-7.1.el8sat.noarch.rpm rubygem-deacon-1.0.0-5.el8sat.noarch.rpm rubygem-declarative-0.0.10-3.el8sat.noarch.rpm rubygem-declarative-option-0.1.0-3.el8sat.noarch.rpm rubygem-deep_cloneable-3.0.0-4.el8sat.noarch.rpm rubygem-deface-1.5.3-3.el8sat.noarch.rpm rubygem-diffy-3.0.1-6.1.el8sat.noarch.rpm rubygem-domain_name-0.5.20160310-5.el8sat.noarch.rpm rubygem-dynflow-1.6.4-1.el8sat.noarch.rpm rubygem-erubi-1.9.0-2.el8sat.noarch.rpm rubygem-excon-0.76.0-2.el8sat.noarch.rpm rubygem-execjs-2.7.0-5.el8sat.noarch.rpm rubygem-faraday-0.17.3-2.el8sat.noarch.rpm rubygem-faraday-cookie_jar-0.0.6-2.el8sat.noarch.rpm rubygem-faraday_middleware-0.13.1-3.el8sat.noarch.rpm rubygem-fast_gettext-1.4.1-5.el8sat.noarch.rpm rubygem-fog-aws-3.6.5-2.el8sat.noarch.rpm rubygem-fog-core-2.1.0-4.el8sat.noarch.rpm rubygem-fog-google-1.11.0-2.el8sat.noarch.rpm rubygem-fog-json-1.2.0-4.el8sat.noarch.rpm rubygem-fog-kubevirt-1.3.3-2.el8sat.noarch.rpm rubygem-fog-libvirt-0.9.0-1.el8sat.noarch.rpm rubygem-fog-openstack-1.0.8-4.el8sat.noarch.rpm rubygem-fog-ovirt-2.0.1-2.el8sat.noarch.rpm rubygem-fog-vsphere-3.5.1-1.el8sat.noarch.rpm rubygem-fog-xml-0.1.2-9.el8sat.noarch.rpm rubygem-foreman-tasks-5.2.3-1.el8sat.noarch.rpm rubygem-foreman_ansible-7.0.4.1-1.el8sat.noarch.rpm rubygem-foreman_azure_rm-2.2.6-1.el8sat.noarch.rpm rubygem-foreman_bootdisk-19.0.4.1-1.el8sat.noarch.rpm rubygem-foreman_discovery-19.0.4-1.el8sat.noarch.rpm rubygem-foreman_hooks-0.3.17-2.el8sat.noarch.rpm rubygem-foreman_kubevirt-0.1.9-2.el8sat.noarch.rpm rubygem-foreman_leapp-0.1.9-1.el8sat.noarch.rpm rubygem-foreman_maintain-1.0.12-1.el8sat.noarch.rpm rubygem-foreman_openscap-5.1.1-1.el8sat.noarch.rpm rubygem-foreman_puppet-2.0.6-1.el8sat.noarch.rpm rubygem-foreman_remote_execution-5.0.7-1.el8sat.noarch.rpm rubygem-foreman_remote_execution-cockpit-5.0.7-1.el8sat.noarch.rpm rubygem-foreman_rh_cloud-5.0.39-1.el8sat.noarch.rpm rubygem-foreman_scap_client-0.5.0-1.el8sat.noarch.rpm rubygem-foreman_templates-9.1.0-1.el8sat.noarch.rpm rubygem-foreman_theme_satellite-9.0.0.10-1.el8sat.noarch.rpm rubygem-foreman_virt_who_configure-0.5.8-1.el8sat.noarch.rpm rubygem-foreman_webhooks-2.0.1-1.1.el8sat.noarch.rpm rubygem-formatador-0.2.1-13.el8sat.noarch.rpm rubygem-friendly_id-5.3.0-2.el8sat.noarch.rpm rubygem-fx-0.5.0-2.el8sat.noarch.rpm rubygem-get_process_mem-0.2.7-2.1.el8sat.noarch.rpm rubygem-gettext_i18n_rails-1.8.0-3.el8sat.noarch.rpm rubygem-git-1.5.0-2.el8sat.noarch.rpm rubygem-gitlab-sidekiq-fetcher-0.6.0-2.el8sat.noarch.rpm rubygem-globalid-0.4.2-2.el8sat.noarch.rpm rubygem-google-api-client-0.33.2-2.el8sat.noarch.rpm rubygem-google-cloud-env-1.3.3-2.el8sat.noarch.rpm rubygem-googleauth-0.13.1-2.el8sat.noarch.rpm rubygem-graphql-1.8.14-3.el8sat.noarch.rpm rubygem-graphql-batch-0.3.10-3.el8sat.noarch.rpm rubygem-gssapi-1.2.0-8.el8sat.noarch.rpm rubygem-hammer_cli-3.1.0.1-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman-3.1.0.1-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_ansible-0.3.4-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el8sat.noarch.rpm rubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_kubevirt-0.1.5-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_leapp-0.1.1-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_openscap-0.1.13-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_puppet-0.0.5-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_tasks-0.0.17-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_templates-0.2.0-2.el8sat.noarch.rpm rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_webhooks-0.0.2-1.el8sat.noarch.rpm rubygem-hammer_cli_katello-1.3.1.6-1.el8sat.noarch.rpm rubygem-hashie-3.6.0-3.el8sat.noarch.rpm rubygem-highline-2.0.3-2.el8sat.noarch.rpm rubygem-hocon-1.3.1-2.el8sat.noarch.rpm rubygem-http-3.3.0-2.el8sat.noarch.rpm rubygem-http-cookie-1.0.2-5.1.el8sat.noarch.rpm rubygem-http-form_data-2.1.1-2.el8sat.noarch.rpm rubygem-httpclient-2.8.3-4.el8sat.noarch.rpm rubygem-i18n-1.8.2-2.el8sat.noarch.rpm rubygem-infoblox-3.0.0-4.el8sat.noarch.rpm rubygem-ipaddress-0.8.0-13.el8sat.noarch.rpm rubygem-jgrep-1.3.3-11.el8sat.noarch.rpm rubygem-journald-logger-2.0.4-3.el8sat.noarch.rpm rubygem-jwt-2.2.2-2.el8sat.noarch.rpm rubygem-kafo-6.4.0-1.el8sat.noarch.rpm rubygem-kafo_parsers-1.2.1-1.el8sat.noarch.rpm rubygem-kafo_wizards-0.0.2-2.el8sat.noarch.rpm rubygem-katello-4.3.0.42-1.el8sat.noarch.rpm rubygem-kubeclient-4.3.0-2.el8sat.noarch.rpm rubygem-ldap_fluff-0.6.0-1.el8sat.noarch.rpm rubygem-little-plugger-1.1.4-3.el8sat.noarch.rpm rubygem-locale-2.0.9-15.el8sat.noarch.rpm rubygem-logging-2.3.0-2.el8sat.noarch.rpm rubygem-logging-journald-2.0.0-3.el8sat.noarch.rpm rubygem-loofah-2.4.0-2.el8sat.noarch.rpm rubygem-mail-2.7.1-2.el8sat.noarch.rpm rubygem-marcel-1.0.1-1.el8sat.noarch.rpm rubygem-memoist-0.16.0-3.el8sat.noarch.rpm rubygem-method_source-0.9.2-3.el8sat.noarch.rpm rubygem-mime-types-3.3.1-2.el8sat.noarch.rpm rubygem-mime-types-data-3.2018.0812-5.el8sat.noarch.rpm rubygem-mini_mime-1.0.2-2.el8sat.noarch.rpm rubygem-mini_portile2-2.5.1-1.el8sat.noarch.rpm rubygem-mqtt-0.5.0-1.el8sat.noarch.rpm rubygem-ms_rest-0.7.6-1.el8sat.noarch.rpm rubygem-ms_rest_azure-0.12.0-1.el8sat.noarch.rpm rubygem-multi_json-1.14.1-3.el8sat.noarch.rpm rubygem-multipart-post-2.0.0-3.el8sat.noarch.rpm rubygem-mustermann-1.1.1-1.el8sat.noarch.rpm rubygem-net-ldap-0.17.0-2.el8sat.noarch.rpm rubygem-net-ping-2.0.1-5.el8sat.noarch.rpm rubygem-net-scp-1.2.1-5.el8sat.noarch.rpm rubygem-net-ssh-4.2.0-3.el8sat.noarch.rpm rubygem-net-ssh-krb-0.4.0-4.el8sat.noarch.rpm rubygem-net_http_unix-0.2.2-2.el8sat.noarch.rpm rubygem-netrc-0.11.0-6.el8sat.noarch.rpm rubygem-oauth-0.5.4-5.el8sat.noarch.rpm rubygem-openscap-0.4.9-7.el8sat.noarch.rpm rubygem-openscap_parser-1.0.2-2.el8sat.noarch.rpm rubygem-optimist-3.0.0-3.el8sat.noarch.rpm rubygem-os-1.0.0-3.el8sat.noarch.rpm rubygem-ovirt_provision_plugin-2.0.3-3.el8sat.noarch.rpm rubygem-parallel-1.19.1-2.el8sat.noarch.rpm rubygem-parse-cron-0.1.4-5.el8sat.noarch.rpm rubygem-polyglot-0.3.5-3.1.el8sat.noarch.rpm rubygem-powerbar-2.0.1-3.el8sat.noarch.rpm rubygem-prometheus-client-1.0.0-3.el8sat.noarch.rpm rubygem-promise.rb-0.7.4-3.el8sat.noarch.rpm rubygem-public_suffix-3.0.3-3.el8sat.noarch.rpm rubygem-pulp_ansible_client-0.10.1-1.el8sat.noarch.rpm rubygem-pulp_certguard_client-1.5.0-1.el8sat.noarch.rpm rubygem-pulp_container_client-2.9.0-1.el8sat.noarch.rpm rubygem-pulp_deb_client-2.16.0-1.el8sat.noarch.rpm rubygem-pulp_file_client-1.10.0-1.el8sat.noarch.rpm rubygem-pulp_ostree_client-2.0.0-0.1.a1.el8sat.noarch.rpm rubygem-pulp_python_client-3.5.2-1.el8sat.noarch.rpm rubygem-pulp_rpm_client-3.17.4-1.el8sat.noarch.rpm rubygem-pulpcore_client-3.16.7-1.el8sat.noarch.rpm rubygem-puma-status-1.3-1.el8sat.noarch.rpm rubygem-quantile-0.2.0-5.el8sat.noarch.rpm rubygem-rabl-0.14.3-2.el8sat.noarch.rpm rubygem-rack-2.2.3-2.el8sat.noarch.rpm rubygem-rack-cors-1.0.2-3.el8sat.noarch.rpm rubygem-rack-jsonp-1.3.1-10.el8sat.noarch.rpm rubygem-rack-protection-2.1.0-2.el8sat.noarch.rpm rubygem-rack-test-1.1.0-5.el8sat.noarch.rpm rubygem-rails-6.0.4.7-1.el8sat.noarch.rpm rubygem-rails-dom-testing-2.0.3-7.el8sat.noarch.rpm rubygem-rails-html-sanitizer-1.3.0-2.el8sat.noarch.rpm rubygem-rails-i18n-6.0.0-3.el8sat.noarch.rpm rubygem-railties-6.0.4.7-1.el8sat.noarch.rpm rubygem-rainbow-2.2.2-1.el8sat.noarch.rpm rubygem-rb-inotify-0.9.7-6.el8sat.noarch.rpm rubygem-rbnacl-4.0.2-2.el8sat.noarch.rpm rubygem-rbvmomi-2.2.0-4.el8sat.noarch.rpm rubygem-record_tag_helper-1.0.1-4.el8sat.noarch.rpm rubygem-recursive-open-struct-1.1.0-2.el8sat.noarch.rpm rubygem-redfish_client-0.5.2-2.el8sat.noarch.rpm rubygem-redis-4.5.1-1.el8sat.noarch.rpm rubygem-representable-3.0.4-3.el8sat.noarch.rpm rubygem-responders-3.0.0-4.el8sat.noarch.rpm rubygem-rest-client-2.0.2-4.el8sat.noarch.rpm rubygem-retriable-3.1.2-3.el8sat.noarch.rpm rubygem-roadie-3.4.0-4.el8sat.noarch.rpm rubygem-roadie-rails-2.1.1-3.el8sat.noarch.rpm rubygem-robotex-1.0.0-22.el8sat.noarch.rpm rubygem-rsec-0.4.3-5.el8sat.noarch.rpm rubygem-ruby2_keywords-0.0.4-1.el8sat.noarch.rpm rubygem-ruby2ruby-2.4.2-4.el8sat.noarch.rpm rubygem-ruby_parser-3.10.1-4.el8sat.noarch.rpm rubygem-rubyipmi-0.11.0-1.el8sat.noarch.rpm rubygem-runcible-2.13.1-2.el8sat.noarch.rpm rubygem-safemode-1.3.6-2.el8sat.noarch.rpm rubygem-scoped_search-4.1.9-2.el8sat.noarch.rpm rubygem-sd_notify-0.1.0-2.el8sat.noarch.rpm rubygem-secure_headers-6.3.0-3.el8sat.noarch.rpm rubygem-sequel-5.42.0-2.el8sat.noarch.rpm rubygem-server_sent_events-0.1.2-2.el8sat.noarch.rpm rubygem-sexp_processor-4.10.0-7.el8sat.noarch.rpm rubygem-sidekiq-5.2.10-1.el8sat.noarch.rpm rubygem-signet-0.14.0-2.el8sat.noarch.rpm rubygem-sinatra-2.1.0-3.el8sat.noarch.rpm rubygem-smart_proxy_ansible-3.3.1-2.el8sat.noarch.rpm rubygem-smart_proxy_container_gateway-1.0.6-1.el8sat.noarch.rpm rubygem-smart_proxy_dhcp_infoblox-0.0.16-6.el8sat.noarch.rpm rubygem-smart_proxy_dhcp_remote_isc-0.0.5-5.el8sat.noarch.rpm rubygem-smart_proxy_discovery-1.0.5-8.el8sat.noarch.rpm rubygem-smart_proxy_discovery_image-1.3.2-3.el8sat.noarch.rpm rubygem-smart_proxy_dns_infoblox-1.1.0-6.el8sat.noarch.rpm rubygem-smart_proxy_dynflow-0.6.3-1.el8sat.noarch.rpm rubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.noarch.rpm rubygem-smart_proxy_openscap-0.9.2-1.el8sat.noarch.rpm rubygem-smart_proxy_pulp-3.2.0-2.el8sat.noarch.rpm rubygem-smart_proxy_remote_execution_ssh-0.5.3-1.el8sat.noarch.rpm rubygem-smart_proxy_shellhooks-0.9.2-2.el8sat.noarch.rpm rubygem-sprockets-4.0.2-2.el8sat.noarch.rpm rubygem-sprockets-rails-3.2.1-7.el8sat.noarch.rpm rubygem-sshkey-1.9.0-5.el8sat.noarch.rpm rubygem-statsd-instrument-2.1.4-4.el8sat.noarch.rpm rubygem-stomp-1.4.9-2.el8sat.noarch.rpm rubygem-thor-1.0.1-3.el8sat.noarch.rpm rubygem-thread_safe-0.3.6-6.el8sat.noarch.rpm rubygem-tilt-2.0.8-5.el8sat.noarch.rpm rubygem-timeliness-0.3.10-2.el8sat.noarch.rpm rubygem-tzinfo-1.2.6-2.el8sat.noarch.rpm rubygem-uber-0.1.0-3.el8sat.noarch.rpm rubygem-unf-0.1.3-9.el8sat.noarch.rpm rubygem-unicode-display_width-1.7.0-2.el8sat.noarch.rpm rubygem-validates_lengths_from_database-0.5.0-8.el8sat.noarch.rpm rubygem-webpack-rails-0.9.8-6.1.el8sat.noarch.rpm rubygem-websocket-extensions-0.1.5-2.el8sat.noarch.rpm rubygem-will_paginate-3.1.7-4.el8sat.noarch.rpm rubygem-zeitwerk-2.2.2-2.el8sat.noarch.rpm satellite-6.11.0-2.el8sat.noarch.rpm satellite-cli-6.11.0-2.el8sat.noarch.rpm satellite-common-6.11.0-2.el8sat.noarch.rpm satellite-installer-6.11.0.7-1.el8sat.noarch.rpm satellite-maintain-0.0.1-1.el8sat.noarch.rpm x86_64: createrepo_c-0.20.0-1.el8pc.x86_64.rpm createrepo_c-debuginfo-0.20.0-1.el8pc.x86_64.rpm createrepo_c-debugsource-0.20.0-1.el8pc.x86_64.rpm createrepo_c-libs-0.20.0-1.el8pc.x86_64.rpm createrepo_c-libs-debuginfo-0.20.0-1.el8pc.x86_64.rpm dynflow-utils-1.6.3-1.el8sat.x86_64.rpm foreman-discovery-image-service-1.0.0-4.1.el8sat.x86_64.rpm foreman-discovery-image-service-tui-1.0.0-4.1.el8sat.x86_64.rpm libcomps-0.1.18-1.el8pc.x86_64.rpm libcomps-debuginfo-0.1.18-1.el8pc.x86_64.rpm libcomps-debugsource-0.1.18-1.el8pc.x86_64.rpm libdb-cxx-5.3.28-42.el8_4.x86_64.rpm libdb-cxx-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-debugsource-5.3.28-42.el8_4.x86_64.rpm libdb-java-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-sql-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-sql-devel-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-tcl-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-utils-debuginfo-5.3.28-42.el8_4.x86_64.rpm libsodium-1.0.17-3.el8sat.x86_64.rpm libsodium-debuginfo-1.0.17-3.el8sat.x86_64.rpm libsodium-debugsource-1.0.17-3.el8sat.x86_64.rpm libsolv-0.7.22-1.el8pc.x86_64.rpm libsolv-debuginfo-0.7.22-1.el8pc.x86_64.rpm libsolv-debugsource-0.7.22-1.el8pc.x86_64.rpm libsolv-demo-debuginfo-0.7.22-1.el8pc.x86_64.rpm libsolv-tools-debuginfo-0.7.22-1.el8pc.x86_64.rpm libwebsockets-2.4.2-2.el8.x86_64.rpm libwebsockets-debuginfo-2.4.2-2.el8.x86_64.rpm libwebsockets-debugsource-2.4.2-2.el8.x86_64.rpm libwebsockets-tests-debuginfo-2.4.2-2.el8.x86_64.rpm postgresql-evr-0.0.2-1.el8sat.x86_64.rpm pulpcore-selinux-1.3.0-1.el8pc.x86_64.rpm puppet-agent-7.12.1-1.el8sat.x86_64.rpm python-aiohttp-debugsource-3.8.1-2.el8pc.x86_64.rpm python-brotli-debugsource-1.0.9-1.el8pc.x86_64.rpm python-cchardet-debugsource-2.1.7-1.el8pc.x86_64.rpm python-cffi-debugsource-1.15.0-1.el8pc.x86_64.rpm python-cryptography-debugsource-3.1.1-1.el8pc.x86_64.rpm python-frozenlist-debugsource-1.3.0-1.el8pc.x86_64.rpm python-lxml-debugsource-4.7.1-1.el8pc.x86_64.rpm python-markupsafe-debuginfo-2.0.1-2.el8pc.x86_64.rpm python-markupsafe-debugsource-2.0.1-2.el8pc.x86_64.rpm python-multidict-debugsource-5.2.0-1.el8pc.x86_64.rpm python-psutil-debugsource-5.7.2-2.el8sat.x86_64.rpm python-psycopg2-debugsource-2.9.1-1.el8pc.x86_64.rpm python-pycairo-debugsource-1.20.1-2.el8pc.x86_64.rpm python-pycares-debugsource-4.1.2-3.el8pc.x86_64.rpm python-pycryptodomex-debugsource-3.11.0-1.el8pc.x86_64.rpm python-pygobject-debugsource-3.40.1-1.el8pc.x86_64.rpm python-pyrsistent-debugsource-0.18.0-1.el8pc.x86_64.rpm python-rhsm-debugsource-1.19.2-2.el8pc.x86_64.rpm python-ruamel-yaml-clib-debugsource-0.2.6-1.el8pc.x86_64.rpm python-yarl-debugsource-1.7.2-1.el8pc.x86_64.rpm python2-qpid-qmf-1.39.0-7.el8amq.x86_64.rpm python2-saslwrapper-0.22-6.el8sat.x86_64.rpm python2-saslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpm python3-createrepo_c-0.20.0-1.el8pc.x86_64.rpm python3-createrepo_c-debuginfo-0.20.0-1.el8pc.x86_64.rpm python3-libcomps-0.1.18-1.el8pc.x86_64.rpm python3-libcomps-debuginfo-0.1.18-1.el8pc.x86_64.rpm python3-markupsafe-debuginfo-2.0.1-2.el8pc.x86_64.rpm python3-psutil-5.7.2-2.el8sat.x86_64.rpm python3-psutil-debuginfo-5.7.2-2.el8sat.x86_64.rpm python3-qpid-proton-0.33.0-4.el8.x86_64.rpm python3-qpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpm python3-solv-0.7.22-1.el8pc.x86_64.rpm python3-solv-debuginfo-0.7.22-1.el8pc.x86_64.rpm python38-aiohttp-3.8.1-2.el8pc.x86_64.rpm python38-aiohttp-debuginfo-3.8.1-2.el8pc.x86_64.rpm python38-brotli-1.0.9-1.el8pc.x86_64.rpm python38-brotli-debuginfo-1.0.9-1.el8pc.x86_64.rpm python38-cchardet-2.1.7-1.el8pc.x86_64.rpm python38-cchardet-debuginfo-2.1.7-1.el8pc.x86_64.rpm python38-cffi-1.15.0-1.el8pc.x86_64.rpm python38-cffi-debuginfo-1.15.0-1.el8pc.x86_64.rpm python38-createrepo_c-0.20.0-1.el8pc.x86_64.rpm python38-createrepo_c-debuginfo-0.20.0-1.el8pc.x86_64.rpm python38-cryptography-3.1.1-1.el8pc.x86_64.rpm python38-cryptography-debuginfo-3.1.1-1.el8pc.x86_64.rpm python38-frozenlist-1.3.0-1.el8pc.x86_64.rpm python38-frozenlist-debuginfo-1.3.0-1.el8pc.x86_64.rpm python38-libcomps-0.1.18-1.el8pc.x86_64.rpm python38-libcomps-debuginfo-0.1.18-1.el8pc.x86_64.rpm python38-lxml-4.7.1-1.el8pc.x86_64.rpm python38-lxml-debuginfo-4.7.1-1.el8pc.x86_64.rpm python38-markupsafe-2.0.1-2.el8pc.x86_64.rpm python38-markupsafe-debuginfo-2.0.1-2.el8pc.x86_64.rpm python38-multidict-5.2.0-1.el8pc.x86_64.rpm python38-multidict-debuginfo-5.2.0-1.el8pc.x86_64.rpm python38-psycopg2-2.9.1-1.el8pc.x86_64.rpm python38-psycopg2-debuginfo-2.9.1-1.el8pc.x86_64.rpm python38-pycairo-1.20.1-2.el8pc.x86_64.rpm python38-pycairo-debuginfo-1.20.1-2.el8pc.x86_64.rpm python38-pycares-4.1.2-3.el8pc.x86_64.rpm python38-pycares-debuginfo-4.1.2-3.el8pc.x86_64.rpm python38-pycryptodomex-3.11.0-1.el8pc.x86_64.rpm python38-pycryptodomex-debuginfo-3.11.0-1.el8pc.x86_64.rpm python38-pygobject-3.40.1-1.el8pc.x86_64.rpm python38-pygobject-debuginfo-3.40.1-1.el8pc.x86_64.rpm python38-pyrsistent-0.18.0-1.el8pc.x86_64.rpm python38-pyrsistent-debuginfo-0.18.0-1.el8pc.x86_64.rpm python38-pyyaml-5.4.1-3.el8pc.x86_64.rpm python38-rhsm-1.19.2-2.el8pc.x86_64.rpm python38-rhsm-debuginfo-1.19.2-2.el8pc.x86_64.rpm python38-ruamel-yaml-clib-0.2.6-1.el8pc.x86_64.rpm python38-ruamel-yaml-clib-debuginfo-0.2.6-1.el8pc.x86_64.rpm python38-solv-0.7.22-1.el8pc.x86_64.rpm python38-solv-debuginfo-0.7.22-1.el8pc.x86_64.rpm python38-yarl-1.7.2-1.el8pc.x86_64.rpm python38-yarl-debuginfo-1.7.2-1.el8pc.x86_64.rpm qpid-cpp-client-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-client-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-client-devel-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-client-devel-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-client-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-debugsource-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-ha-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-linearstore-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-linearstore-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-dispatch-debugsource-1.14.0-6.el8.x86_64.rpm qpid-dispatch-router-1.14.0-6.el8.x86_64.rpm qpid-dispatch-router-debuginfo-1.14.0-6.el8.x86_64.rpm qpid-proton-c-0.33.0-4.el8.x86_64.rpm qpid-proton-c-debuginfo-0.33.0-4.el8.x86_64.rpm qpid-proton-cpp-debuginfo-0.33.0-4.el8.x86_64.rpm qpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpm qpid-proton-debugsource-0.33.0-4.el8.x86_64.rpm qpid-qmf-1.39.0-7.el8amq.x86_64.rpm qpid-qmf-debuginfo-1.39.0-7.el8amq.x86_64.rpm ruby-solv-debuginfo-0.7.22-1.el8pc.x86_64.rpm rubygem-bcrypt-3.1.12-4.1.el8sat.x86_64.rpm rubygem-bcrypt-debuginfo-3.1.12-4.1.el8sat.x86_64.rpm rubygem-bcrypt-debugsource-3.1.12-4.1.el8sat.x86_64.rpm rubygem-facter-4.0.51-2.el8sat.x86_64.rpm rubygem-ffi-1.12.2-2.1.el8sat.x86_64.rpm rubygem-ffi-debuginfo-1.12.2-2.1.el8sat.x86_64.rpm rubygem-ffi-debugsource-1.12.2-2.1.el8sat.x86_64.rpm rubygem-http_parser.rb-0.6.0-3.1.el8sat.x86_64.rpm rubygem-http_parser.rb-debuginfo-0.6.0-3.1.el8sat.x86_64.rpm rubygem-http_parser.rb-debugsource-0.6.0-3.1.el8sat.x86_64.rpm rubygem-journald-native-1.0.11-4.1.el8sat.x86_64.rpm rubygem-journald-native-debuginfo-1.0.11-4.1.el8sat.x86_64.rpm rubygem-journald-native-debugsource-1.0.11-4.1.el8sat.x86_64.rpm rubygem-msgpack-1.3.3-2.1.el8sat.x86_64.rpm rubygem-msgpack-debuginfo-1.3.3-2.1.el8sat.x86_64.rpm rubygem-msgpack-debugsource-1.3.3-2.1.el8sat.x86_64.rpm rubygem-newt-0.9.7-3.1.el8sat.x86_64.rpm rubygem-newt-debuginfo-0.9.7-3.1.el8sat.x86_64.rpm rubygem-newt-debugsource-0.9.7-3.1.el8sat.x86_64.rpm rubygem-nio4r-2.5.4-2.1.el8sat.x86_64.rpm rubygem-nio4r-debuginfo-2.5.4-2.1.el8sat.x86_64.rpm rubygem-nio4r-debugsource-2.5.4-2.1.el8sat.x86_64.rpm rubygem-nokogiri-1.11.3-2.el8sat.x86_64.rpm rubygem-nokogiri-debuginfo-1.11.3-2.el8sat.x86_64.rpm rubygem-nokogiri-debugsource-1.11.3-2.el8sat.x86_64.rpm rubygem-ovirt-engine-sdk-4.4.0-2.1.el8sat.x86_64.rpm rubygem-ovirt-engine-sdk-debuginfo-4.4.0-2.1.el8sat.x86_64.rpm rubygem-ovirt-engine-sdk-debugsource-4.4.0-2.1.el8sat.x86_64.rpm rubygem-puma-5.6.2-1.el8sat.x86_64.rpm rubygem-puma-debuginfo-5.6.2-1.el8sat.x86_64.rpm rubygem-puma-debugsource-5.6.2-1.el8sat.x86_64.rpm rubygem-qpid_proton-0.33.0-4.el8.x86_64.rpm rubygem-qpid_proton-0.33.0-5.el8sat.x86_64.rpm rubygem-qpid_proton-debuginfo-0.33.0-4.el8.x86_64.rpm rubygem-qpid_proton-debuginfo-0.33.0-5.el8sat.x86_64.rpm rubygem-qpid_proton-debugsource-0.33.0-5.el8sat.x86_64.rpm rubygem-rkerberos-0.1.5-20.1.el8sat.x86_64.rpm rubygem-rkerberos-debuginfo-0.1.5-20.1.el8sat.x86_64.rpm rubygem-rkerberos-debugsource-0.1.5-20.1.el8sat.x86_64.rpm rubygem-ruby-libvirt-0.7.1-2.1.el8sat.x86_64.rpm rubygem-ruby-libvirt-debuginfo-0.7.1-2.1.el8sat.x86_64.rpm rubygem-ruby-libvirt-debugsource-0.7.1-2.1.el8sat.x86_64.rpm rubygem-sqlite3-1.3.13-7.1.el8sat.x86_64.rpm rubygem-sqlite3-debuginfo-1.3.13-7.1.el8sat.x86_64.rpm rubygem-sqlite3-debugsource-1.3.13-7.1.el8sat.x86_64.rpm rubygem-unf_ext-0.0.7.2-4.1.el8sat.x86_64.rpm rubygem-unf_ext-debuginfo-0.0.7.2-4.1.el8sat.x86_64.rpm rubygem-unf_ext-debugsource-0.0.7.2-4.1.el8sat.x86_64.rpm rubygem-unicode-0.4.4.4-4.1.el8sat.x86_64.rpm rubygem-unicode-debuginfo-0.4.4.4-4.1.el8sat.x86_64.rpm rubygem-unicode-debugsource-0.4.4.4-4.1.el8sat.x86_64.rpm rubygem-websocket-driver-0.7.1-2.1.el8sat.x86_64.rpm rubygem-websocket-driver-debuginfo-0.7.1-2.1.el8sat.x86_64.rpm rubygem-websocket-driver-debugsource-0.7.1-2.1.el8sat.x86_64.rpm saslwrapper-0.22-6.el8sat.x86_64.rpm saslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpm saslwrapper-debugsource-0.22-6.el8sat.x86_64.rpm yggdrasil-worker-forwarder-0.0.1-1.el8sat.x86_64.rpm Red Hat Satellite 6.11 for RHEL 8: Source: ansible-collection-redhat-satellite-3.3.0-1.el8sat.src.rpm ansible-collection-redhat-satellite_operations-1.2.3-1.el8sat.src.rpm ansible-lint-5.0.8-3.el8pc.src.rpm ansible-runner-1.4.7-1.el8ar.src.rpm ansiblerole-foreman_scap_client-0.2.0-2.el8sat.src.rpm ansiblerole-insights-client-1.7.1-2.el8sat.src.rpm createrepo_c-0.20.0-1.el8pc.src.rpm dynflow-utils-1.6.3-1.el8sat.src.rpm foreman-3.1.1.21-2.el8sat.src.rpm foreman-bootloaders-redhat-202005201200-1.el8sat.src.rpm foreman-discovery-image-3.8.2-1.el8sat.src.rpm foreman-discovery-image-service-1.0.0-4.1.el8sat.src.rpm foreman-installer-3.1.2.6-1.el8sat.src.rpm foreman-proxy-3.1.1.1-1.el8sat.src.rpm foreman-selinux-3.1.2.1-1.el8sat.src.rpm katello-4.3.0-3.el8sat.src.rpm katello-certs-tools-2.9.0-1.el8sat.src.rpm katello-client-bootstrap-1.7.9-1.el8sat.src.rpm libcomps-0.1.18-1.el8pc.src.rpm libdb-5.3.28-42.el8_4.src.rpm libsodium-1.0.17-3.el8sat.src.rpm libsolv-0.7.22-1.el8pc.src.rpm libwebsockets-2.4.2-2.el8.src.rpm pulpcore-selinux-1.3.0-1.el8pc.src.rpm puppet-agent-7.12.1-1.el8sat.src.rpm puppet-agent-oauth-0.5.1-3.el8sat.src.rpm puppet-foreman_scap_client-0.4.0-1.el8sat.src.rpm puppetlabs-stdlib-5.2.0-1.el8sat.src.rpm puppetserver-7.4.2-1.el8sat.src.rpm python-aiodns-3.0.0-2.el8pc.src.rpm python-aiofiles-0.7.0-2.el8pc.src.rpm python-aiohttp-3.8.1-2.el8pc.src.rpm python-aiohttp-xmlrpc-1.5.0-1.el8pc.src.rpm python-aioredis-2.0.0-2.el8pc.src.rpm python-aiosignal-1.2.0-1.el8pc.src.rpm python-ansible-builder-1.0.1-2.el8pc.src.rpm python-asgiref-3.4.1-1.el8pc.src.rpm python-async-lru-1.0.2-2.el8pc.src.rpm python-async-timeout-4.0.2-1.el8pc.src.rpm python-asyncio-throttle-1.0.2-2.el8pc.src.rpm python-attrs-21.2.0-2.el8pc.src.rpm python-backoff-1.11.1-1.el8pc.src.rpm python-bindep-2.10.1-1.el8pc.src.rpm python-bleach-3.3.1-1.el8pc.src.rpm python-bleach-allowlist-1.0.3-2.el8pc.src.rpm python-bracex-2.2-1.el8pc.src.rpm python-brotli-1.0.9-1.el8pc.src.rpm python-cchardet-2.1.7-1.el8pc.src.rpm python-certifi-2020.6.20-2.el8pc.src.rpm python-cffi-1.15.0-1.el8pc.src.rpm python-charset-normalizer-2.0.7-1.el8pc.src.rpm python-click-8.0.3-1.el8pc.src.rpm python-click-shell-2.1-2.el8pc.src.rpm python-colorama-0.4.4-2.el8pc.src.rpm python-commonmark-0.9.1-4.el8pc.src.rpm python-contextlib2-21.6.0-2.el8pc.src.rpm python-cryptography-3.1.1-1.el8pc.src.rpm python-daemon-2.1.2-9.el8ar.src.rpm python-dataclasses-0.8-2.el8pc.src.rpm python-dateutil-2.8.2-1.el8pc.src.rpm python-debian-0.1.42-1.el8pc.src.rpm python-defusedxml-0.7.1-2.el8pc.src.rpm python-diff-match-patch-20200713-2.el8pc.src.rpm python-distro-1.6.0-2.el8pc.src.rpm python-django-3.2.13-1.el8pc.src.rpm python-django-currentuser-0.5.3-3.el8pc.src.rpm python-django-filter-21.1-1.el8pc.src.rpm python-django-guardian-2.4.0-3.el8pc.src.rpm python-django-guid-3.2.0-2.el8pc.src.rpm python-django-import-export-2.6.1-1.el8pc.src.rpm python-django-lifecycle-0.9.3-1.el8pc.src.rpm python-django-prometheus-2.1.0-2.el8pc.src.rpm python-django-readonly-field-1.0.5-3.el8pc.src.rpm python-djangorestframework-3.12.4-4.el8pc.src.rpm python-djangorestframework-queryfields-1.0.0-4.el8pc.src.rpm python-drf-access-policy-1.1.0-1.el8pc.src.rpm python-drf-nested-routers-0.93.3-3.el8pc.src.rpm python-drf-spectacular-0.20.1-1.el8pc.src.rpm python-dynaconf-3.1.7-2.el8pc.src.rpm python-ecdsa-0.13.3-3.el8pc.src.rpm python-enrich-1.2.6-3.el8pc.src.rpm python-et-xmlfile-1.1.0-1.el8pc.src.rpm python-flake8-3.9.2-3.el8pc.src.rpm python-frozenlist-1.3.0-1.el8pc.src.rpm python-future-0.18.2-4.el8pc.src.rpm python-galaxy-importer-0.4.1-2.el8pc.src.rpm python-gnupg-0.4.7-2.el8pc.src.rpm python-gunicorn-20.1.0-3.el8pc.src.rpm python-idna-3.3-1.el8pc.src.rpm python-idna-ssl-1.1.0-4.el8pc.src.rpm python-importlib-metadata-1.7.0-2.el8pc.src.rpm python-inflection-0.5.1-2.el8pc.src.rpm python-iniparse-0.4-34.el8pc.src.rpm python-jinja2-3.0.2-1.el8pc.src.rpm python-jsonschema-3.2.0-7.el8pc.src.rpm python-lockfile-0.11.0-8.el8ar.src.rpm python-lxml-4.7.1-1.el8pc.src.rpm python-markdown-3.3.4-4.el8pc.src.rpm python-markuppy-1.14-2.el8pc.src.rpm python-markupsafe-2.0.1-2.el8pc.src.rpm python-mccabe-0.6.1-2.el8pc.src.rpm python-multidict-5.2.0-1.el8pc.src.rpm python-naya-1.1.1-1.el8pc.src.rpm python-odfpy-1.4.1-5.el8pc.src.rpm python-openpyxl-3.0.9-1.el8pc.src.rpm python-packaging-21.2-1.el8pc.src.rpm python-parsley-1.3-1.el8pc.src.rpm python-pbr-5.6.0-1.el8pc.src.rpm python-pexpect-4.6-2.el8ar.src.rpm python-productmd-1.33-2.el8pc.src.rpm python-prometheus-client-0.8.0-2.el8pc.src.rpm python-psutil-5.7.2-2.el8sat.src.rpm python-psycopg2-2.9.1-1.el8pc.src.rpm python-pulp-ansible-0.10.1-1.el8pc.src.rpm python-pulp-certguard-1.5.1-1.el8pc.src.rpm python-pulp-cli-0.14.0-1.el8pc.src.rpm python-pulp-container-2.9.2-1.el8pc.src.rpm python-pulp-deb-2.16.1-1.el8pc.src.rpm python-pulp-file-1.10.1-1.el8pc.src.rpm python-pulp-rpm-3.17.5-1.1.el8pc.src.rpm python-pulpcore-3.16.9-1.el8pc.src.rpm python-pyOpenSSL-19.1.0-2.el8pc.src.rpm python-pycairo-1.20.1-2.el8pc.src.rpm python-pycares-4.1.2-3.el8pc.src.rpm python-pycodestyle-2.7.0-4.el8pc.src.rpm python-pycparser-2.20-2.el8pc.src.rpm python-pycryptodomex-3.11.0-1.el8pc.src.rpm python-pyflakes-2.3.1-4.el8pc.src.rpm python-pygments-2.10.0-2.el8pc.src.rpm python-pygobject-3.40.1-1.el8pc.src.rpm python-pygtrie-2.4.2-2.el8pc.src.rpm python-pyjwkest-1.4.2-5.el8pc.src.rpm python-pyjwt-1.7.1-7.el8pc.src.rpm python-pyparsing-2.4.7-2.el8pc.src.rpm python-pyrsistent-0.18.0-1.el8pc.src.rpm python-pytz-2021.3-1.el8pc.src.rpm python-pyyaml-5.4.1-3.el8pc.src.rpm python-qpid-1.37.0-1.el8.src.rpm python-redis-3.5.3-2.el8pc.src.rpm python-requests-2.26.0-3.el8pc.src.rpm python-requirements-parser-0.2.0-2.el8pc.src.rpm python-rhsm-1.19.2-2.el8pc.src.rpm python-rich-10.12.0-1.el8pc.src.rpm python-ruamel-yaml-0.17.17-1.el8pc.src.rpm python-ruamel-yaml-clib-0.2.6-1.el8pc.src.rpm python-schema-0.7.5-1.el8pc.src.rpm python-semantic-version-2.8.5-2.el8pc.src.rpm python-six-1.16.0-1.el8pc.src.rpm python-sqlparse-0.4.2-2.el8pc.src.rpm python-tablib-3.1.0-1.el8pc.src.rpm python-tenacity-7.0.0-2.el8pc.src.rpm python-toml-0.10.2-2.el8pc.src.rpm python-typing-extensions-3.10.0.2-1.el8pc.src.rpm python-uritemplate-4.1.1-1.el8pc.src.rpm python-url-normalize-1.4.3-3.el8pc.src.rpm python-urllib3-1.26.7-1.el8pc.src.rpm python-urlman-1.4.0-2.el8pc.src.rpm python-wcmatch-8.3-1.el8pc.src.rpm python-webencodings-0.5.1-2.el8pc.src.rpm python-whitenoise-5.3.0-1.el8pc.src.rpm python-xlrd-2.0.1-4.el8pc.src.rpm python-xlwt-1.3.0-2.el8pc.src.rpm python-yarl-1.7.2-1.el8pc.src.rpm python-zipp-3.4.0-3.el8pc.src.rpm qpid-cpp-1.39.0-7.el8amq.src.rpm qpid-dispatch-1.14.0-6.el8.src.rpm qpid-proton-0.33.0-4.el8.src.rpm redhat-access-insights-puppet-1.0.1-1.el8sat.src.rpm rubygem-algebrick-0.7.3-8.el8sat.src.rpm rubygem-ansi-1.5.0-3.el8sat.src.rpm rubygem-apipie-params-0.0.5-5.1.el8sat.src.rpm rubygem-bundler_ext-0.4.1-6.el8sat.src.rpm rubygem-clamp-1.1.2-7.el8sat.src.rpm rubygem-concurrent-ruby-1.1.6-3.el8sat.src.rpm rubygem-concurrent-ruby-edge-0.6.0-3.el8sat.src.rpm rubygem-domain_name-0.5.20160310-5.el8sat.src.rpm rubygem-dynflow-1.6.4-1.el8sat.src.rpm rubygem-excon-0.76.0-2.el8sat.src.rpm rubygem-faraday-0.17.3-2.el8sat.src.rpm rubygem-faraday_middleware-0.13.1-3.el8sat.src.rpm rubygem-fast_gettext-1.4.1-5.el8sat.src.rpm rubygem-ffi-1.12.2-2.1.el8sat.src.rpm rubygem-foreman_maintain-1.0.12-1.el8sat.src.rpm rubygem-gssapi-1.2.0-8.el8sat.src.rpm rubygem-hashie-3.6.0-3.el8sat.src.rpm rubygem-highline-2.0.3-2.el8sat.src.rpm rubygem-http-cookie-1.0.2-5.1.el8sat.src.rpm rubygem-infoblox-3.0.0-4.el8sat.src.rpm rubygem-journald-logger-2.0.4-3.el8sat.src.rpm rubygem-journald-native-1.0.11-4.1.el8sat.src.rpm rubygem-jwt-2.2.2-2.el8sat.src.rpm rubygem-kafo-6.4.0-1.el8sat.src.rpm rubygem-kafo_parsers-1.2.1-1.el8sat.src.rpm rubygem-kafo_wizards-0.0.2-2.el8sat.src.rpm rubygem-little-plugger-1.1.4-3.el8sat.src.rpm rubygem-logging-2.3.0-2.el8sat.src.rpm rubygem-logging-journald-2.0.0-3.el8sat.src.rpm rubygem-mime-types-3.3.1-2.el8sat.src.rpm rubygem-mime-types-data-3.2018.0812-5.el8sat.src.rpm rubygem-mini_portile2-2.5.1-1.el8sat.src.rpm rubygem-mqtt-0.5.0-1.el8sat.src.rpm rubygem-msgpack-1.3.3-2.1.el8sat.src.rpm rubygem-multi_json-1.14.1-3.el8sat.src.rpm rubygem-multipart-post-2.0.0-3.el8sat.src.rpm rubygem-mustermann-1.1.1-1.el8sat.src.rpm rubygem-net-ssh-4.2.0-3.el8sat.src.rpm rubygem-net-ssh-krb-0.4.0-4.el8sat.src.rpm rubygem-netrc-0.11.0-6.el8sat.src.rpm rubygem-newt-0.9.7-3.1.el8sat.src.rpm rubygem-nokogiri-1.11.3-2.el8sat.src.rpm rubygem-oauth-0.5.4-5.el8sat.src.rpm rubygem-openscap-0.4.9-7.el8sat.src.rpm rubygem-openscap_parser-1.0.2-2.el8sat.src.rpm rubygem-powerbar-2.0.1-3.el8sat.src.rpm rubygem-rack-2.2.3-2.el8sat.src.rpm rubygem-rack-protection-2.1.0-2.el8sat.src.rpm rubygem-rb-inotify-0.9.7-6.el8sat.src.rpm rubygem-rbnacl-4.0.2-2.el8sat.src.rpm rubygem-redfish_client-0.5.2-2.el8sat.src.rpm rubygem-rest-client-2.0.2-4.el8sat.src.rpm rubygem-rkerberos-0.1.5-20.1.el8sat.src.rpm rubygem-rsec-0.4.3-5.el8sat.src.rpm rubygem-ruby-libvirt-0.7.1-2.1.el8sat.src.rpm rubygem-ruby2_keywords-0.0.4-1.el8sat.src.rpm rubygem-rubyipmi-0.11.0-1.el8sat.src.rpm rubygem-sd_notify-0.1.0-2.el8sat.src.rpm rubygem-sequel-5.42.0-2.el8sat.src.rpm rubygem-server_sent_events-0.1.2-2.el8sat.src.rpm rubygem-sinatra-2.1.0-3.el8sat.src.rpm rubygem-smart_proxy_ansible-3.3.1-2.el8sat.src.rpm rubygem-smart_proxy_container_gateway-1.0.6-1.el8sat.src.rpm rubygem-smart_proxy_dhcp_infoblox-0.0.16-6.el8sat.src.rpm rubygem-smart_proxy_dhcp_remote_isc-0.0.5-5.el8sat.src.rpm rubygem-smart_proxy_discovery-1.0.5-8.el8sat.src.rpm rubygem-smart_proxy_discovery_image-1.3.2-3.el8sat.src.rpm rubygem-smart_proxy_dns_infoblox-1.1.0-6.el8sat.src.rpm rubygem-smart_proxy_dynflow-0.6.3-1.el8sat.src.rpm rubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.src.rpm rubygem-smart_proxy_openscap-0.9.2-1.el8sat.src.rpm rubygem-smart_proxy_pulp-3.2.0-2.el8sat.src.rpm rubygem-smart_proxy_remote_execution_ssh-0.5.3-1.el8sat.src.rpm rubygem-smart_proxy_shellhooks-0.9.2-2.el8sat.src.rpm rubygem-sqlite3-1.3.13-7.1.el8sat.src.rpm rubygem-statsd-instrument-2.1.4-4.el8sat.src.rpm rubygem-tilt-2.0.8-5.el8sat.src.rpm rubygem-unf-0.1.3-9.el8sat.src.rpm rubygem-unf_ext-0.0.7.2-4.1.el8sat.src.rpm saslwrapper-0.22-6.el8sat.src.rpm satellite-6.11.0-2.el8sat.src.rpm satellite-installer-6.11.0.7-1.el8sat.src.rpm satellite-maintain-0.0.1-1.el8sat.src.rpm noarch: ansible-collection-redhat-satellite-3.3.0-1.el8sat.noarch.rpm ansible-collection-redhat-satellite_operations-1.2.3-1.el8sat.noarch.rpm ansible-lint-5.0.8-3.el8pc.noarch.rpm ansible-runner-1.4.7-1.el8ar.noarch.rpm ansiblerole-foreman_scap_client-0.2.0-2.el8sat.noarch.rpm ansiblerole-insights-client-1.7.1-2.el8sat.noarch.rpm foreman-bootloaders-redhat-202005201200-1.el8sat.noarch.rpm foreman-bootloaders-redhat-tftpboot-202005201200-1.el8sat.noarch.rpm foreman-debug-3.1.1.21-2.el8sat.noarch.rpm foreman-discovery-image-3.8.2-1.el8sat.noarch.rpm foreman-installer-3.1.2.6-1.el8sat.noarch.rpm foreman-installer-katello-3.1.2.6-1.el8sat.noarch.rpm foreman-proxy-3.1.1.1-1.el8sat.noarch.rpm foreman-proxy-content-4.3.0-3.el8sat.noarch.rpm foreman-proxy-journald-3.1.1.1-1.el8sat.noarch.rpm foreman-proxy-selinux-3.1.2.1-1.el8sat.noarch.rpm katello-certs-tools-2.9.0-1.el8sat.noarch.rpm katello-client-bootstrap-1.7.9-1.el8sat.noarch.rpm katello-common-4.3.0-3.el8sat.noarch.rpm katello-debug-4.3.0-3.el8sat.noarch.rpm puppet-agent-oauth-0.5.1-3.el8sat.noarch.rpm puppet-foreman_scap_client-0.4.0-1.el8sat.noarch.rpm puppetlabs-stdlib-5.2.0-1.el8sat.noarch.rpm puppetserver-7.4.2-1.el8sat.noarch.rpm python2-qpid-1.37.0-1.el8.noarch.rpm python3-ansible-runner-1.4.7-1.el8ar.noarch.rpm python3-daemon-2.1.2-9.el8ar.noarch.rpm python3-lockfile-0.11.0-8.el8ar.noarch.rpm python3-pexpect-4.6-2.el8ar.noarch.rpm python38-aiodns-3.0.0-2.el8pc.noarch.rpm python38-aiofiles-0.7.0-2.el8pc.noarch.rpm python38-aiohttp-xmlrpc-1.5.0-1.el8pc.noarch.rpm python38-aioredis-2.0.0-2.el8pc.noarch.rpm python38-aiosignal-1.2.0-1.el8pc.noarch.rpm python38-ansible-builder-1.0.1-2.el8pc.noarch.rpm python38-asgiref-3.4.1-1.el8pc.noarch.rpm python38-async-lru-1.0.2-2.el8pc.noarch.rpm python38-async-timeout-4.0.2-1.el8pc.noarch.rpm python38-asyncio-throttle-1.0.2-2.el8pc.noarch.rpm python38-attrs-21.2.0-2.el8pc.noarch.rpm python38-backoff-1.11.1-1.el8pc.noarch.rpm python38-bindep-2.10.1-1.el8pc.noarch.rpm python38-bleach-3.3.1-1.el8pc.noarch.rpm python38-bleach-allowlist-1.0.3-2.el8pc.noarch.rpm python38-bracex-2.2-1.el8pc.noarch.rpm python38-certifi-2020.6.20-2.el8pc.noarch.rpm python38-charset-normalizer-2.0.7-1.el8pc.noarch.rpm python38-click-8.0.3-1.el8pc.noarch.rpm python38-click-shell-2.1-2.el8pc.noarch.rpm python38-colorama-0.4.4-2.el8pc.noarch.rpm python38-commonmark-0.9.1-4.el8pc.noarch.rpm python38-contextlib2-21.6.0-2.el8pc.noarch.rpm python38-dataclasses-0.8-2.el8pc.noarch.rpm python38-dateutil-2.8.2-1.el8pc.noarch.rpm python38-debian-0.1.42-1.el8pc.noarch.rpm python38-defusedxml-0.7.1-2.el8pc.noarch.rpm python38-diff-match-patch-20200713-2.el8pc.noarch.rpm python38-distro-1.6.0-2.el8pc.noarch.rpm python38-django-3.2.13-1.el8pc.noarch.rpm python38-django-currentuser-0.5.3-3.el8pc.noarch.rpm python38-django-filter-21.1-1.el8pc.noarch.rpm python38-django-guardian-2.4.0-3.el8pc.noarch.rpm python38-django-guid-3.2.0-2.el8pc.noarch.rpm python38-django-import-export-2.6.1-1.el8pc.noarch.rpm python38-django-lifecycle-0.9.3-1.el8pc.noarch.rpm python38-django-prometheus-2.1.0-2.el8pc.noarch.rpm python38-django-readonly-field-1.0.5-3.el8pc.noarch.rpm python38-djangorestframework-3.12.4-4.el8pc.noarch.rpm python38-djangorestframework-queryfields-1.0.0-4.el8pc.noarch.rpm python38-drf-access-policy-1.1.0-1.el8pc.noarch.rpm python38-drf-nested-routers-0.93.3-3.el8pc.noarch.rpm python38-drf-spectacular-0.20.1-1.el8pc.noarch.rpm python38-dynaconf-3.1.7-2.el8pc.noarch.rpm python38-ecdsa-0.13.3-3.el8pc.noarch.rpm python38-enrich-1.2.6-3.el8pc.noarch.rpm python38-et-xmlfile-1.1.0-1.el8pc.noarch.rpm python38-flake8-3.9.2-3.el8pc.noarch.rpm python38-future-0.18.2-4.el8pc.noarch.rpm python38-galaxy-importer-0.4.1-2.el8pc.noarch.rpm python38-gnupg-0.4.7-2.el8pc.noarch.rpm python38-gunicorn-20.1.0-3.el8pc.noarch.rpm python38-idna-3.3-1.el8pc.noarch.rpm python38-idna-ssl-1.1.0-4.el8pc.noarch.rpm python38-importlib-metadata-1.7.0-2.el8pc.noarch.rpm python38-inflection-0.5.1-2.el8pc.noarch.rpm python38-iniparse-0.4-34.el8pc.noarch.rpm python38-jinja2-3.0.2-1.el8pc.noarch.rpm python38-jsonschema-3.2.0-7.el8pc.noarch.rpm python38-markdown-3.3.4-4.el8pc.noarch.rpm python38-markuppy-1.14-2.el8pc.noarch.rpm python38-mccabe-0.6.1-2.el8pc.noarch.rpm python38-naya-1.1.1-1.el8pc.noarch.rpm python38-odfpy-1.4.1-5.el8pc.noarch.rpm python38-openpyxl-3.0.9-1.el8pc.noarch.rpm python38-packaging-21.2-1.el8pc.noarch.rpm python38-parsley-1.3-1.el8pc.noarch.rpm python38-pbr-5.6.0-1.el8pc.noarch.rpm python38-productmd-1.33-2.el8pc.noarch.rpm python38-prometheus-client-0.8.0-2.el8pc.noarch.rpm python38-pulp-ansible-0.10.1-1.el8pc.noarch.rpm python38-pulp-certguard-1.5.1-1.el8pc.noarch.rpm python38-pulp-cli-0.14.0-1.el8pc.noarch.rpm python38-pulp-container-2.9.2-1.el8pc.noarch.rpm python38-pulp-deb-2.16.1-1.el8pc.noarch.rpm python38-pulp-file-1.10.1-1.el8pc.noarch.rpm python38-pulp-rpm-3.17.5-1.1.el8pc.noarch.rpm python38-pulpcore-3.16.9-1.el8pc.noarch.rpm python38-pyOpenSSL-19.1.0-2.el8pc.noarch.rpm python38-pycodestyle-2.7.0-4.el8pc.noarch.rpm python38-pycparser-2.20-2.el8pc.noarch.rpm python38-pyflakes-2.3.1-4.el8pc.noarch.rpm python38-pygments-2.10.0-2.el8pc.noarch.rpm python38-pygtrie-2.4.2-2.el8pc.noarch.rpm python38-pyjwkest-1.4.2-5.el8pc.noarch.rpm python38-pyjwt-1.7.1-7.el8pc.noarch.rpm python38-pyparsing-2.4.7-2.el8pc.noarch.rpm python38-pytz-2021.3-1.el8pc.noarch.rpm python38-redis-3.5.3-2.el8pc.noarch.rpm python38-requests-2.26.0-3.el8pc.noarch.rpm python38-requirements-parser-0.2.0-2.el8pc.noarch.rpm python38-rich-10.12.0-1.el8pc.noarch.rpm python38-ruamel-yaml-0.17.17-1.el8pc.noarch.rpm python38-schema-0.7.5-1.el8pc.noarch.rpm python38-semantic-version-2.8.5-2.el8pc.noarch.rpm python38-six-1.16.0-1.el8pc.noarch.rpm python38-sqlparse-0.4.2-2.el8pc.noarch.rpm python38-tablib-3.1.0-1.el8pc.noarch.rpm python38-tenacity-7.0.0-2.el8pc.noarch.rpm python38-toml-0.10.2-2.el8pc.noarch.rpm python38-typing-extensions-3.10.0.2-1.el8pc.noarch.rpm python38-uritemplate-4.1.1-1.el8pc.noarch.rpm python38-url-normalize-1.4.3-3.el8pc.noarch.rpm python38-urllib3-1.26.7-1.el8pc.noarch.rpm python38-urlman-1.4.0-2.el8pc.noarch.rpm python38-wcmatch-8.3-1.el8pc.noarch.rpm python38-webencodings-0.5.1-2.el8pc.noarch.rpm python38-whitenoise-5.3.0-1.el8pc.noarch.rpm python38-xlrd-2.0.1-4.el8pc.noarch.rpm python38-xlwt-1.3.0-2.el8pc.noarch.rpm python38-zipp-3.4.0-3.el8pc.noarch.rpm qpid-tools-1.39.0-7.el8amq.noarch.rpm redhat-access-insights-puppet-1.0.1-1.el8sat.noarch.rpm rubygem-algebrick-0.7.3-8.el8sat.noarch.rpm rubygem-ansi-1.5.0-3.el8sat.noarch.rpm rubygem-apipie-params-0.0.5-5.1.el8sat.noarch.rpm rubygem-bundler_ext-0.4.1-6.el8sat.noarch.rpm rubygem-clamp-1.1.2-7.el8sat.noarch.rpm rubygem-concurrent-ruby-1.1.6-3.el8sat.noarch.rpm rubygem-concurrent-ruby-edge-0.6.0-3.el8sat.noarch.rpm rubygem-domain_name-0.5.20160310-5.el8sat.noarch.rpm rubygem-dynflow-1.6.4-1.el8sat.noarch.rpm rubygem-excon-0.76.0-2.el8sat.noarch.rpm rubygem-faraday-0.17.3-2.el8sat.noarch.rpm rubygem-faraday_middleware-0.13.1-3.el8sat.noarch.rpm rubygem-fast_gettext-1.4.1-5.el8sat.noarch.rpm rubygem-foreman_maintain-1.0.12-1.el8sat.noarch.rpm rubygem-gssapi-1.2.0-8.el8sat.noarch.rpm rubygem-hashie-3.6.0-3.el8sat.noarch.rpm rubygem-highline-2.0.3-2.el8sat.noarch.rpm rubygem-http-cookie-1.0.2-5.1.el8sat.noarch.rpm rubygem-infoblox-3.0.0-4.el8sat.noarch.rpm rubygem-journald-logger-2.0.4-3.el8sat.noarch.rpm rubygem-jwt-2.2.2-2.el8sat.noarch.rpm rubygem-kafo-6.4.0-1.el8sat.noarch.rpm rubygem-kafo_parsers-1.2.1-1.el8sat.noarch.rpm rubygem-kafo_wizards-0.0.2-2.el8sat.noarch.rpm rubygem-little-plugger-1.1.4-3.el8sat.noarch.rpm rubygem-logging-2.3.0-2.el8sat.noarch.rpm rubygem-logging-journald-2.0.0-3.el8sat.noarch.rpm rubygem-mime-types-3.3.1-2.el8sat.noarch.rpm rubygem-mime-types-data-3.2018.0812-5.el8sat.noarch.rpm rubygem-mini_portile2-2.5.1-1.el8sat.noarch.rpm rubygem-mqtt-0.5.0-1.el8sat.noarch.rpm rubygem-multi_json-1.14.1-3.el8sat.noarch.rpm rubygem-multipart-post-2.0.0-3.el8sat.noarch.rpm rubygem-mustermann-1.1.1-1.el8sat.noarch.rpm rubygem-net-ssh-4.2.0-3.el8sat.noarch.rpm rubygem-net-ssh-krb-0.4.0-4.el8sat.noarch.rpm rubygem-netrc-0.11.0-6.el8sat.noarch.rpm rubygem-oauth-0.5.4-5.el8sat.noarch.rpm rubygem-openscap-0.4.9-7.el8sat.noarch.rpm rubygem-openscap_parser-1.0.2-2.el8sat.noarch.rpm rubygem-powerbar-2.0.1-3.el8sat.noarch.rpm rubygem-rack-2.2.3-2.el8sat.noarch.rpm rubygem-rack-protection-2.1.0-2.el8sat.noarch.rpm rubygem-rb-inotify-0.9.7-6.el8sat.noarch.rpm rubygem-rbnacl-4.0.2-2.el8sat.noarch.rpm rubygem-redfish_client-0.5.2-2.el8sat.noarch.rpm rubygem-rest-client-2.0.2-4.el8sat.noarch.rpm rubygem-rsec-0.4.3-5.el8sat.noarch.rpm rubygem-ruby2_keywords-0.0.4-1.el8sat.noarch.rpm rubygem-rubyipmi-0.11.0-1.el8sat.noarch.rpm rubygem-sd_notify-0.1.0-2.el8sat.noarch.rpm rubygem-sequel-5.42.0-2.el8sat.noarch.rpm rubygem-server_sent_events-0.1.2-2.el8sat.noarch.rpm rubygem-sinatra-2.1.0-3.el8sat.noarch.rpm rubygem-smart_proxy_ansible-3.3.1-2.el8sat.noarch.rpm rubygem-smart_proxy_container_gateway-1.0.6-1.el8sat.noarch.rpm rubygem-smart_proxy_dhcp_infoblox-0.0.16-6.el8sat.noarch.rpm rubygem-smart_proxy_dhcp_remote_isc-0.0.5-5.el8sat.noarch.rpm rubygem-smart_proxy_discovery-1.0.5-8.el8sat.noarch.rpm rubygem-smart_proxy_discovery_image-1.3.2-3.el8sat.noarch.rpm rubygem-smart_proxy_dns_infoblox-1.1.0-6.el8sat.noarch.rpm rubygem-smart_proxy_dynflow-0.6.3-1.el8sat.noarch.rpm rubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.noarch.rpm rubygem-smart_proxy_openscap-0.9.2-1.el8sat.noarch.rpm rubygem-smart_proxy_pulp-3.2.0-2.el8sat.noarch.rpm rubygem-smart_proxy_remote_execution_ssh-0.5.3-1.el8sat.noarch.rpm rubygem-smart_proxy_shellhooks-0.9.2-2.el8sat.noarch.rpm rubygem-statsd-instrument-2.1.4-4.el8sat.noarch.rpm rubygem-tilt-2.0.8-5.el8sat.noarch.rpm rubygem-unf-0.1.3-9.el8sat.noarch.rpm satellite-capsule-6.11.0-2.el8sat.noarch.rpm satellite-common-6.11.0-2.el8sat.noarch.rpm satellite-installer-6.11.0.7-1.el8sat.noarch.rpm satellite-maintain-0.0.1-1.el8sat.noarch.rpm x86_64: createrepo_c-0.20.0-1.el8pc.x86_64.rpm createrepo_c-debuginfo-0.20.0-1.el8pc.x86_64.rpm createrepo_c-debugsource-0.20.0-1.el8pc.x86_64.rpm createrepo_c-libs-0.20.0-1.el8pc.x86_64.rpm createrepo_c-libs-debuginfo-0.20.0-1.el8pc.x86_64.rpm dynflow-utils-1.6.3-1.el8sat.x86_64.rpm foreman-discovery-image-service-1.0.0-4.1.el8sat.x86_64.rpm foreman-discovery-image-service-tui-1.0.0-4.1.el8sat.x86_64.rpm libcomps-0.1.18-1.el8pc.x86_64.rpm libcomps-debuginfo-0.1.18-1.el8pc.x86_64.rpm libcomps-debugsource-0.1.18-1.el8pc.x86_64.rpm libdb-cxx-5.3.28-42.el8_4.x86_64.rpm libdb-cxx-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-debugsource-5.3.28-42.el8_4.x86_64.rpm libdb-java-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-sql-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-sql-devel-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-tcl-debuginfo-5.3.28-42.el8_4.x86_64.rpm libdb-utils-debuginfo-5.3.28-42.el8_4.x86_64.rpm libsodium-1.0.17-3.el8sat.x86_64.rpm libsodium-debuginfo-1.0.17-3.el8sat.x86_64.rpm libsodium-debugsource-1.0.17-3.el8sat.x86_64.rpm libsolv-0.7.22-1.el8pc.x86_64.rpm libsolv-debuginfo-0.7.22-1.el8pc.x86_64.rpm libsolv-debugsource-0.7.22-1.el8pc.x86_64.rpm libsolv-demo-debuginfo-0.7.22-1.el8pc.x86_64.rpm libsolv-tools-debuginfo-0.7.22-1.el8pc.x86_64.rpm libwebsockets-2.4.2-2.el8.x86_64.rpm libwebsockets-debuginfo-2.4.2-2.el8.x86_64.rpm libwebsockets-debugsource-2.4.2-2.el8.x86_64.rpm libwebsockets-tests-debuginfo-2.4.2-2.el8.x86_64.rpm pulpcore-selinux-1.3.0-1.el8pc.x86_64.rpm puppet-agent-7.12.1-1.el8sat.x86_64.rpm python-aiohttp-debugsource-3.8.1-2.el8pc.x86_64.rpm python-brotli-debugsource-1.0.9-1.el8pc.x86_64.rpm python-cchardet-debugsource-2.1.7-1.el8pc.x86_64.rpm python-cffi-debugsource-1.15.0-1.el8pc.x86_64.rpm python-cryptography-debugsource-3.1.1-1.el8pc.x86_64.rpm python-frozenlist-debugsource-1.3.0-1.el8pc.x86_64.rpm python-lxml-debugsource-4.7.1-1.el8pc.x86_64.rpm python-markupsafe-debuginfo-2.0.1-2.el8pc.x86_64.rpm python-markupsafe-debugsource-2.0.1-2.el8pc.x86_64.rpm python-multidict-debugsource-5.2.0-1.el8pc.x86_64.rpm python-psutil-debugsource-5.7.2-2.el8sat.x86_64.rpm python-psycopg2-debugsource-2.9.1-1.el8pc.x86_64.rpm python-pycairo-debugsource-1.20.1-2.el8pc.x86_64.rpm python-pycares-debugsource-4.1.2-3.el8pc.x86_64.rpm python-pycryptodomex-debugsource-3.11.0-1.el8pc.x86_64.rpm python-pygobject-debugsource-3.40.1-1.el8pc.x86_64.rpm python-pyrsistent-debugsource-0.18.0-1.el8pc.x86_64.rpm python-rhsm-debugsource-1.19.2-2.el8pc.x86_64.rpm python-ruamel-yaml-clib-debugsource-0.2.6-1.el8pc.x86_64.rpm python-yarl-debugsource-1.7.2-1.el8pc.x86_64.rpm python2-qpid-qmf-1.39.0-7.el8amq.x86_64.rpm python2-saslwrapper-0.22-6.el8sat.x86_64.rpm python2-saslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpm python3-createrepo_c-0.20.0-1.el8pc.x86_64.rpm python3-createrepo_c-debuginfo-0.20.0-1.el8pc.x86_64.rpm python3-libcomps-0.1.18-1.el8pc.x86_64.rpm python3-libcomps-debuginfo-0.1.18-1.el8pc.x86_64.rpm python3-markupsafe-debuginfo-2.0.1-2.el8pc.x86_64.rpm python3-psutil-5.7.2-2.el8sat.x86_64.rpm python3-psutil-debuginfo-5.7.2-2.el8sat.x86_64.rpm python3-qpid-proton-0.33.0-4.el8.x86_64.rpm python3-qpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpm python3-solv-0.7.22-1.el8pc.x86_64.rpm python3-solv-debuginfo-0.7.22-1.el8pc.x86_64.rpm python38-aiohttp-3.8.1-2.el8pc.x86_64.rpm python38-aiohttp-debuginfo-3.8.1-2.el8pc.x86_64.rpm python38-brotli-1.0.9-1.el8pc.x86_64.rpm python38-brotli-debuginfo-1.0.9-1.el8pc.x86_64.rpm python38-cchardet-2.1.7-1.el8pc.x86_64.rpm python38-cchardet-debuginfo-2.1.7-1.el8pc.x86_64.rpm python38-cffi-1.15.0-1.el8pc.x86_64.rpm python38-cffi-debuginfo-1.15.0-1.el8pc.x86_64.rpm python38-createrepo_c-0.20.0-1.el8pc.x86_64.rpm python38-createrepo_c-debuginfo-0.20.0-1.el8pc.x86_64.rpm python38-cryptography-3.1.1-1.el8pc.x86_64.rpm python38-cryptography-debuginfo-3.1.1-1.el8pc.x86_64.rpm python38-frozenlist-1.3.0-1.el8pc.x86_64.rpm python38-frozenlist-debuginfo-1.3.0-1.el8pc.x86_64.rpm python38-libcomps-0.1.18-1.el8pc.x86_64.rpm python38-libcomps-debuginfo-0.1.18-1.el8pc.x86_64.rpm python38-lxml-4.7.1-1.el8pc.x86_64.rpm python38-lxml-debuginfo-4.7.1-1.el8pc.x86_64.rpm python38-markupsafe-2.0.1-2.el8pc.x86_64.rpm python38-markupsafe-debuginfo-2.0.1-2.el8pc.x86_64.rpm python38-multidict-5.2.0-1.el8pc.x86_64.rpm python38-multidict-debuginfo-5.2.0-1.el8pc.x86_64.rpm python38-psycopg2-2.9.1-1.el8pc.x86_64.rpm python38-psycopg2-debuginfo-2.9.1-1.el8pc.x86_64.rpm python38-pycairo-1.20.1-2.el8pc.x86_64.rpm python38-pycairo-debuginfo-1.20.1-2.el8pc.x86_64.rpm python38-pycares-4.1.2-3.el8pc.x86_64.rpm python38-pycares-debuginfo-4.1.2-3.el8pc.x86_64.rpm python38-pycryptodomex-3.11.0-1.el8pc.x86_64.rpm python38-pycryptodomex-debuginfo-3.11.0-1.el8pc.x86_64.rpm python38-pygobject-3.40.1-1.el8pc.x86_64.rpm python38-pygobject-debuginfo-3.40.1-1.el8pc.x86_64.rpm python38-pyrsistent-0.18.0-1.el8pc.x86_64.rpm python38-pyrsistent-debuginfo-0.18.0-1.el8pc.x86_64.rpm python38-pyyaml-5.4.1-3.el8pc.x86_64.rpm python38-rhsm-1.19.2-2.el8pc.x86_64.rpm python38-rhsm-debuginfo-1.19.2-2.el8pc.x86_64.rpm python38-ruamel-yaml-clib-0.2.6-1.el8pc.x86_64.rpm python38-ruamel-yaml-clib-debuginfo-0.2.6-1.el8pc.x86_64.rpm python38-solv-0.7.22-1.el8pc.x86_64.rpm python38-solv-debuginfo-0.7.22-1.el8pc.x86_64.rpm python38-yarl-1.7.2-1.el8pc.x86_64.rpm python38-yarl-debuginfo-1.7.2-1.el8pc.x86_64.rpm qpid-cpp-client-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-client-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-client-devel-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-client-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-debugsource-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-ha-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-linearstore-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-linearstore-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-cpp-server-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpm qpid-dispatch-debugsource-1.14.0-6.el8.x86_64.rpm qpid-dispatch-router-1.14.0-6.el8.x86_64.rpm qpid-dispatch-router-debuginfo-1.14.0-6.el8.x86_64.rpm qpid-proton-c-0.33.0-4.el8.x86_64.rpm qpid-proton-c-debuginfo-0.33.0-4.el8.x86_64.rpm qpid-proton-cpp-debuginfo-0.33.0-4.el8.x86_64.rpm qpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpm qpid-proton-debugsource-0.33.0-4.el8.x86_64.rpm qpid-qmf-1.39.0-7.el8amq.x86_64.rpm qpid-qmf-debuginfo-1.39.0-7.el8amq.x86_64.rpm ruby-solv-debuginfo-0.7.22-1.el8pc.x86_64.rpm rubygem-ffi-1.12.2-2.1.el8sat.x86_64.rpm rubygem-ffi-debuginfo-1.12.2-2.1.el8sat.x86_64.rpm rubygem-ffi-debugsource-1.12.2-2.1.el8sat.x86_64.rpm rubygem-journald-native-1.0.11-4.1.el8sat.x86_64.rpm rubygem-journald-native-debuginfo-1.0.11-4.1.el8sat.x86_64.rpm rubygem-journald-native-debugsource-1.0.11-4.1.el8sat.x86_64.rpm rubygem-msgpack-1.3.3-2.1.el8sat.x86_64.rpm rubygem-msgpack-debuginfo-1.3.3-2.1.el8sat.x86_64.rpm rubygem-msgpack-debugsource-1.3.3-2.1.el8sat.x86_64.rpm rubygem-newt-0.9.7-3.1.el8sat.x86_64.rpm rubygem-newt-debuginfo-0.9.7-3.1.el8sat.x86_64.rpm rubygem-newt-debugsource-0.9.7-3.1.el8sat.x86_64.rpm rubygem-nokogiri-1.11.3-2.el8sat.x86_64.rpm rubygem-nokogiri-debuginfo-1.11.3-2.el8sat.x86_64.rpm rubygem-nokogiri-debugsource-1.11.3-2.el8sat.x86_64.rpm rubygem-qpid_proton-debuginfo-0.33.0-4.el8.x86_64.rpm rubygem-rkerberos-0.1.5-20.1.el8sat.x86_64.rpm rubygem-rkerberos-debuginfo-0.1.5-20.1.el8sat.x86_64.rpm rubygem-rkerberos-debugsource-0.1.5-20.1.el8sat.x86_64.rpm rubygem-ruby-libvirt-0.7.1-2.1.el8sat.x86_64.rpm rubygem-ruby-libvirt-debuginfo-0.7.1-2.1.el8sat.x86_64.rpm rubygem-ruby-libvirt-debugsource-0.7.1-2.1.el8sat.x86_64.rpm rubygem-sqlite3-1.3.13-7.1.el8sat.x86_64.rpm rubygem-sqlite3-debuginfo-1.3.13-7.1.el8sat.x86_64.rpm rubygem-sqlite3-debugsource-1.3.13-7.1.el8sat.x86_64.rpm rubygem-unf_ext-0.0.7.2-4.1.el8sat.x86_64.rpm rubygem-unf_ext-debuginfo-0.0.7.2-4.1.el8sat.x86_64.rpm rubygem-unf_ext-debugsource-0.0.7.2-4.1.el8sat.x86_64.rpm saslwrapper-0.22-6.el8sat.x86_64.rpm saslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpm saslwrapper-debugsource-0.22-6.el8sat.x86_64.rpm Red Hat Satellite 6.11 for RHEL 8: Source: rubygem-clamp-1.1.2-7.el8sat.src.rpm rubygem-foreman_maintain-1.0.12-1.el8sat.src.rpm rubygem-highline-2.0.3-2.el8sat.src.rpm satellite-clone-3.1.0-2.el8sat.src.rpm satellite-maintain-0.0.1-1.el8sat.src.rpm noarch: rubygem-clamp-1.1.2-7.el8sat.noarch.rpm rubygem-foreman_maintain-1.0.12-1.el8sat.noarch.rpm rubygem-highline-2.0.3-2.el8sat.noarch.rpm satellite-clone-3.1.0-2.el8sat.noarch.rpm satellite-maintain-0.0.1-1.el8sat.noarch.rpm Red Hat Satellite 6.11 for RHEL 8: Source: foreman-3.1.1.21-2.el8sat.src.rpm rubygem-amazing_print-1.1.0-2.el8sat.src.rpm rubygem-apipie-bindings-0.4.0-2.el8sat.src.rpm rubygem-clamp-1.1.2-7.el8sat.src.rpm rubygem-domain_name-0.5.20160310-5.el8sat.src.rpm rubygem-fast_gettext-1.4.1-5.el8sat.src.rpm rubygem-hammer_cli-3.1.0.1-1.el8sat.src.rpm rubygem-hammer_cli_foreman-3.1.0.1-1.el8sat.src.rpm rubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.src.rpm rubygem-hammer_cli_foreman_ansible-0.3.4-1.el8sat.src.rpm rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.src.rpm rubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el8sat.src.rpm rubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.src.rpm rubygem-hammer_cli_foreman_openscap-0.1.13-1.el8sat.src.rpm rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.src.rpm rubygem-hammer_cli_foreman_tasks-0.0.17-1.el8sat.src.rpm rubygem-hammer_cli_foreman_templates-0.2.0-2.el8sat.src.rpm rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el8sat.src.rpm rubygem-hammer_cli_foreman_webhooks-0.0.2-1.el8sat.src.rpm rubygem-hammer_cli_katello-1.3.1.6-1.el8sat.src.rpm rubygem-hashie-3.6.0-3.el8sat.src.rpm rubygem-highline-2.0.3-2.el8sat.src.rpm rubygem-http-cookie-1.0.2-5.1.el8sat.src.rpm rubygem-jwt-2.2.2-2.el8sat.src.rpm rubygem-little-plugger-1.1.4-3.el8sat.src.rpm rubygem-locale-2.0.9-15.el8sat.src.rpm rubygem-logging-2.3.0-2.el8sat.src.rpm rubygem-mime-types-3.3.1-2.el8sat.src.rpm rubygem-mime-types-data-3.2018.0812-5.el8sat.src.rpm rubygem-multi_json-1.14.1-3.el8sat.src.rpm rubygem-netrc-0.11.0-6.el8sat.src.rpm rubygem-oauth-0.5.4-5.el8sat.src.rpm rubygem-powerbar-2.0.1-3.el8sat.src.rpm rubygem-rest-client-2.0.2-4.el8sat.src.rpm rubygem-unf-0.1.3-9.el8sat.src.rpm rubygem-unf_ext-0.0.7.2-4.1.el8sat.src.rpm rubygem-unicode-0.4.4.4-4.1.el8sat.src.rpm rubygem-unicode-display_width-1.7.0-2.el8sat.src.rpm satellite-6.11.0-2.el8sat.src.rpm noarch: foreman-cli-3.1.1.21-2.el8sat.noarch.rpm rubygem-amazing_print-1.1.0-2.el8sat.noarch.rpm rubygem-apipie-bindings-0.4.0-2.el8sat.noarch.rpm rubygem-clamp-1.1.2-7.el8sat.noarch.rpm rubygem-domain_name-0.5.20160310-5.el8sat.noarch.rpm rubygem-fast_gettext-1.4.1-5.el8sat.noarch.rpm rubygem-hammer_cli-3.1.0.1-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman-3.1.0.1-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_ansible-0.3.4-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el8sat.noarch.rpm rubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_openscap-0.1.13-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_tasks-0.0.17-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_templates-0.2.0-2.el8sat.noarch.rpm rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_webhooks-0.0.2-1.el8sat.noarch.rpm rubygem-hammer_cli_katello-1.3.1.6-1.el8sat.noarch.rpm rubygem-hashie-3.6.0-3.el8sat.noarch.rpm rubygem-highline-2.0.3-2.el8sat.noarch.rpm rubygem-http-cookie-1.0.2-5.1.el8sat.noarch.rpm rubygem-jwt-2.2.2-2.el8sat.noarch.rpm rubygem-little-plugger-1.1.4-3.el8sat.noarch.rpm rubygem-locale-2.0.9-15.el8sat.noarch.rpm rubygem-logging-2.3.0-2.el8sat.noarch.rpm rubygem-mime-types-3.3.1-2.el8sat.noarch.rpm rubygem-mime-types-data-3.2018.0812-5.el8sat.noarch.rpm rubygem-multi_json-1.14.1-3.el8sat.noarch.rpm rubygem-netrc-0.11.0-6.el8sat.noarch.rpm rubygem-oauth-0.5.4-5.el8sat.noarch.rpm rubygem-powerbar-2.0.1-3.el8sat.noarch.rpm rubygem-rest-client-2.0.2-4.el8sat.noarch.rpm rubygem-unf-0.1.3-9.el8sat.noarch.rpm rubygem-unicode-display_width-1.7.0-2.el8sat.noarch.rpm satellite-cli-6.11.0-2.el8sat.noarch.rpm x86_64: rubygem-unf_ext-0.0.7.2-4.1.el8sat.x86_64.rpm rubygem-unf_ext-debuginfo-0.0.7.2-4.1.el8sat.x86_64.rpm rubygem-unf_ext-debugsource-0.0.7.2-4.1.el8sat.x86_64.rpm rubygem-unicode-0.4.4.4-4.1.el8sat.x86_64.rpm rubygem-unicode-debuginfo-0.4.4.4-4.1.el8sat.x86_64.rpm rubygem-unicode-debugsource-0.4.4.4-4.1.el8sat.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-3200 https://access.redhat.com/security/cve/CVE-2021-3584 https://access.redhat.com/security/cve/CVE-2021-4142 https://access.redhat.com/security/cve/CVE-2021-21290 https://access.redhat.com/security/cve/CVE-2021-21295 https://access.redhat.com/security/cve/CVE-2021-21409 https://access.redhat.com/security/cve/CVE-2021-30151 https://access.redhat.com/security/cve/CVE-2021-32839 https://access.redhat.com/security/cve/CVE-2021-33928 https://access.redhat.com/security/cve/CVE-2021-33929 https://access.redhat.com/security/cve/CVE-2021-33930 https://access.redhat.com/security/cve/CVE-2021-33938 https://access.redhat.com/security/cve/CVE-2021-41136 https://access.redhat.com/security/cve/CVE-2021-42550 https://access.redhat.com/security/cve/CVE-2021-43797 https://access.redhat.com/security/cve/CVE-2021-43818 https://access.redhat.com/security/cve/CVE-2021-44420 https://access.redhat.com/security/cve/CVE-2021-44568 https://access.redhat.com/security/cve/CVE-2021-45115 https://access.redhat.com/security/cve/CVE-2021-45116 https://access.redhat.com/security/cve/CVE-2021-45452 https://access.redhat.com/security/cve/CVE-2022-22818 https://access.redhat.com/security/cve/CVE-2022-23633 https://access.redhat.com/security/cve/CVE-2022-23634 https://access.redhat.com/security/cve/CVE-2022-23833 https://access.redhat.com/security/cve/CVE-2022-23837 https://access.redhat.com/security/cve/CVE-2022-28346 https://access.redhat.com/security/cve/CVE-2022-28347 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_satellite/6.11/html/release_notes 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYsSEj9zjgjWX9erEAQj1NhAAh9dwyCl+/LFkekteujgg+I646SZTWNua 7x7JKiF+ptoaQB3ZcbKHAwuLMK5LNzTnsq+Y+ZuhPh1EkDKlZ1LkiONw/kTgMHLB EEq+lqiI3Lr31NWValfQiIatXbLQIyD7ZCk9dxxkJtTGGJw+CL7W4f2naYAsei+4 iYghK8DG5C33U5K/1NpXetfQMpRihferXV15Cx/bxGMcRP+ryD9vxxq4PDMWa1UH zTco1EAzP3UZxpD/AqCwNmBoG4r8gxSJml6CJatiicUQ1SrTdSMj2x8jYJ8pCWXR 2ceGJVse2rBC0cunqV3tX/NL9xu8L8Vq4lyYDzJNhoSElQ6Lb/lpu1HpQpoqqmAf UBA7f80opj1o80U/M/WTQaQ9dYFDua7WlzzeuP026Pohsy/M1lZicmXMCDGJZaT1 E4ivToILRGYfhZcVBrhFgWiPUQRmFvhxpGY0cStlmpMAruGeE9saXr1LyAbQrlty fnm4z+pRiLowgJPPTmusYPicL0p1DwU9XMxDSTW11/zp9PK5dErL+mIYofbvrOpk MhTKGBJ7yOgrmKTBUNIyNupeLuFM5MUBcw+nnTyjUHPh1Vaygq//WbUD+2IZileV 0tRbFgVrt8mCk031+OVCbsUyGPO/D9+ambl7xieynjuIOHyLC+H3PH9QghCzZAUS aMoVmOr2Umo=+ioi -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-6682-1 March 07, 2024 puma vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS (Available with Ubuntu Pro) - Ubuntu 20.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in Puma. Software Description: - puma: threaded HTTP 1.1 server for Ruby/Rack applications Details: ZeddYu Lu discovered that Puma incorrectly handled parsing certain headers. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-11076) It was discovered that Puma incorrectly handled parsing certain headers. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-11077) Jean Boussier discovered that Puma might not always release resources properly after handling HTTP requests. A remote attacker could possibly use this issue to read sensitive information. (CVE-2022-23634) It was discovered that Puma incorrectly handled certain malformed headers. A remote attacker could use this issue to perform an HTTP Request Smuggling attack. (CVE-2022-24790) Ben Kallus discovered that Puma incorrectly handled parsing certain headers. A remote attacker could use this issue to perform an HTTP Request Smuggling attack. (CVE-2023-40175) Bartek Nowotarski discovered that Puma incorrectly handled parsing certain encoded content. A remote attacker could possibly use this to cause a denial of service. (CVE-2024-21647) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS (Available with Ubuntu Pro): puma 5.5.2-2ubuntu2+esm1 Ubuntu 20.04 LTS (Available with Ubuntu Pro): puma 3.12.4-1ubuntu2+esm1 In general, a standard system update will make all the necessary changes
VAR-202202-0171 CVE-2022-24112 Apache APISIX  Spoofing authentication evasion vulnerability in

Related entries in the VARIoT exploits database: VAR-E-202203-0014
CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed. Apache APISIX Exists in spoofing authentication evasion vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Apache Apisix is a cloud-native microservice API gateway service of the Apache Foundation. The software is implemented based on OpenResty and etcd, with dynamic routing and plug-in hot loading, suitable for API management under the microservice system. The vulnerability stems from the fact that the batch-requests plugin of the product does not effectively limit the user's batch requests
VAR-202202-1142 CVE-2021-40392 Moxa MXView  Vulnerability in plaintext transmission of important information in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. Network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to exploit this vulnerability. MOXA Moxa MXView is a software dedicated to network management developed by Taiwan Moxa (MOXA). This software can be used to configure and process all devices in the network
VAR-202202-1149 CVE-2020-26728 Tenda AC9  Vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability was discovered in Tenda AC9 v3.0 V15.03.06.42_multi and Tenda AC9 V1.0 V15.03.05.19(6318)_CN which allows for remote code execution via shell metacharacters in the guestuser field to the __fastcall function with a POST request. Tenda AC9 Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda AC9 is a wireless router from the Chinese company Tenda. No detailed vulnerability details are currently provided
VAR-202202-1806 CVE-2022-23425 Android  Input verification vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Improper input validation in Exynos baseband prior to SMR Feb-2022 Release 1 allows attackers to send arbitrary NAS signaling messages with fake base station. Android There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Exynos is a SoC developed and produced by Samsung Mobile and a processor based on Arm architecture for Samsung mobile devices. Baseband is a circuit in a mobile phone that is responsible for demodulating, descrambling, despreading and decoding wireless signals in mobile networks, and passing the final decoded digital signal to the upper-layer processing system for processing
VAR-202202-1150 CVE-2022-24927 Samsung Video Player  Vulnerability in privilege management in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Improper privilege management vulnerability in Samsung Video Player prior to version 7.3.15.30 allows attackers to execute video files without permission. (DoS) It may be in a state. Samsung Video Player is a built-in system video player application optimized for the Samsung Galaxy series by Samsung, South Korea
VAR-202202-0237 CVE-2022-24353 TP-LINK Technologies  of  AC 1750  Out-of-bounds read vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AC1750 1.1.4 Build 20211022 rel.59103(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB.ko module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the root user. Was ZDI-CAN-15769. TP-LINK Technologies of AC 1750 An out-of-bounds read vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202202-0392 CVE-2022-24355 TP-LINK Technologies  of  TL-WR940N  Out-of-bounds write vulnerability in firmware CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR940N 3.20.1 Build 200316 Rel.34392n (5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of file name extensions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13910. TP-LINK Technologies of TL-WR940N An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tp-link TP-Link TL-WR940N is a wireless router from China Tp-link company
VAR-202202-1288 CVE-2022-20738 Cisco Umbrella Secure Web Gateway  Vulnerability in CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in the Cisco Umbrella Secure Web Gateway service could allow an unauthenticated, remote attacker to bypass the file inspection feature. This vulnerability is due to insufficient restrictions in the file inspection feature. An attacker could exploit this vulnerability by downloading a crafted payload through specific methods. A successful exploit could allow the attacker to bypass file inspection protections and download a malicious payload. (DoS) It may be in a state. Cisco Umbrella is a cloud security platform of Cisco (Cisco). The platform protects against cyber threats such as phishing, malware, and ransomware
VAR-202202-0103 CVE-2022-0554 vim/vim  Buffer error vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2. vim/vim Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Vim is an editor based on the UNIX platform. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: vim security update Advisory ID: RHSA-2022:5242-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:5242 Issue date: 2022-06-28 CVE Names: CVE-2022-0554 CVE-2022-0943 CVE-2022-1154 CVE-2022-1420 CVE-2022-1621 CVE-2022-1629 ==================================================================== 1. Summary: An update for vim is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 9) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64 3. Security Fix(es): * vim: Use of Out-of-range Pointer Offset in vim (CVE-2022-0554) * vim: Heap-based Buffer Overflow occurs in vim (CVE-2022-0943) * vim: Out-of-range Pointer Offset (CVE-2022-1420) * vim: heap buffer overflow (CVE-2022-1621) * vim: buffer over-read (CVE-2022-1629) * vim: use after free in utf_ptr2char (CVE-2022-1154) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux AppStream (v. 9): aarch64: vim-X11-8.2.2637-16.el9_0.2.aarch64.rpm vim-X11-debuginfo-8.2.2637-16.el9_0.2.aarch64.rpm vim-common-8.2.2637-16.el9_0.2.aarch64.rpm vim-common-debuginfo-8.2.2637-16.el9_0.2.aarch64.rpm vim-debuginfo-8.2.2637-16.el9_0.2.aarch64.rpm vim-debugsource-8.2.2637-16.el9_0.2.aarch64.rpm vim-enhanced-8.2.2637-16.el9_0.2.aarch64.rpm vim-enhanced-debuginfo-8.2.2637-16.el9_0.2.aarch64.rpm vim-minimal-debuginfo-8.2.2637-16.el9_0.2.aarch64.rpm ppc64le: vim-X11-8.2.2637-16.el9_0.2.ppc64le.rpm vim-X11-debuginfo-8.2.2637-16.el9_0.2.ppc64le.rpm vim-common-8.2.2637-16.el9_0.2.ppc64le.rpm vim-common-debuginfo-8.2.2637-16.el9_0.2.ppc64le.rpm vim-debuginfo-8.2.2637-16.el9_0.2.ppc64le.rpm vim-debugsource-8.2.2637-16.el9_0.2.ppc64le.rpm vim-enhanced-8.2.2637-16.el9_0.2.ppc64le.rpm vim-enhanced-debuginfo-8.2.2637-16.el9_0.2.ppc64le.rpm vim-minimal-debuginfo-8.2.2637-16.el9_0.2.ppc64le.rpm s390x: vim-X11-8.2.2637-16.el9_0.2.s390x.rpm vim-X11-debuginfo-8.2.2637-16.el9_0.2.s390x.rpm vim-common-8.2.2637-16.el9_0.2.s390x.rpm vim-common-debuginfo-8.2.2637-16.el9_0.2.s390x.rpm vim-debuginfo-8.2.2637-16.el9_0.2.s390x.rpm vim-debugsource-8.2.2637-16.el9_0.2.s390x.rpm vim-enhanced-8.2.2637-16.el9_0.2.s390x.rpm vim-enhanced-debuginfo-8.2.2637-16.el9_0.2.s390x.rpm vim-minimal-debuginfo-8.2.2637-16.el9_0.2.s390x.rpm x86_64: vim-X11-8.2.2637-16.el9_0.2.x86_64.rpm vim-X11-debuginfo-8.2.2637-16.el9_0.2.x86_64.rpm vim-common-8.2.2637-16.el9_0.2.x86_64.rpm vim-common-debuginfo-8.2.2637-16.el9_0.2.x86_64.rpm vim-debuginfo-8.2.2637-16.el9_0.2.x86_64.rpm vim-debugsource-8.2.2637-16.el9_0.2.x86_64.rpm vim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpm vim-enhanced-debuginfo-8.2.2637-16.el9_0.2.x86_64.rpm vim-minimal-debuginfo-8.2.2637-16.el9_0.2.x86_64.rpm Red Hat Enterprise Linux BaseOS (v. 9): Source: vim-8.2.2637-16.el9_0.2.src.rpm aarch64: vim-X11-debuginfo-8.2.2637-16.el9_0.2.aarch64.rpm vim-common-debuginfo-8.2.2637-16.el9_0.2.aarch64.rpm vim-debuginfo-8.2.2637-16.el9_0.2.aarch64.rpm vim-debugsource-8.2.2637-16.el9_0.2.aarch64.rpm vim-enhanced-debuginfo-8.2.2637-16.el9_0.2.aarch64.rpm vim-minimal-8.2.2637-16.el9_0.2.aarch64.rpm vim-minimal-debuginfo-8.2.2637-16.el9_0.2.aarch64.rpm noarch: vim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm ppc64le: vim-X11-debuginfo-8.2.2637-16.el9_0.2.ppc64le.rpm vim-common-debuginfo-8.2.2637-16.el9_0.2.ppc64le.rpm vim-debuginfo-8.2.2637-16.el9_0.2.ppc64le.rpm vim-debugsource-8.2.2637-16.el9_0.2.ppc64le.rpm vim-enhanced-debuginfo-8.2.2637-16.el9_0.2.ppc64le.rpm vim-minimal-8.2.2637-16.el9_0.2.ppc64le.rpm vim-minimal-debuginfo-8.2.2637-16.el9_0.2.ppc64le.rpm s390x: vim-X11-debuginfo-8.2.2637-16.el9_0.2.s390x.rpm vim-common-debuginfo-8.2.2637-16.el9_0.2.s390x.rpm vim-debuginfo-8.2.2637-16.el9_0.2.s390x.rpm vim-debugsource-8.2.2637-16.el9_0.2.s390x.rpm vim-enhanced-debuginfo-8.2.2637-16.el9_0.2.s390x.rpm vim-minimal-8.2.2637-16.el9_0.2.s390x.rpm vim-minimal-debuginfo-8.2.2637-16.el9_0.2.s390x.rpm x86_64: vim-X11-debuginfo-8.2.2637-16.el9_0.2.x86_64.rpm vim-common-debuginfo-8.2.2637-16.el9_0.2.x86_64.rpm vim-debuginfo-8.2.2637-16.el9_0.2.x86_64.rpm vim-debugsource-8.2.2637-16.el9_0.2.x86_64.rpm vim-enhanced-debuginfo-8.2.2637-16.el9_0.2.x86_64.rpm vim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm vim-minimal-debuginfo-8.2.2637-16.el9_0.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202208-32 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Vim, gVim: Multiple Vulnerabilities Date: August 21, 2022 Bugs: #811870, #818562, #819528, #823473, #824930, #828583, #829658, #830106, #830994, #833572, #836432, #851231 ID: 202208-32 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. gVim is the GUI version of Vim. Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-editors/gvim < 9.0.0060 >= 9.0.0060 2 app-editors/vim < 9.0.0060 >= 9.0.0060 3 app-editors/vim-core < 9.0.0060 >= 9.0.0060 Description ========== Multiple vulnerabilities have been discovered in Vim and gVim. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Vim users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-editors/vim-9.0.0060" All gVim users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-editors/gvim-9.0.0060" All vim-core users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.0.0060" References ========= [ 1 ] CVE-2021-3770 https://nvd.nist.gov/vuln/detail/CVE-2021-3770 [ 2 ] CVE-2021-3778 https://nvd.nist.gov/vuln/detail/CVE-2021-3778 [ 3 ] CVE-2021-3796 https://nvd.nist.gov/vuln/detail/CVE-2021-3796 [ 4 ] CVE-2021-3872 https://nvd.nist.gov/vuln/detail/CVE-2021-3872 [ 5 ] CVE-2021-3875 https://nvd.nist.gov/vuln/detail/CVE-2021-3875 [ 6 ] CVE-2021-3927 https://nvd.nist.gov/vuln/detail/CVE-2021-3927 [ 7 ] CVE-2021-3928 https://nvd.nist.gov/vuln/detail/CVE-2021-3928 [ 8 ] CVE-2021-3968 https://nvd.nist.gov/vuln/detail/CVE-2021-3968 [ 9 ] CVE-2021-3973 https://nvd.nist.gov/vuln/detail/CVE-2021-3973 [ 10 ] CVE-2021-3974 https://nvd.nist.gov/vuln/detail/CVE-2021-3974 [ 11 ] CVE-2021-3984 https://nvd.nist.gov/vuln/detail/CVE-2021-3984 [ 12 ] CVE-2021-4019 https://nvd.nist.gov/vuln/detail/CVE-2021-4019 [ 13 ] CVE-2021-4069 https://nvd.nist.gov/vuln/detail/CVE-2021-4069 [ 14 ] CVE-2021-4136 https://nvd.nist.gov/vuln/detail/CVE-2021-4136 [ 15 ] CVE-2021-4166 https://nvd.nist.gov/vuln/detail/CVE-2021-4166 [ 16 ] CVE-2021-4173 https://nvd.nist.gov/vuln/detail/CVE-2021-4173 [ 17 ] CVE-2021-4187 https://nvd.nist.gov/vuln/detail/CVE-2021-4187 [ 18 ] CVE-2021-4192 https://nvd.nist.gov/vuln/detail/CVE-2021-4192 [ 19 ] CVE-2021-4193 https://nvd.nist.gov/vuln/detail/CVE-2021-4193 [ 20 ] CVE-2021-46059 https://nvd.nist.gov/vuln/detail/CVE-2021-46059 [ 21 ] CVE-2022-0128 https://nvd.nist.gov/vuln/detail/CVE-2022-0128 [ 22 ] CVE-2022-0156 https://nvd.nist.gov/vuln/detail/CVE-2022-0156 [ 23 ] CVE-2022-0158 https://nvd.nist.gov/vuln/detail/CVE-2022-0158 [ 24 ] CVE-2022-0213 https://nvd.nist.gov/vuln/detail/CVE-2022-0213 [ 25 ] CVE-2022-0261 https://nvd.nist.gov/vuln/detail/CVE-2022-0261 [ 26 ] CVE-2022-0318 https://nvd.nist.gov/vuln/detail/CVE-2022-0318 [ 27 ] CVE-2022-0319 https://nvd.nist.gov/vuln/detail/CVE-2022-0319 [ 28 ] CVE-2022-0351 https://nvd.nist.gov/vuln/detail/CVE-2022-0351 [ 29 ] CVE-2022-0359 https://nvd.nist.gov/vuln/detail/CVE-2022-0359 [ 30 ] CVE-2022-0361 https://nvd.nist.gov/vuln/detail/CVE-2022-0361 [ 31 ] CVE-2022-0368 https://nvd.nist.gov/vuln/detail/CVE-2022-0368 [ 32 ] CVE-2022-0392 https://nvd.nist.gov/vuln/detail/CVE-2022-0392 [ 33 ] CVE-2022-0393 https://nvd.nist.gov/vuln/detail/CVE-2022-0393 [ 34 ] CVE-2022-0407 https://nvd.nist.gov/vuln/detail/CVE-2022-0407 [ 35 ] CVE-2022-0408 https://nvd.nist.gov/vuln/detail/CVE-2022-0408 [ 36 ] CVE-2022-0413 https://nvd.nist.gov/vuln/detail/CVE-2022-0413 [ 37 ] CVE-2022-0417 https://nvd.nist.gov/vuln/detail/CVE-2022-0417 [ 38 ] CVE-2022-0443 https://nvd.nist.gov/vuln/detail/CVE-2022-0443 [ 39 ] CVE-2022-0554 https://nvd.nist.gov/vuln/detail/CVE-2022-0554 [ 40 ] CVE-2022-0629 https://nvd.nist.gov/vuln/detail/CVE-2022-0629 [ 41 ] CVE-2022-0685 https://nvd.nist.gov/vuln/detail/CVE-2022-0685 [ 42 ] CVE-2022-0714 https://nvd.nist.gov/vuln/detail/CVE-2022-0714 [ 43 ] CVE-2022-0729 https://nvd.nist.gov/vuln/detail/CVE-2022-0729 [ 44 ] CVE-2022-0943 https://nvd.nist.gov/vuln/detail/CVE-2022-0943 [ 45 ] CVE-2022-1154 https://nvd.nist.gov/vuln/detail/CVE-2022-1154 [ 46 ] CVE-2022-1160 https://nvd.nist.gov/vuln/detail/CVE-2022-1160 [ 47 ] CVE-2022-1381 https://nvd.nist.gov/vuln/detail/CVE-2022-1381 [ 48 ] CVE-2022-1420 https://nvd.nist.gov/vuln/detail/CVE-2022-1420 [ 49 ] CVE-2022-1616 https://nvd.nist.gov/vuln/detail/CVE-2022-1616 [ 50 ] CVE-2022-1619 https://nvd.nist.gov/vuln/detail/CVE-2022-1619 [ 51 ] CVE-2022-1620 https://nvd.nist.gov/vuln/detail/CVE-2022-1620 [ 52 ] CVE-2022-1621 https://nvd.nist.gov/vuln/detail/CVE-2022-1621 [ 53 ] CVE-2022-1629 https://nvd.nist.gov/vuln/detail/CVE-2022-1629 [ 54 ] CVE-2022-1674 https://nvd.nist.gov/vuln/detail/CVE-2022-1674 [ 55 ] CVE-2022-1720 https://nvd.nist.gov/vuln/detail/CVE-2022-1720 [ 56 ] CVE-2022-1733 https://nvd.nist.gov/vuln/detail/CVE-2022-1733 [ 57 ] CVE-2022-1735 https://nvd.nist.gov/vuln/detail/CVE-2022-1735 [ 58 ] CVE-2022-1769 https://nvd.nist.gov/vuln/detail/CVE-2022-1769 [ 59 ] CVE-2022-1771 https://nvd.nist.gov/vuln/detail/CVE-2022-1771 [ 60 ] CVE-2022-1785 https://nvd.nist.gov/vuln/detail/CVE-2022-1785 [ 61 ] CVE-2022-1796 https://nvd.nist.gov/vuln/detail/CVE-2022-1796 [ 62 ] CVE-2022-1851 https://nvd.nist.gov/vuln/detail/CVE-2022-1851 [ 63 ] CVE-2022-1886 https://nvd.nist.gov/vuln/detail/CVE-2022-1886 [ 64 ] CVE-2022-1897 https://nvd.nist.gov/vuln/detail/CVE-2022-1897 [ 65 ] CVE-2022-1898 https://nvd.nist.gov/vuln/detail/CVE-2022-1898 [ 66 ] CVE-2022-1927 https://nvd.nist.gov/vuln/detail/CVE-2022-1927 [ 67 ] CVE-2022-1942 https://nvd.nist.gov/vuln/detail/CVE-2022-1942 [ 68 ] CVE-2022-1968 https://nvd.nist.gov/vuln/detail/CVE-2022-1968 [ 69 ] CVE-2022-2000 https://nvd.nist.gov/vuln/detail/CVE-2022-2000 [ 70 ] CVE-2022-2042 https://nvd.nist.gov/vuln/detail/CVE-2022-2042 [ 71 ] CVE-2022-2124 https://nvd.nist.gov/vuln/detail/CVE-2022-2124 [ 72 ] CVE-2022-2125 https://nvd.nist.gov/vuln/detail/CVE-2022-2125 [ 73 ] CVE-2022-2126 https://nvd.nist.gov/vuln/detail/CVE-2022-2126 [ 74 ] CVE-2022-2129 https://nvd.nist.gov/vuln/detail/CVE-2022-2129 [ 75 ] CVE-2022-2175 https://nvd.nist.gov/vuln/detail/CVE-2022-2175 [ 76 ] CVE-2022-2182 https://nvd.nist.gov/vuln/detail/CVE-2022-2182 [ 77 ] CVE-2022-2183 https://nvd.nist.gov/vuln/detail/CVE-2022-2183 [ 78 ] CVE-2022-2206 https://nvd.nist.gov/vuln/detail/CVE-2022-2206 [ 79 ] CVE-2022-2207 https://nvd.nist.gov/vuln/detail/CVE-2022-2207 [ 80 ] CVE-2022-2208 https://nvd.nist.gov/vuln/detail/CVE-2022-2208 [ 81 ] CVE-2022-2210 https://nvd.nist.gov/vuln/detail/CVE-2022-2210 [ 82 ] CVE-2022-2231 https://nvd.nist.gov/vuln/detail/CVE-2022-2231 [ 83 ] CVE-2022-2257 https://nvd.nist.gov/vuln/detail/CVE-2022-2257 [ 84 ] CVE-2022-2264 https://nvd.nist.gov/vuln/detail/CVE-2022-2264 [ 85 ] CVE-2022-2284 https://nvd.nist.gov/vuln/detail/CVE-2022-2284 [ 86 ] CVE-2022-2285 https://nvd.nist.gov/vuln/detail/CVE-2022-2285 [ 87 ] CVE-2022-2286 https://nvd.nist.gov/vuln/detail/CVE-2022-2286 [ 88 ] CVE-2022-2287 https://nvd.nist.gov/vuln/detail/CVE-2022-2287 [ 89 ] CVE-2022-2288 https://nvd.nist.gov/vuln/detail/CVE-2022-2288 [ 90 ] CVE-2022-2289 https://nvd.nist.gov/vuln/detail/CVE-2022-2289 [ 91 ] CVE-2022-2304 https://nvd.nist.gov/vuln/detail/CVE-2022-2304 [ 92 ] CVE-2022-2343 https://nvd.nist.gov/vuln/detail/CVE-2022-2343 [ 93 ] CVE-2022-2344 https://nvd.nist.gov/vuln/detail/CVE-2022-2344 [ 94 ] CVE-2022-2345 https://nvd.nist.gov/vuln/detail/CVE-2022-2345 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202208-32 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . ========================================================================== Ubuntu Security Notice USN-6026-1 April 19, 2023 vim vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 14.04 ESM Summary: Several security issues were fixed in Vim. Software Description: - vim: Vi IMproved - enhanced vi editor Details: It was discovered that Vim was incorrectly processing Vim buffers. An attacker could possibly use this issue to perform illegal memory access and expose sensitive information. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-4166) It was discovered that Vim was using freed memory when dealing with regular expressions inside a visual selection. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-4192) It was discovered that Vim was incorrectly handling virtual column position operations, which could result in an out-of-bounds read. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-4193) It was discovered that Vim was not properly performing bounds checks when updating windows present on a screen, which could result in a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-0213) It was discovered that Vim was incorrectly performing read and write operations when in visual block mode, going beyond the end of a line and causing a heap buffer overflow. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-0261, CVE-2022-0318) It was discovered that Vim was incorrectly handling window exchanging operations when in Visual mode, which could result in an out-of-bounds read. An attacker could possibly use this issue to expose sensitive information. (CVE-2022-0319) It was discovered that Vim was incorrectly handling recursion when parsing conditional expressions. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-0351) It was discovered that Vim was not properly handling memory allocation when processing data in Ex mode, which could result in a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-0359) It was discovered that Vim was not properly performing bounds checks when executing line operations in Visual mode, which could result in a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-0361, CVE-2022-0368) It was discovered that Vim was not properly handling loop conditions when looking for spell suggestions, which could result in a stack buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-0408) It was discovered that Vim was incorrectly handling memory access when executing buffer operations, which could result in the usage of freed memory. An attacker could possibly use this issue to execute arbitrary code. (CVE-2022-0443) It was discovered that Vim was incorrectly processing Vim buffers. An attacker could possibly use this issue to perform illegal memory access and expose sensitive information. (CVE-2022-0554) It was discovered that Vim was not properly performing bounds checks for column numbers when replacing tabs with spaces or spaces with tabs, which could cause a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-0572) It was discovered that Vim was incorrectly processing Vim buffers. An attacker could possibly use this issue to perform illegal memory access and expose sensitive information. This issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-0629) It was discovered that Vim was not properly performing validation of data that contained special multi-byte characters, which could cause an out-of-bounds read. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-0685) It was discovered that Vim was incorrectly processing data used to define indentation in a file, which could cause a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-0714) It was discovered that Vim was incorrectly processing certain regular expression patterns and strings, which could cause an out-of-bounds read. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-0729) It was discovered that Vim incorrectly handled memory access. An attacker could potentially use this issue to cause the corruption of sensitive information, a crash, or arbitrary code execution. (CVE-2022-2207) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: vim 2:8.2.3995-1ubuntu2.7 Ubuntu 20.04 LTS: vim 2:8.1.2269-1ubuntu5.14 Ubuntu 18.04 LTS: vim 2:8.0.1453-1ubuntu1.13 Ubuntu 14.04 ESM: vim 2:7.4.052-1ubuntu3.1+esm9 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 macOS Ventura 13 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213488. Accelerate Framework Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory consumption issue was addressed with improved memory handling. CVE-2022-42795: ryuzaki Apple Neural Engine Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to leak sensitive kernel state Description: The issue was addressed with improved memory handling. CVE-2022-32858: Mohamed Ghannam (@_simo36) Apple Neural Engine Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-32898: Mohamed Ghannam (@_simo36) CVE-2022-32899: Mohamed Ghannam (@_simo36) AppleAVD Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to cause a denial-of-service Description: A memory corruption issue was addressed with improved state management. CVE-2022-32827: Antonio Zekic (@antoniozekic), Natalie Silvanovich of Google Project Zero, an anonymous researcher AppleMobileFileIntegrity Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to access user-sensitive data Description: An issue in code signature validation was addressed with improved checks. CVE-2022-42789: Koh M. Nakagawa of FFRI Security, Inc. AppleMobileFileIntegrity Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to modify protected parts of the file system Description: This issue was addressed by removing additional entitlements. CVE-2022-42825: Mickey Jin (@patch1t) ATS Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to bypass Privacy preferences Description: A logic issue was addressed with improved state management. CVE-2022-32902: Mickey Jin (@patch1t) ATS Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to access user-sensitive data Description: An access issue was addressed with additional sandbox restrictions. CVE-2022-32904: Mickey Jin (@patch1t) ATS Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A logic issue was addressed with improved checks. CVE-2022-32890: Mickey Jin (@patch1t) Audio Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to gain elevated privileges Description: This issue was addressed by removing the vulnerable code. CVE-2022-42796: an anonymous researcher Audio Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Parsing a maliciously crafted audio file may lead to disclosure of user information Description: The issue was addressed with improved memory handling. CVE-2022-42798: Anonymous working with Trend Micro Zero Day Initiative Entry added October 27, 2022 AVEVideoEncoder Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved bounds checks. CVE-2022-32940: ABC Research s.r.o. Calendar Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to read sensitive location information Description: An access issue was addressed with improved access restrictions. CVE-2022-42819: an anonymous researcher CFNetwork Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution Description: A certificate validation issue existed in the handling of WKWebView. This issue was addressed with improved validation. CVE-2022-42813: Jonathan Zhang of Open Computing Facility (ocf.berkeley.edu) ColorSync Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. CVE-2022-26730: David Hoyt of Hoyt LLC Crash Reporter Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user with physical access to an iOS device may be able to read past diagnostic logs Description: This issue was addressed with improved data protection. CVE-2022-32867: Kshitij Kumar and Jai Musunuri of Crowdstrike curl Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Multiple issues in curl Description: Multiple issues were addressed by updating to curl version 7.84.0. CVE-2022-32205 CVE-2022-32206 CVE-2022-32207 CVE-2022-32208 Directory Utility Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to access user-sensitive data Description: A logic issue was addressed with improved checks. CVE-2022-42814: Sergii Kryvoblotskyi of MacPaw Inc. DriverKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-32865: Linus Henze of Pinauten GmbH (pinauten.de) DriverKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: A type confusion issue was addressed with improved checks. CVE-2022-32915: Tommy Muir (@Muirey03) Exchange Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user in a privileged network position may be able to intercept mail credentials Description: A logic issue was addressed with improved restrictions. CVE-2022-32928: an anonymous researcher FaceTime Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user may be able to view restricted content from the lock screen Description: A lock screen issue was addressed with improved state management. CVE-2022-32935: Bistrit Dahal Entry added October 27, 2022 Find My Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A malicious application may be able to read sensitive location information Description: A permissions issue existed. This issue was addressed with improved permission validation. CVE-2022-42788: Csaba Fitzl (@theevilbit) of Offensive Security, Wojciech Reguła of SecuRing (wojciechregula.blog) Finder Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted DMG file may lead to arbitrary code execution with system privileges Description: This issue was addressed with improved validation of symlinks. CVE-2022-32905: Ron Masas (breakpoint.sh) of BreakPoint Technologies LTD GPU Drivers Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-32947: Asahi Lina (@LinaAsahi) Grapher Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted gcx file may lead to unexpected app termination or arbitrary code execution Description: The issue was addressed with improved memory handling. CVE-2022-42809: Yutao Wang (@Jack) and Yu Zhou (@yuzhou6666) Heimdal Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user may be able to cause unexpected app termination or arbitrary code execution Description: This issue was addressed with improved checks. CVE-2022-3437: Evgeny Legerov of Intevydis Entry added October 25, 2022 Image Processing Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A sandboxed app may be able to determine which app is currently using the camera Description: The issue was addressed with additional restrictions on the observability of app states. CVE-2022-32913: Yiğit Can YILMAZ (@yilmazcanyigit) ImageIO Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing an image may lead to a denial-of-service Description: A denial-of-service issue was addressed with improved validation. CVE-2022-1622 Intel Graphics Driver Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to disclose kernel memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2022-32936: Antonio Zekic (@antoniozekic) IOHIDFamily Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may cause unexpected app termination or arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2022-42820: Peter Pan ZhenPeng of STAR Labs IOKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved locking. CVE-2022-42806: Tingting Yin of Tsinghua University Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to disclose kernel memory Description: The issue was addressed with improved memory handling. CVE-2022-32864: Linus Henze of Pinauten GmbH (pinauten.de) Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-32866: Linus Henze of Pinauten GmbH (pinauten.de) CVE-2022-32911: Zweig of Kunlun Lab CVE-2022-32924: Ian Beer of Google Project Zero Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-32914: Zweig of Kunlun Lab Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A remote user may be able to cause kernel code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2022-42808: Zweig of Kunlun Lab Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2022-32944: Tim Michaud (@TimGMichaud) of Moveworks.ai Entry added October 27, 2022 Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved locking. CVE-2022-42803: Xinru Chi of Pangu Lab, John Aakerblom (@jaakerblom) Entry added October 27, 2022 Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app with root privileges may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved bounds checks. CVE-2022-32926: Tim Michaud (@TimGMichaud) of Moveworks.ai Entry added October 27, 2022 Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: A logic issue was addressed with improved checks. CVE-2022-42801: Ian Beer of Google Project Zero Entry added October 27, 2022 Mail Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to access user-sensitive data Description: This issue was addressed with improved data protection. CVE-2022-42815: Csaba Fitzl (@theevilbit) of Offensive Security Maps Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to read sensitive location information Description: A logic issue was addressed with improved restrictions. CVE-2022-32883: Ron Masas of breakpointhq.com MediaLibrary Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2022-32908: an anonymous researcher Model I/O Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted USD file may disclose memory contents Description: The issue was addressed with improved memory handling. CVE-2022-42810: Xingwei Lin (@xwlin_roy) and Yinyi Wu of Ant Security Light-Year Lab Entry added October 27, 2022 ncurses Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user may be able to cause unexpected app termination or arbitrary code execution Description: A buffer overflow was addressed with improved bounds checking. CVE-2021-39537 ncurses Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted file may lead to a denial- of-service or potentially disclose memory contents Description: A denial-of-service issue was addressed with improved validation. CVE-2022-29458 Notes Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user in a privileged network position may be able to track user activity Description: This issue was addressed with improved data protection. CVE-2022-42818: Gustav Hansen from WithSecure Notifications Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user with physical access to a device may be able to access contacts from the lock screen Description: A logic issue was addressed with improved state management. CVE-2022-32879: Ubeydullah Sümer PackageKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to modify protected parts of the file system Description: A race condition was addressed with improved state handling. CVE-2022-32895: Mickey Jin (@patch1t) of Trend Micro, Mickey Jin (@patch1t) Photos Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to bypass Privacy preferences Description: This issue was addressed with improved data protection. CVE-2022-32918: an anonymous researcher, Jugal Goradia of Aastha Technologies, Srijan Shivam Mishra of The Hack Report, Evan Ricafort (evanricafort.com) of Invalid Web Security, Amod Raghunath Patwardhan of Pune, India, Ashwani Rajput of Nagarro Software Pvt. Ltd ppp Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app with root privileges may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-42829: an anonymous researcher ppp Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app with root privileges may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-42830: an anonymous researcher ppp Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app with root privileges may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved locking. CVE-2022-42831: an anonymous researcher CVE-2022-42832: an anonymous researcher ppp Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A buffer overflow may result in arbitrary code execution Description: The issue was addressed with improved bounds checks. CVE-2022-32941: an anonymous researcher Entry added October 27, 2022 Ruby Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A remote user may be able to cause unexpected app termination or arbitrary code execution Description: A memory corruption issue was addressed by updating Ruby to version 2.6.10. CVE-2022-28739 Sandbox Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to modify protected parts of the file system Description: A logic issue was addressed with improved restrictions. CVE-2022-32881: Csaba Fitzl (@theevilbit) of Offensive Security Sandbox Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app with root privileges may be able to access private information Description: This issue was addressed with improved data protection. CVE-2022-32862: an anonymous researcher Sandbox Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to access user-sensitive data Description: An access issue was addressed with additional sandbox restrictions. CVE-2022-42811: Justin Bui (@slyd0g) of Snowflake Security Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to bypass code signing checks Description: An issue in code signature validation was addressed with improved checks. CVE-2022-42793: Linus Henze of Pinauten GmbH (pinauten.de) Shortcuts Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A shortcut may be able to check the existence of an arbitrary path on the file system Description: A parsing issue in the handling of directory paths was addressed with improved path validation. CVE-2022-32938: Cristian Dinca of Tudor Vianu National High School of Computer Science of. Romania Sidecar Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user may be able to view restricted content from the lock screen Description: A logic issue was addressed with improved state management. CVE-2022-42790: Om kothawade of Zaprico Digital Siri Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user with physical access to a device may be able to use Siri to obtain some call history information Description: A logic issue was addressed with improved state management. CVE-2022-32870: Andrew Goldberg of The McCombs School of Business, The University of Texas at Austin (linkedin.com/in/andrew-goldberg-/) SMB Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A remote user may be able to cause kernel code execution Description: The issue was addressed with improved memory handling. CVE-2022-32934: Felix Poulin-Belanger Software Update Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved state handling. CVE-2022-42791: Mickey Jin (@patch1t) of Trend Micro SQLite Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A remote user may be able to cause a denial-of-service Description: This issue was addressed with improved checks. CVE-2021-36690 Vim Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Multiple issues in Vim Description: Multiple issues were addressed by updating Vim. CVE-2022-0261 CVE-2022-0318 CVE-2022-0319 CVE-2022-0351 CVE-2022-0359 CVE-2022-0361 CVE-2022-0368 CVE-2022-0392 CVE-2022-0554 CVE-2022-0572 CVE-2022-0629 CVE-2022-0685 CVE-2022-0696 CVE-2022-0714 CVE-2022-0729 CVE-2022-0943 CVE-2022-1381 CVE-2022-1420 CVE-2022-1725 CVE-2022-1616 CVE-2022-1619 CVE-2022-1620 CVE-2022-1621 CVE-2022-1629 CVE-2022-1674 CVE-2022-1733 CVE-2022-1735 CVE-2022-1769 CVE-2022-1927 CVE-2022-1942 CVE-2022-1968 CVE-2022-1851 CVE-2022-1897 CVE-2022-1898 CVE-2022-1720 CVE-2022-2000 CVE-2022-2042 CVE-2022-2124 CVE-2022-2125 CVE-2022-2126 Weather Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to read sensitive location information Description: A logic issue was addressed with improved state management. CVE-2022-32875: an anonymous researcher WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A buffer overflow issue was addressed with improved memory handling. WebKit Bugzilla: 241969 CVE-2022-32886: P1umer (@p1umer), afang (@afang5472), xmzyshypnc (@xmzyshypnc1) WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. WebKit Bugzilla: 242047 CVE-2022-32888: P1umer (@p1umer) WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved bounds checking. WebKit Bugzilla: 242762 CVE-2022-32912: Jeonghoon Shin (@singi21a) at Theori working with Trend Micro Zero Day Initiative WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Visiting a malicious website may lead to user interface spoofing Description: The issue was addressed with improved UI handling. WebKit Bugzilla: 243693 CVE-2022-42799: Jihwan Kim (@gPayl0ad), Dohyun Lee (@l33d0hyun) WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A type confusion issue was addressed with improved memory handling. WebKit Bugzilla: 244622 CVE-2022-42823: Dohyun Lee (@l33d0hyun) of SSD Labs WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may disclose sensitive user information Description: A logic issue was addressed with improved state management. WebKit Bugzilla: 245058 CVE-2022-42824: Abdulrahman Alqabandi of Microsoft Browser Vulnerability Research, Ryan Shin of IAAI SecLab at Korea University, Dohyun Lee (@l33d0hyun) of DNSLab at Korea University WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may disclose internal states of the app Description: A correctness issue in the JIT was addressed with improved checks. WebKit Bugzilla: 242964 CVE-2022-32923: Wonyoung Jung (@nonetype_pwn) of KAIST Hacking Lab Entry added October 27, 2022 WebKit PDF Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. WebKit Bugzilla: 242781 CVE-2022-32922: Yonghwi Jin (@jinmo123) at Theori working with Trend Micro Zero Day Initiative WebKit Sandboxing Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with improvements to the sandbox. WebKit Bugzilla: 243181 CVE-2022-32892: @18楼梦想改造家 and @jq0904 of DBAppSecurity's WeBin lab zlib Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user may be able to cause unexpected app termination or arbitrary code execution Description: This issue was addressed with improved checks. CVE-2022-37434: Evgeny Legerov CVE-2022-42800: Evgeny Legerov Entry added October 27, 2022 Additional recognition Airport We would like to acknowledge Joseph Salazar Acuña and Renato Llamoca of Intrado-Life & Safety/Globant for their assistance. AppleCredentialManager We would like to acknowledge @jonathandata1 for their assistance. FaceTime We would like to acknowledge an anonymous researcher for their assistance. FileVault We would like to acknowledge Timothy Perfitt of Twocanoes Software for their assistance. Find My We would like to acknowledge an anonymous researcher for their assistance. Identity Services We would like to acknowledge Joshua Jones for their assistance. IOAcceleratorFamily We would like to acknowledge Antonio Zekic (@antoniozekic) for their assistance. Kernel We would like to acknowledge Peter Nguyen of STAR Labs, Tim Michaud (@TimGMichaud) of Moveworks.ai, Tingting Yin of Tsinghua University, and Min Zheng of Ant Group, Tommy Muir (@Muirey03), an anonymous researcher for their assistance. Mail We would like to acknowledge an anonymous researcher for their assistance. Mail Drafts We would like to acknowledge an anonymous researcher for their assistance. Networking We would like to acknowledge Tim Michaud (@TimGMichaud) of Zoom Video Communications for their assistance. Photo Booth We would like to acknowledge Prashanth Kannan of Dremio for their assistance. Quick Look We would like to acknowledge Hilary “It’s off by a Pixel” Street for their assistance. Sandbox We would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive Security for their assistance. smbx We would like to acknowledge HD Moore of runZero Asset Inventory for their assistance. System We would like to acknowledge Mickey Jin (@patch1t) of Trend Micro for their assistance. System Settings We would like to acknowledge Bjorn Hellenbrand for their assistance. UIKit We would like to acknowledge Aleczander Ewing for their assistance. WebKit We would like to acknowledge Maddie Stone of Google Project Zero, Narendra Bhati (@imnarendrabhati) of Suma Soft Pvt. Ltd., an anonymous researcher for their assistance. WebRTC We would like to acknowledge an anonymous researcher for their assistance. macOS Ventura 13 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEBP+4DupqR5Sgt1DB4RjMIDkeNxkFAmNbKpkACgkQ4RjMIDke Nxn20Q//SdZA//tLe1DDC4QfGZ/WQD8aTxpvI3AcHqLhg11MaGqv7QPQh18SbynC /v3Kc4gcDBVNNOZQXNspf1AZXSiR7tK1z3hVZWjaEITRkaIbd8wtTsazdQN/kVq5 hyo7PT4H2W9IxAzwI4Dj9IM73WFkeevLiPEnf+MgWbNxlzLyiLiKiDFhMtEMYovb h3bNU5ftmXG5U4+dMxLep/FI3F8kF4qLdDZRZ+hjTa85jDJb1+10a1P3X+oB4O6Z Eois14XvlNUDEtUsXSsC+NgFvcrik6D9HfIQ+wgp6qye7PBwwdNwUCTsKXplnsLZ qdWFBBoU6eTQZrAmU/TxGoHlRswtdTWz0hudwSJa2BhlOijtGqhrySHWchxFl4Ok r5v/N55Kxds7FVTxPaAwWcnwyhQrXBX1HOz8F/qP2a4Z3qkQlcrsUdCDuB4hFTlJ MzOnnLilad8P08RkhSi8qc8KNrNpB1N68Y0y8QLBEiUZAKklMGojVeH/2LpxKRAv tswNHBZF1P2VEErz4xx+Mtwh3rQhII1Rda23M/tyAsEOY2yy8zy/VZfr/zBaIKrY +aR9vzRFpKOjhsRIJqYtMzzM5zFxM01W+ofE4U9tYr7UWuJX0MVnftiZTUunSZXU w3gRR2TpsxK+/BJD4T18jZmDtm3itublk37KT8ONTUX6E2tmxJA= =lIdC -----END PGP SIGNATURE-----
VAR-202202-0342 CVE-2021-41445 D-Link DIR-X1860  Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A reflected cross-site-scripting attack in web application of D-Link DIR-X1860 before v1.10WWB09_Beta allows a remote unauthenticated attacker to execute code in the device of the victim via sending a specific URL to the unauthenticated victim. D-Link DIR-X1860 Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. The D-Link Dir-X1860 is a dual-band router from China's D-Link company. D-Link DIR-X1860 has a security vulnerability, which originates from a reflective cross-site scripting attack in the D-Link DIR-X1860 web application before v1.10WWB09 Beta
VAR-202202-0165 CVE-2021-45465 siemens-healthineers  of  syngo fastview  Vulnerability regarding the state where any value can be written to any location in CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
A vulnerability has been identified in syngo fastView (All versions). The affected application lacks proper validation of user-supplied data when parsing BMP files. This could result in a write-what-where condition and an attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15696). siemens-healthineers of syngo fastview Exists in a state where any value can be written to any location.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of BMP files
VAR-202202-0235 CVE-2022-24352 TP-LINK Technologies  of  AC 1750  Out-of-bounds read vulnerability in firmware CVSS V2: -
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AC1750 prior to 211210 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB.ko kernel module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15773. TP-LINK Technologies of AC 1750 An out-of-bounds read vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202202-0236 CVE-2022-24354 TP-Link AC1750 Input Validation Error Vulnerability CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AC1750 prior to 1.1.4 Build 20211022 rel.59103(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB.ko module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15835. TP-LINK Technologies of AC 1750 An integer overflow vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Tp-link AC1750 is a wireless router from Tp-link company in China
VAR-202202-0109 CVE-2022-22620 plural  Apple  Product Use of Freed Memory Vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. plural Apple The product contains a usage of freed memory vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. A resource management error vulnerability exists in Apple WebKit due to a use-after-free error in the handling of HTML content in WebKit. The vulnerability could allow a remote attacker to compromise a vulnerable system. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: webkit2gtk3 security, bug fix, and enhancement update Advisory ID: RHSA-2022:1777-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:1777 Issue date: 2022-05-10 CVE Names: CVE-2021-30809 CVE-2021-30818 CVE-2021-30823 CVE-2021-30836 CVE-2021-30846 CVE-2021-30848 CVE-2021-30849 CVE-2021-30851 CVE-2021-30884 CVE-2021-30887 CVE-2021-30888 CVE-2021-30889 CVE-2021-30890 CVE-2021-30897 CVE-2021-30934 CVE-2021-30936 CVE-2021-30951 CVE-2021-30952 CVE-2021-30953 CVE-2021-30954 CVE-2021-30984 CVE-2021-45481 CVE-2021-45482 CVE-2021-45483 CVE-2022-22589 CVE-2022-22590 CVE-2022-22592 CVE-2022-22594 CVE-2022-22620 CVE-2022-22637 ===================================================================== 1. Summary: An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Description: WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.34.6). Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: webkit2gtk3-2.34.6-1.el8.src.rpm aarch64: webkit2gtk3-2.34.6-1.el8.aarch64.rpm webkit2gtk3-debuginfo-2.34.6-1.el8.aarch64.rpm webkit2gtk3-debugsource-2.34.6-1.el8.aarch64.rpm webkit2gtk3-devel-2.34.6-1.el8.aarch64.rpm webkit2gtk3-devel-debuginfo-2.34.6-1.el8.aarch64.rpm webkit2gtk3-jsc-2.34.6-1.el8.aarch64.rpm webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.aarch64.rpm webkit2gtk3-jsc-devel-2.34.6-1.el8.aarch64.rpm webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.aarch64.rpm ppc64le: webkit2gtk3-2.34.6-1.el8.ppc64le.rpm webkit2gtk3-debuginfo-2.34.6-1.el8.ppc64le.rpm webkit2gtk3-debugsource-2.34.6-1.el8.ppc64le.rpm webkit2gtk3-devel-2.34.6-1.el8.ppc64le.rpm webkit2gtk3-devel-debuginfo-2.34.6-1.el8.ppc64le.rpm webkit2gtk3-jsc-2.34.6-1.el8.ppc64le.rpm webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.ppc64le.rpm webkit2gtk3-jsc-devel-2.34.6-1.el8.ppc64le.rpm webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.ppc64le.rpm s390x: webkit2gtk3-2.34.6-1.el8.s390x.rpm webkit2gtk3-debuginfo-2.34.6-1.el8.s390x.rpm webkit2gtk3-debugsource-2.34.6-1.el8.s390x.rpm webkit2gtk3-devel-2.34.6-1.el8.s390x.rpm webkit2gtk3-devel-debuginfo-2.34.6-1.el8.s390x.rpm webkit2gtk3-jsc-2.34.6-1.el8.s390x.rpm webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.s390x.rpm webkit2gtk3-jsc-devel-2.34.6-1.el8.s390x.rpm webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.s390x.rpm x86_64: webkit2gtk3-2.34.6-1.el8.i686.rpm webkit2gtk3-2.34.6-1.el8.x86_64.rpm webkit2gtk3-debuginfo-2.34.6-1.el8.i686.rpm webkit2gtk3-debuginfo-2.34.6-1.el8.x86_64.rpm webkit2gtk3-debugsource-2.34.6-1.el8.i686.rpm webkit2gtk3-debugsource-2.34.6-1.el8.x86_64.rpm webkit2gtk3-devel-2.34.6-1.el8.i686.rpm webkit2gtk3-devel-2.34.6-1.el8.x86_64.rpm webkit2gtk3-devel-debuginfo-2.34.6-1.el8.i686.rpm webkit2gtk3-devel-debuginfo-2.34.6-1.el8.x86_64.rpm webkit2gtk3-jsc-2.34.6-1.el8.i686.rpm webkit2gtk3-jsc-2.34.6-1.el8.x86_64.rpm webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.i686.rpm webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.x86_64.rpm webkit2gtk3-jsc-devel-2.34.6-1.el8.i686.rpm webkit2gtk3-jsc-devel-2.34.6-1.el8.x86_64.rpm webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.i686.rpm webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-30809 https://access.redhat.com/security/cve/CVE-2021-30818 https://access.redhat.com/security/cve/CVE-2021-30823 https://access.redhat.com/security/cve/CVE-2021-30836 https://access.redhat.com/security/cve/CVE-2021-30846 https://access.redhat.com/security/cve/CVE-2021-30848 https://access.redhat.com/security/cve/CVE-2021-30849 https://access.redhat.com/security/cve/CVE-2021-30851 https://access.redhat.com/security/cve/CVE-2021-30884 https://access.redhat.com/security/cve/CVE-2021-30887 https://access.redhat.com/security/cve/CVE-2021-30888 https://access.redhat.com/security/cve/CVE-2021-30889 https://access.redhat.com/security/cve/CVE-2021-30890 https://access.redhat.com/security/cve/CVE-2021-30897 https://access.redhat.com/security/cve/CVE-2021-30934 https://access.redhat.com/security/cve/CVE-2021-30936 https://access.redhat.com/security/cve/CVE-2021-30951 https://access.redhat.com/security/cve/CVE-2021-30952 https://access.redhat.com/security/cve/CVE-2021-30953 https://access.redhat.com/security/cve/CVE-2021-30954 https://access.redhat.com/security/cve/CVE-2021-30984 https://access.redhat.com/security/cve/CVE-2021-45481 https://access.redhat.com/security/cve/CVE-2021-45482 https://access.redhat.com/security/cve/CVE-2021-45483 https://access.redhat.com/security/cve/CVE-2022-22589 https://access.redhat.com/security/cve/CVE-2022-22590 https://access.redhat.com/security/cve/CVE-2022-22592 https://access.redhat.com/security/cve/CVE-2022-22594 https://access.redhat.com/security/cve/CVE-2022-22620 https://access.redhat.com/security/cve/CVE-2022-22637 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/ 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnqQrdzjgjWX9erEAQi/6BAAhaqaCDj0g7uJ6LdXEng5SqGBFl5g6GIV p/WSKyL+tI3BpKaaUWr6+d4tNnaQbKxhRTwTSJa8GMrOc7n6Y7LO8Y7mQj3bEFvn z3HHLZK8EMgDUz4I0esuh0qNWnfsD/vJDuGbXlHLdNLlc5XzgX7YA6eIb1lxSbxV ueSENHohbMJLbWoeI2gMUYGb5cAzBHrgdmFIsr4XUd6sr5Z1ZOPnQPf36vrXGdzj mPXPijZtr9QiPgwijm4/DkJG7NQ4KyaPMOKauC7PEB1AHWIwHteRnVxnWuZLjpMf RqYBQu2pYeTiyGky+ozshJ81mdfLyUQBR/+4KbB2TMFZHDlhxzNFZrErh4+dfQja Cuf+IwTOSZgC/8XouTQMA27KFSYKd4PzwnB3yQeGU0NA/VngYp12BegeVHlDiadS hO+mAk/BAAesdywt7ZTU1e1yROLm/jp0VcmvkQO+gh2WhErEFV3s0qnsu1dfuLY7 B1e0z6c/vp8lkSFs2fcx0Oq1S7nGIGZiR66loghp03nDoCcxblsxBcFV9CNq6yVG BkEAFzMb/AHxqn7KbZeN6g4Los+3Dr7eFYPGUkVEXy+AbHqE+b99pT2TIjCOMh/L wXOE+nX3KXbD5MCqvmF2K6w+MfIf3AxzzgirwXyLewSP8NKBmsdBtgwbgFam1QfM Uqt+dghxtOQ= =LCNn -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5083-1 security@debian.org https://www.debian.org/security/ Alberto Garcia February 19, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : webkit2gtk CVE ID : CVE-2022-22589 CVE-2022-22590 CVE-2022-22592 CVE-2022-22620 The following vulnerabilities have been discovered in the WebKitGTK web engine: CVE-2022-22589 Heige and Bo Qu discovered that processing a maliciously crafted mail message may lead to running arbitrary javascript. For the oldstable distribution (buster), these problems have been fixed in version 2.34.6-1~deb10u1. For the stable distribution (bullseye), these problems have been fixed in version 2.34.6-1~deb11u1. We recommend that you upgrade your webkit2gtk packages. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-02-10-1 iOS 15.3.1 and iPadOS 15.3.1 iOS 15.3.1 and iPadOS 15.3.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213093. WebKit Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: Processing maliciously crafted web content may lead to arbitrary code execution. CVE-2022-22620: an anonymous researcher Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About * The version after applying this update will be "15.3.1" Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEePiLW1MrMjw19XzoeC9qKD1prhgFAmIFeLAACgkQeC9qKD1p rhighhAAqFMd1HZQouWTj3By1sZ8JtQm5ET4i7Moeg+UGg0kdiyRglBURzLQZW90 sH8a0ir5AxOeyQhUHsKTpx+ImZ9cx2S7kO0YYn48+7rEqBuZvIwEtCgQ+aIdw8hz aygqmrIgiaWLs77JBTd7fg/rmeuE1qznOg9Fd7dsePa2H3vofkGxYkZYMJIG8k/L 7XGx65bODEsN7qvZja2VgtyRl1XvKlDDSxHGmemYJlD4S4WkuahJ2OKQktoQgKPO kym2vatZudQUGpo0C6Rd+HE7elxAXd0E1XkqoopfkqrbAcSdSd1gan97G96dVJvR uK1Lxl5Pm+hF9+Vedwc2OGL5/6lmC3oRz/r7DndFdmLZw4zieiAUQdp2CK0z23/L jNwLwEx/OncsPttuwgRz41dZP6zFb1GJTx17eG9xKun6E5nJNgtVknjAiIvSbK/e fV12XLXfPB+DkhB9liZQYbo9Au2tLUQfp2RthN4nHMvEZ/Elr6cSzc/zwg4/kksc MrGrH41XU2H8yp51JxlfG3kgoPK7UjAmRoU5A6JpbseitFwQBu/dqLAVsZ1CD/BD qGx0vFzXiZuqd/usBOAugDIHSrS8zWN/wSt/IQUw2McKOuXKKrmdH0i9QK21U5Je aNhXejmefnlyfOUgCj+vX2qWLYcHZovroxUFutYQ383JJwR93B4= =FwNN -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202208-39 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: WebKitGTK+: Multiple Vulnerabilities Date: August 31, 2022 Bugs: #866494, #864427, #856445, #861740, #837305, #845252, #839984, #833568, #832990 ID: 202208-39 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code. Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-libs/webkit-gtk < 2.36.7 >= 2.36.7 Description ========== Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All WebKitGTK+ users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.36.7" References ========= [ 1 ] CVE-2022-2294 https://nvd.nist.gov/vuln/detail/CVE-2022-2294 [ 2 ] CVE-2022-22589 https://nvd.nist.gov/vuln/detail/CVE-2022-22589 [ 3 ] CVE-2022-22590 https://nvd.nist.gov/vuln/detail/CVE-2022-22590 [ 4 ] CVE-2022-22592 https://nvd.nist.gov/vuln/detail/CVE-2022-22592 [ 5 ] CVE-2022-22620 https://nvd.nist.gov/vuln/detail/CVE-2022-22620 [ 6 ] CVE-2022-22624 https://nvd.nist.gov/vuln/detail/CVE-2022-22624 [ 7 ] CVE-2022-22628 https://nvd.nist.gov/vuln/detail/CVE-2022-22628 [ 8 ] CVE-2022-22629 https://nvd.nist.gov/vuln/detail/CVE-2022-22629 [ 9 ] CVE-2022-22662 https://nvd.nist.gov/vuln/detail/CVE-2022-22662 [ 10 ] CVE-2022-22677 https://nvd.nist.gov/vuln/detail/CVE-2022-22677 [ 11 ] CVE-2022-26700 https://nvd.nist.gov/vuln/detail/CVE-2022-26700 [ 12 ] CVE-2022-26709 https://nvd.nist.gov/vuln/detail/CVE-2022-26709 [ 13 ] CVE-2022-26710 https://nvd.nist.gov/vuln/detail/CVE-2022-26710 [ 14 ] CVE-2022-26716 https://nvd.nist.gov/vuln/detail/CVE-2022-26716 [ 15 ] CVE-2022-26717 https://nvd.nist.gov/vuln/detail/CVE-2022-26717 [ 16 ] CVE-2022-26719 https://nvd.nist.gov/vuln/detail/CVE-2022-26719 [ 17 ] CVE-2022-30293 https://nvd.nist.gov/vuln/detail/CVE-2022-30293 [ 18 ] CVE-2022-30294 https://nvd.nist.gov/vuln/detail/CVE-2022-30294 [ 19 ] CVE-2022-32784 https://nvd.nist.gov/vuln/detail/CVE-2022-32784 [ 20 ] CVE-2022-32792 https://nvd.nist.gov/vuln/detail/CVE-2022-32792 [ 21 ] CVE-2022-32893 https://nvd.nist.gov/vuln/detail/CVE-2022-32893 [ 22 ] WSA-2022-0002 https://webkitgtk.org/security/WSA-2022-0002.html [ 23 ] WSA-2022-0003 https://webkitgtk.org/security/WSA-2022-0003.html [ 24 ] WSA-2022-0007 https://webkitgtk.org/security/WSA-2022-0007.html [ 25 ] WSA-2022-0008 https://webkitgtk.org/security/WSA-2022-0008.html Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202208-39 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5
VAR-202202-1934 No CVE ASG2100 has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ASG2100 is an online behavior management product. ASG2100 has a weak password vulnerability. An attacker could exploit this vulnerability to obtain sensitive information.
VAR-202202-0028 CVE-2021-38405 Siemens JT2Go PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability CVSS V2: -
CVSS V3: 7.8
Severity: HIGH
The Datalogics APDFL library used in affected products is vulnerable to memory corruption condition while parsing specially crafted PDF files. An attacker could leverage this vulnerability to execute code in the context of the current process. Siemens' JT2Go and Teamcenter Visualization Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a write past the end of an allocated buffer
VAR-202202-0264 CVE-2022-24049 (Pwn2Own) Sonos One Speaker ALAC Frame Parser Stack-based Buffer Overflow Remote Code Execution Vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sonos One Speaker prior to 3.4.1 (S2 systems) and 11.2.13 build 57923290 (S1 systems). Authentication is not required to exploit this vulnerability. The specific flaw exists within the ALAC audio codec. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15798
VAR-202202-0455 CVE-2022-21174 Intel(R) Quartus(R) Prime Pro Edition  Fraud related to unauthorized authentication in CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Improper access control in a third-party component of Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Quartus(R) Prime Pro Edition Exists in a fraudulent authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Intel Quartus Prime Pro is a multi-platform design environment developed by Intel Corporation. This product is mainly used for programmable logic device programming. Intel Quartus Prime Pro Edition has a security vulnerability that stems from a potential security vulnerability in Intel Quartus Prime Pro and Standard Edition. An attacker could exploit this vulnerability to cause privilege escalation, denial of service, or information disclosure
VAR-202202-0452 CVE-2022-21205 Intel(R) Quartus(R) Prime Pro Edition  In  XML  External entity vulnerabilities CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Improper restriction of XML external entity reference in DSP Builder Pro for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an unauthenticated user to potentially enable information disclosure via network access. Intel(R) Quartus(R) Prime Pro Edition for, XML There is a vulnerability in an external entity.Information may be obtained. Both Intel Quartus Prime Pro and Intel Quartus Prime are products of Intel Corporation of the United States. Intel Quartus Prime Pro is a multi-platform design environment. This product is mainly used for programmable logic device programming. Intel Quartus Prime is a programmable logic device tool for designing and developing FPGAs. An attacker could exploit this vulnerability to cause privilege escalation, denial of service, or information disclosure