Headline
Red Hat Security Advisory 2023-2097-03
Red Hat Security Advisory 2023-2097-03 - Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool. Issues addressed include code execution, cross site scripting, denial of service, deserialization, improper neutralization, information leakage, and remote shell upload vulnerabilities.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: Satellite 6.13 Release
Advisory ID: RHSA-2023:2097-03
Product: Red Hat Satellite 6
Advisory URL: https://access.redhat.com/errata/RHSA-2023:2097
Issue date: 2023-05-03
CVE Names: CVE-2022-1471 CVE-2022-22577 CVE-2022-23514
CVE-2022-23515 CVE-2022-23516 CVE-2022-23517
CVE-2022-23518 CVE-2022-23519 CVE-2022-23520
CVE-2022-25857 CVE-2022-27777 CVE-2022-31163
CVE-2022-32224 CVE-2022-33980 CVE-2022-38749
CVE-2022-38750 CVE-2022-38751 CVE-2022-38752
CVE-2022-41323 CVE-2022-41946 CVE-2022-42003
CVE-2022-42004 CVE-2022-42889 CVE-2023-23969
CVE-2023-24580
=====================================================================
- Summary:
An update is now available for Red Hat Satellite 6.13. The release contains
a
new version of Satellite and important security fixes for various
components.
- Relevant releases/architectures:
Red Hat Satellite 6.13 for RHEL 8 - noarch, x86_64
- Description:
Red Hat Satellite is a systems management tool for Linux-based
infrastructure. It allows for provisioning, remote management, and
monitoring of multiple Linux deployments with a single centralized tool.
Security Fix(es):
- CVE-2022-1471 CVE-2022-25857 CVE-2022-38749 CVE-2022-38750 CVE-2022-38751
CVE-2022-38752 candlepin and puppetserver: various flaws - CVE-2022-22577 tfm-rubygem-actionpack: rubygem-actionpack: Possible
cross-site scripting vulnerability in Action Pack - CVE-2022-23514 rubygem-loofah: inefficient regular expression leading to
denial of service - CVE-2022-23515 rubygem-loofah: rubygem-loofah: Improper neutralization of
data URIs leading to Cross Site Scripting - CVE-2022-23516 rubygem-loofah: Uncontrolled Recursion leading to denial
of service - CVE-2022-23517 tfm-rubygem-rails-html-sanitizer:
rubygem-rails-html-sanitizer: Inefficient Regular Expression leading to
denial of service - CVE-2022-23518 tfm-rubygem-rails-html-sanitizer:
rubygem-rails-html-sanitizer: Improper neutralization of data URIs leading
to Cross site scripting - CVE-2022-23519 tfm-rubygem-rails-html-sanitizer:
rubygem-rails-html-sanitizer: Cross site scripting vulnerability with
certain configurations - CVE-2022-23520 tfm-rubygem-rails-html-sanitizer:
rubygem-rails-html-sanitizer: Cross site scripting vulnerability with
certain configurations - CVE-2022-27777 tfm-rubygem-actionview: Possible cross-site scripting
vulnerability in Action View tag helpers - CVE-2022-31163 rubygem-tzinfo: rubygem-tzinfo: arbitrary code execution
- CVE-2022-32224 tfm-rubygem-activerecord: activerecord: Possible RCE
escalation bug with Serialized Columns in Active Record - CVE-2022-33980 candlepin: apache-commons-configuration2: Apache Commons
Configuration insecure interpolation defaults - CVE-2022-41323 satellite-capsule:el8/python-django: Potential
denial-of-service vulnerability in internationalized URLs - CVE-2022-41946 candlepin: postgresql-jdbc: Information leak of prepared
statement data due to insecure temporary file permissions - CVE-2022-42003 CVE-2022-42004 candlepin: various flaws
- CVE-2022-42889 candlepin: apache-commons-text: variable interpolation RCE
- CVE-2022-23514 rubygem-loofah: inefficient regular expression leading to
denial of service - CVE-2023-23969 python-django: Potential denial-of-service via
Accept-Language headers - CVE-2023-24580 python-django: Potential denial-of-service vulnerability
in file uploads
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
The items above are not a complete list of changes. This update also fixes
several bugs and adds various enhancements. Documentation for these changes
is available from the Release Notes document.
- Solution:
For Red Hat Satellite 6.13, see the following documentation for the
release.
https://access.redhat.com/documentation/en-us/red_hat_satellite/6.13
The important instructions on how to upgrade are available below.
https://access.redhat.com/documentation/en-us/red_hat_satellite/6.13/html/upgrading_and_updating_red_hat_satellite
- Bugs fixed (https://bugzilla.redhat.com/):
1225819 - [RFE] Ability to sync from closest CDN mirror for Capsule
1266407 - IPA (external users) not able to authenticate using hammer CLI: invalid user / SSO failed
1630294 - [RFE] Remote execution overview dashboard should be more interactive like the Monitor Dashboard
1638226 - [RFE] Show difference in errata between ContentViewVersions
1650468 - [RFE] Allow to export Docker images from content views or as repository as part ISS
1761012 - [RFE] Ability to generate a report for ansible/remote execution task result.
1786358 - [RFE] Ability to make persistent changes in “ansible.cfg” on Satellite Server.
1787456 - [RFE] Candlepin log rotation settings should be user-configurable
1813274 - [RFE] Allow customers to be able to add more columns to ‘All Hosts’ page in Red Hat Satellite 6 webui.
1826648 - [RFE] new report template to list all the installed packages
1837767 - Errata search filtered with ID does not work in Web UI
1841534 - Provide support for “Privileged User” session when host console is being taken via cockpit from Satellite 6.7 UI
1845489 - Audit page shows “auditable id / Host2” for “Host1” but Host2 does not exist or deleted from the all hosts
1880947 - Satellite fails with “HTTP error (500 - Internal Server Error): PG::UniqueViolation: ERROR: duplicate key value violates unique constraint” while running concurrent registrations
1888667 - “Applied Errata” report template does not consider input “Up to” and “Since” in WebUI, hammer works
1895976 - Hammer Allows Invalid Release Version to be Set on Activation Key
1920810 - Error message related to Trend in production log
1931027 - Entitlement certificate is missing content section for a custom product
1931533 - Update foreman-bootloaders-redhat to 202102220000 to add efinet module to Grub2 modules
1950468 - root_pass setting does not enforce minimum length of 8 characters as the host and hostgroups forms do
1952529 - Package and Errata actions on content hosts selected using the “select all hosts” option fails.
1956210 - Health check should use hostname -f
1956985 - [RFE] Capsule Last Sync date and status should not be based on task data.
1963266 - [RFE]: Provide Capsule Load Balancer as an option for Global Registration Feature
1964037 - wrong generation of /etc/tomcat/cert-users.properties
1965871 - Change /var/log/candlepin directory owner/group to candlepin with 750 permission
1978683 - [global registration] - puppet configuration are not inherited to host from host-group while global registration
1978995 - [RFE] The satellite-installer should display the mismatched FQDN additionally rather than just showing the commands to verify the output
1990790 - [RFE] add possibility to resize bookmarks dropdown menu
1990875 - Update the foreman-discovery-image to inject the latest e1000e NIC drivers for I219-LM network cards
1995097 - Tuning profile ‘default’ requires at least 8 GB of memory and 1 CPU cores
1995470 - Activation key can be deleted, but still shows up in hostgroup configuration
1997186 - [regression] data.yml is referring to old sync plain id which does not exist in katello_sync_plans
1997199 - Can’t create bookmarks under Lifecyle Environments
2026151 - Can’t sync private Azure registry to Satellite
2029402 - [RFE] Add functionality in Hammer to Add/Delete a single Ansible role to Hostgroup without defining every role.
2032040 - Enhance foreman-rake katello:correct_repositories to handle Katello::Errors::CandlepinError: Unable to find content with the ID "xxxxxxxxxxx".
2043600 - consumer certificate is generated with validity after 19th Jan 2038 which is causing 2038 bug on 32bit systems
2050234 - pulp_streamer runs out of file descriptors when upstream server is unavailable
2052904 - [RFE] Prevent the deletion of content credentials when they are in use in Satellite 6.x
2056402 - [RFE] New hosts page doesn’t show global and host parameters
2057314 - RHEL 9 as Guest OS is not available on Satellite 6.11
2060099 - [RFE] ouia-ID for tile cards in the new host details page
2062526 - Another deadlock issue when syncing repos with high concurrency
2063999 - No profiles are shown for any module streams
2066323 - [RFE] Satellite should use the newer asynchronous endpoint to export manifests
2069438 - [RFE] new host ui details, tracer tab, page reload required after change
2073847 - Restarting postgres just before task finish causes discrepancy between foreman and dynflow task status - forever
2077363 - Fail to sync kickstart repositories with same sub repositories concurrently
2080296 - CVE-2022-27777 tfm-rubygem-actionview: Possible cross-site scripting vulnerability in Action View tag helpers
2080302 - CVE-2022-22577 rubygem-actionpack: Possible cross-site scripting vulnerability in Action Pack
2088156 - Broken Link in the Realms section of Satellite
2088529 - ForemanCustomScript in Host provisioned on Azure CR fails with command not found
2094912 - Unable to search the hosts based on the query “ansible_role", if the roles are inherited from the hostgroup.
2098079 - [RFE] Add an ability to search by Insights status
2101708 - when host is deleted on hypervisor while ansible job is running, hosts gets deleted on hypervisor level
2102078 - podman run returns Error: unexpected end of JSON input on image pulled from satellite
2103936 - Execution of satellite-installer raises multiple “warning: URI.escape is obsolete” messages in Red Hat Satellite 6.11
2104247 - [RFE] version non-specific flag to enable puppet on Red Hat Satellite.
2105067 - CVE-2022-33980 apache-commons-configuration: Apache Commons Configuration insecure interpolation defaults
2105441 - RHEL 9 provisioned host goes into emergency mode after initial reboot
2106475 - [RFE] Enhance puppet agent deployment for external puppetserver
2106753 - [RFE] Allow user to choose between Graphical and Text mode anaconda installer during system build via Satellite 6
2107011 - [RFE] Keep notifications from RSS feed in Notifications drawer in Satellite webui for a longer period of time
2107758 - [RFE] Upgrade to Redis 6
2108997 - CVE-2022-32224 activerecord: Possible RCE escalation bug with Serialized Columns in Active Record
2109634 - Add module profile information to modulemd enpoints
2110551 - CVE-2022-31163 rubygem-tzinfo: arbitrary code execution
2111159 - Refreshing Alternate Content Source complains about invalid remote URL
2115970 - Sync container images of existing docker type repositories fail with 404 - Not found
2116375 - Even in 6.11.1, sync summary email notification shows the incorrect summary for newly added errata.
2118651 - pull-provider rex jobs hang if host is not configured correctly
2119053 - [RFE] X509 Certification Authorities” and "Optional HTTP headers as JSON (ERB allowed)" fields need to be included via Hammer CLI for “hammer webhook create” and “hammer webhook update” sub-options
2119155 - With every edit of an exising webhook, the value in password field disappears in Satellite 6.10/6.11/6.12
2119911 - VMware Image based Provisioning fails with error- : Could not find virtual machine network interface matching <IP>
2120640 - New host details Insights tab doesn’t work with breadcrumb switcher
2121210 - [RFE] Add call-to-action empty states
2121288 - Still getting API request timeout when indexing contents.
2122617 - Kerberos authentication fails for POST, PUT and DELETE api calls
2123593 - Satellite should be able to process (and publish) compressed comps.xml / groups metadata
2123696 - The Value of “Allowed bootdisk types” shows up as subnetfull_host where as it is set as subnet,full_host in Satellite 6.12
2123835 - System build based on “PXELess Discovery” will always fail if the “Installation token lifetime” has been disabled in Satellite 6.12
2123932 - Unable to “Remove” a repository directly if the repo is part of a CV as well as CCV in Satellite 6.12
2124419 - Jobs pushed in MQTT queue is not delivered if yggdrasild was not running and communicating with the right broker before the jobs were pushed
2124520 - Changing the Capsule parameter post the curl command generated in Global Registration template failed with error “There was an error while generating the command, see the logs for more information.”
2125424 - Mismatched files between stage 1 and stage 2 kernel images during kickstart provisioning
2125444 - Syncable exports across partitions causes ' Invalid cross-device link’ error
2126200 - CV version details repository tab links to library_instance_inverse version and lets you use it like a regular library repo
2126349 - Missing cron job for ACS refresh in /etc/cron.d/katello
2126372 - Refreshing ACS with --name instead of --id fails with “Error: Found more than one alternate_content_source.”
2126695 - Wrong Ansible documentation links
2126789 - CVE-2022-25857 snakeyaml: Denial of Service due to missing nested depth limitation for collections
2126905 - Packages tab - Add dropdown to select upgrade version
2127180 - random failure of Inventory Sync
2127470 - Content view publish fails when the content view and repository both have a large name with : Error message: the server returns an error HTTP status code: 500
2127998 - RHEL 9 appstream and baseos kickstart repositories not showing as recommended repositories
2128038 - [RFE] Add Templates tab in the new UI, under (Hosts > All Hosts > Host )
2128256 - Insights recommendation sync failing in Satelliite
2128864 - Repo Deletion with no feed url causes a ArgumentError
2128894 - [RFE] Need syncable yum-format repository imports
2129706 - CVE-2022-38749 snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode
2129707 - CVE-2022-38750 snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
2129709 - CVE-2022-38751 snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
2129710 - CVE-2022-38752 snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
2129950 - ISE when creating a CV with org_id specified as array
2130596 - insights-client --register --verbose throwing error UnicodeEncodeError: ‘ascii’ codec can’t encode character ‘\ufffd’ in position 94: ordinal not in range(128)
2130698 - New Host UI: Toggle group is hidden when host has no installable errata
2131312 - Satellite 6.9\6.10\6.11 suddenly cannot enable or sync satellite-tools repo for rhel 8 but the same works for rhel 7
2131369 - Updating subscription attributes of a host, such as CV and LCE fails with “Katello::Resources::Candlepin::Consumer: 400 Bad Request” and "Cannot construct instance of org.candlepin.dto.api.v1.GuestIdDTO
" error
2131839 - re-enabling sync plans [FAIL] Could not update the sync plan: ERF28-1357 [ForemanTasks::RecurringLogicCancelledException]: Cannot update a cancelled Recurring Logic.
2132452 - Missing ouia-id for content view
2133343 - Content view filter will include module streams of other repos/arches if the errata contain rpms in different repos/arches.
2133615 - Content view filter included errata not in the filter date range
2134283 - SSH key passphrase is not working if password was set previously
2134682 - Getting “undefined method schema_version' for nil:NilClass" while syncing from quay.io 2135244 - CVE-2022-42003 jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS 2135247 - CVE-2022-42004 jackson-databind: use of deeply nested arrays 2135418 - rubygem-foreman_hooks scriptlet issues an error message 2135435 - CVE-2022-42889 apache-commons-text: variable interpolation RCE 2136130 - CVE-2022-41323 python-django: Potential denial-of-service vulnerability in internationalized URLs 2137318 - hammer content-view purge only deletes up to "Entries per page" versions 2137350 - hammer repository types command is missing options 2137539 - mosquitto service is missing in
satellite-maintain service status -boutput 2138887 - [RFE] Add content export to FAM 2139209 - Don't use the term 'Subscription Watch' anymore 2139418 - MQTT ReX mode makes it too easy to to DDOS Satellite 2139441 - Improve empty state design when a host has applicable errata but no installable errata 2139545 - Registration error: PG::UniqueViolation: ERROR: duplicate key value violates unique constraint "katello_available_module_streams_name_stream_context" 2140628 - Preupgrade and upgrade jobs should not mention RHEL 7 2140807 - Show include all RPM without errata and the 3 other checkboxes for rpm and module stream filters outside table so they don't get hidden by empty state. 2141136 - Orphaned ACSs should be cleaned from smart proxies 2141187 - Searchbar disappears when trying to select a bookmark as user without bookmark permissions 2141455 - New host details - Move Details tab out of experimental labs 2141719 - While selecting "Enable debugging output" option, Satellite generates ahv virt-who confirguration with "internal_debug=true" which is not recognized by virt-who 2141810 - When working with CCV, include and exclude filters, eventually the number of packages in the CCV will not be as expected, causing problems to the customer 2142514 - Satellite-clone not working if ansible-core 2.13 is installed 2142555 - import puppet classes permission filter does not work 2143451 - Satellite upgrades should not require enabling the next versions Satellite repository, and should rely only on the Maintenance repository 2143497 - Can't perform incremental content exports in syncable format 2143515 - ERROR -- /parallel-executor-core: no manager for Dynflow::Director::Event for event: #<Actions::ProxyAction::ProxyActionStopped 2143695 - 0077_move_remote_url_credentials.py fails on Remotes that have @ in path, not netloc 2144044 - Error "no certificate or crl found" when using a http proxy as "Default Http Proxy" for content syncing or manifest operations in Satellite 6.12 2147579 - Unable to promote content view due to "NoMethodError: undefined method
get_status’ for nil:NilClass”
2148433 - kickstart_networking_setup template does not configure network
2148813 - Inspecting an image with skopeo no longer works on Capsules
2149030 - iPXE template for hosts are getting generated with two “ks=” kernel command line parameters in Satellite 6.11 and above
2149543 - Incorrect spelling of Effective User on remote execution setting page.
2149730 - new host details - Repository sets pagination ignores filters
2149893 - Some custom repositories are failing to synchorize with error “This field may not be blank” after upgrading to Red Hat Satellite 6.11
2149896 - satellite-change-hostname command fails with “ERROR: Unrecognised option '–disable-system-checks’”
2149990 - ‘Via customized remote execution’ is broken on the new host detail page
2150009 - CVE-2022-1471 SnakeYaml: Constructor Deserialization Remote Code Execution
2150261 - ansible_roles page points to old URL for ansible guide
2150311 - Hammer simplified ACS creation shouldn’t allow user to enter product names
2150380 - Puppet tab on a Host page on NewUI showing ‘Something went wrong’
2151333 - Mirror complete sync policy no longer allowed with ignored content types in the repo.
2151487 - Missing Foreman google packages
2151564 - Content view in French/Italian language doesn’t show
2151827 - Satellite defaults to old hosts details screen if navigated from dashboard
2151838 - Module streams subtab in new host details UI is missing on RHEL 8.7 hosts
2151856 - Access to /etc/resolv.conf file is denied by selinux for Puma Webserver when it’s a symlink or systemd-resolved is explicitly being used
2151935 - UX on change content source page is ambiguous
2152609 - REX task running during logrotate to foreman-proxy goes to suspended state forever
2153234 - CVE-2022-23514 rubygem-loofah: inefficient regular expression leading to denial of service
2153241 - CVE-2022-23516 rubygem-loofah: Uncontrolled Recursion leading to denial of service
2153262 - CVE-2022-23515 rubygem-loofah: Improper neutralization of data URIs leading to Cross Site Scripting
2153273 - Subscription can’t be blank, A Pool and its Subscription cannot belong to different organizations
2153399 - CVE-2022-41946 postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
2153423 - job remains in pending state even when host detail reports exception
2153701 - CVE-2022-23518 rubygem-rails-html-sanitizer: Improper neutralization of data URIs leading to Cross site scripting
2153720 - CVE-2022-23517 rubygem-rails-html-sanitizer: Inefficient Regular Expression leading to denial of service
2153744 - CVE-2022-23519 rubygem-rails-html-sanitizer: Cross site scripting vulnerability with certain configurations
2153751 - CVE-2022-23520 rubygem-rails-html-sanitizer: Cross site scripting vulnerability with certain configurations
2154184 - Disabling “Capsule batch tasks” makes all Ansible role jobs to fail - forever
2154397 - Missing upgrade scenarios for 6.13 and 6.13.z in foreman-maintain
2154512 - Katello API activation_key/:id/product_content does not expose per_page
2154734 - Getting ‘null value in column “image_manifest_id” violates not-null constraint’ when syncing openstack container repos
2155221 - Columns are overlapping while adding columns through “Manage columns” tab in “All Hosts”
2155392 - Host config report page raises "undefined method []' for nil:NilClass" error 2155527 - unable to install satellite 6.11 on rhel8.8 - ansible-core version is too new 2155911 - Audit ouia-ids for ACS UI 2156294 - Info button in Create templates -> Template opens a prompt showing info, but it is persists even after change of tabs on the "i" button 2156295 - Info button in Create Host -> OpenSCAP capsule opens a prompt showing info, but it is persists even after change of tabs on the "i" button 2156941 - Satellite operations doesn't install in an execution environment 2157627 - health check uses the wrong certificate bundle to talk to Foreman 2157869 - Satellite is not able to pick settings which transitioned from a non-default to default value 2158508 - Permission denied on Ansible part of host page when usergroup of user have administrator role 2158519 - Legacy rex form is missing options for future or recurring execution 2158565 - Job invocation page shows inconsistency when clicking on Run job button. 2158614 - deleting of products after a content export sometimes ends up in a candlepin error 2158738 - time to pickup kills long running pull jobs, timeout to kill doesn't work in the same scenario 2159776 - Unable to change download_policy to on_demand if the Red Hat Repository has any checksum_type set in Satellite 2159963 - ForeignKeyViolation on ACS create when invalid --ssl-* argument is provided 2159967 - Add some validation for name in Simplified ACS creation via hammer 2159974 - Unable to disable SCA for an organization without manifest using API 2160008 - (Regression of 2033940) Error: AttributeError: 'NoneType' object has no attribute 'cast' thrown while listing repository versions 2160056 - mod_expires is not loaded 2160112 - Add validations for Simplified ACS update via hammer 2160264 - delete orphans task does not remove pulp3 remotes from capsules when removing repositories 2160297 - Satellite 6.12 upgrade fails with error ERF73-0602 [Foreman::PermissionMissingException]: some permissions were not found: ["view_puppetclasses", "view_environments", :view_environments, :view_puppetclasses] (Foreman::PermissionMissingException) 2160497 - Calling hammer concurrently raises 500 ISE error on apidoc / apipie 2160508 - Upgrade to 6.13 fails due to satellite-common unsatisfied dependencies 2160524 - rubygem-foreman_google cannot be installed during upgrade 2160528 - foreman-installer and foreman-installer-katello have failing post scriptlets 2160705 - The new kickstart_rhsm snippet is not considered RH supported 2160752 - Bulk select/deselect does not work properly on paginated ACS page 2161304 - foreman-discovery-image is not working for pxe-less discovery provisioning. 2161776 - Subscriptions page - 'Import a Manifest' button displays when a blank manifest is imported 2162129 - Add validations for RHUI ACS create and update 2162130 - hammer acs show does not show any SSL related fields 2162678 - content_export_* modules can time out as an export takes longer than 5 minutes 2162736 - Can't search facts using CLI 2163425 - GCE is not enaabled by default on satellite 2163456 - (ActiveModel::UnknownAttributeError): unknown attribute 'project' for ForemanGoogle::GCE. 2163457 - Remove orphan fails 2163577 - Manage Columns button appears even when there are no hosts 2163582 - Change Content Source LCE dropdown shows multiple Library entries 2163788 - Host Details page doesn't have static UUIDs for the tabs and generate new UUID every time on page load 2164026 - Link from Content Hosts should navigate to Host's Content pane/tab 2164080 - Upgrade will fail during check-tftp-storage check with "no implicit conversion of nil into String" 2164330 - new wait task introduced by rh_cloud 6.0.44 is not recognized by maintain as OK to interrupt 2164413 - backup restore unable to cope with backups created via "-t" option 2164757 - Require rubygem(foreman_google) for Satellite installer 2164989 - GCE - Restrict images to RHEL only 2165482 - foreman::cli::ssh is present in downstream 2165848 - virt-who-config update failed for "Could not create the Virt Who configuration" 2165952 - Warning: Setting puppet_<variable> has no definition, please define it before using 2166244 - assets are not compressed during delivery anymore 2166293 - Expose new REX pull transport tunables in the installer 2166303 - Edit and Submit is not possible from All Hosts in Satellite 6.13 2166374 - --puppet-server-puppetserver-telemetry installer option should be disabled by default 2166424 - The documentation link within Config Management page in Satellite WebUI redirects to upstream documentation 2166457 - CVE-2023-23969 python-django: Potential denial-of-service via Accept-Language headers 2166964 - API endpoint /api/compute_resources/:id/available_networks fails with ISE for GCE CR 2166966 - Candlepin 4.2.13 changes [:content][:id] to ['contentId'] 2167685 - [BUG] Manifest re-import fails with error "Unexpected exception occured while executing transactional block" in Satellite 6.13 2168041 - [Nutanix] Remove the duplicate option 'update_interval' for virt-who config 2168096 - Host details from OpenSCAP compliance reports points to Old Hosts UI page 2168168 - Installable errata from Content View setting must be set to True 2168254 - Editing virt-who configuration fails with error undefined method
update_attributes’ for #<ForemanVirtWhoConfigure::Config:0x00007fd5d25bfb58> Did you mean? update_attribute audited_attributes
2168258 - saving alternative content source is possible, even if IP instead of fqdn is specified and red warning is present
2168330 - refreshing the manifest sends invalid DISTRIBUTION_VERSION fact to the upstream candlepin
2168494 - Loading preupgrade report on job detail doesn’t work
2168679 - Clicking on ‘Variables’ within ‘Ansible’ in ‘Content Hosts’ page fails with ‘Received status code 500’ when ‘theforeman.foreman_scap_client’ role is assigned to the host
2168967 - New kickstart_kernel_options snippet breaks UEFI (Grub2) PXE provisioning when boot_mode is static
2169299 - rubygem-openscap (and thus foreman_openscap) can’t be installed on CentOS Stream 8
2169402 - CVE-2023-24580 python-django: Potential denial-of-service vulnerability in file uploads
2169633 - Legacy Hosts UI loaded when you navigate from the Host Console button
2169858 - [Bug] - Unable to fix inhibitors from Satellite WebUI after running preugrade check with leapp.
2169866 - Exporting the Library environment incrementally fails with error “Incremental export can only be requested when there is a previous export or start_versions= has been specified.”
2170034 - Support Satellite Ansible Collection running on Python 3.11
2171399 - 404 on /images/jquery-ui/ui-bg_glass_75_dadada_1x400.png when searching in content hosts
2172141 - Redundant parentheses around search query after rerun
2172540 - “Restoring postgresql global objects” step is buggy and not required
2172939 - Link from host collections and Errata page should go to new host details page
2173570 - Installer fails in upgrade with “No Puppet module parser is installed and no cache of the file /usr/share/foreman-installer/modules/foreman/manifests/compute/gce.pp is available”
2173756 - Importing incremental content not recreating metadata properly
2174734 - Puppet environment not configured for Puppet agent during host Registration
2174910 - Need to update Recommended Repositories page with Satellite 6.13 repos
2175226 - Cannot force delete repositories that are included in export content view versions
2180417 - foreman-maintain upgrade list-versions lists 6.14 along with 6.13.z
2184018 - Submitting host edit causes wrong UI redirect
- Package List:
Red Hat Satellite 6.13 for RHEL 8:
Source:
ansible-collection-redhat-satellite-3.9.0-2.el8sat.src.rpm
ansible-collection-redhat-satellite_operations-1.3.0-2.el8sat.src.rpm
ansible-lint-5.0.8-4.el8pc.src.rpm
ansible-runner-2.2.1-3.el8sat.src.rpm
ansiblerole-foreman_scap_client-0.2.0-2.el8sat.src.rpm
ansiblerole-insights-client-1.7.1-2.el8sat.src.rpm
candlepin-4.2.13-1.el8sat.src.rpm
cjson-1.7.14-5.el8sat.src.rpm
createrepo_c-0.20.1-1.el8pc.src.rpm
dynflow-utils-1.6.3-1.el8sat.src.rpm
foreman-3.5.1.14-1.el8sat.src.rpm
foreman-bootloaders-redhat-202102220000-1.el8sat.src.rpm
foreman-discovery-image-4.1.0-10.el8sat.src.rpm
foreman-discovery-image-service-1.0.0-4.1.el8sat.src.rpm
foreman-installer-3.5.2.1-1.el8sat.src.rpm
foreman-obsolete-packages-1.1-1.el8sat.src.rpm
foreman-proxy-3.5.1-1.el8sat.src.rpm
foreman-selinux-3.5.1-1.el8sat.src.rpm
katello-4.7.0-1.el8sat.src.rpm
katello-certs-tools-2.9.0-1.el8sat.src.rpm
katello-client-bootstrap-1.7.9-1.el8sat.src.rpm
katello-selinux-4.0.2-2.el8sat.src.rpm
libcomps-0.1.18-4.el8pc.src.rpm
libsodium-1.0.17-3.el8sat.src.rpm
libsolv-0.7.22-4.el8pc.src.rpm
libwebsockets-2.4.2-2.el8.src.rpm
mosquitto-2.0.14-1.el8sat.src.rpm
postgresql-evr-0.0.2-1.el8sat.src.rpm
pulpcore-selinux-1.3.2-1.el8pc.src.rpm
puppet-agent-7.12.1-1.el8sat.src.rpm
puppet-agent-oauth-0.5.10-1.el8sat.src.rpm
puppet-foreman_scap_client-0.4.0-1.el8sat.src.rpm
puppetlabs-stdlib-5.2.0-1.el8sat.src.rpm
puppetserver-7.9.3-1.el8sat.src.rpm
python-aiodns-3.0.0-3.el8pc.src.rpm
python-aiofiles-22.1.0-1.el8pc.src.rpm
python-aiohttp-3.8.1-3.el8pc.src.rpm
python-aiohttp-xmlrpc-1.5.0-2.el8pc.src.rpm
python-aioredis-2.0.1-2.el8pc.src.rpm
python-aiosignal-1.2.0-2.el8pc.src.rpm
python-ansible-builder-1.0.1-4.el8pc.src.rpm
python-asgiref-3.5.2-1.el8pc.src.rpm
python-async-lru-1.0.3-1.el8pc.src.rpm
python-async-timeout-4.0.2-2.el8pc.src.rpm
python-asyncio-throttle-1.0.2-3.el8pc.src.rpm
python-attrs-21.4.0-2.el8pc.src.rpm
python-backoff-2.1.2-1.el8pc.src.rpm
python-bindep-2.11.0-2.el8pc.src.rpm
python-bleach-3.3.1-2.el8pc.src.rpm
python-bleach-allowlist-1.0.3-3.el8pc.src.rpm
python-bracex-2.2.1-2.el8pc.src.rpm
python-brotli-1.0.9-2.el8pc.src.rpm
python-cchardet-2.1.7-4.el8pc.src.rpm
python-certifi-2020.6.20-3.el8pc.src.rpm
python-cffi-1.15.1-1.el8pc.src.rpm
python-chardet-5.0.0-1.el8pc.src.rpm
python-charset-normalizer-2.1.1-1.el8pc.src.rpm
python-click-8.1.3-1.el8pc.src.rpm
python-click-shell-2.1-3.el8pc.src.rpm
python-colorama-0.4.4-3.el8pc.src.rpm
python-commonmark-0.9.1-5.el8pc.src.rpm
python-contextlib2-21.6.0-3.el8pc.src.rpm
python-cryptography-3.4.8-1.el8pc.src.rpm
python-daemon-2.3.1-1.1.el8sat.src.rpm
python-dataclasses-0.8-3.el8pc.src.rpm
python-dateutil-2.8.2-2.el8pc.src.rpm
python-debian-0.1.43-2.el8pc.src.rpm
python-defusedxml-0.7.1-3.el8pc.src.rpm
python-deprecated-1.2.13-1.el8pc.src.rpm
python-diff-match-patch-20200713-3.el8pc.src.rpm
python-distro-1.7.0-1.el8pc.src.rpm
python-django-3.2.18-1.el8pc.src.rpm
python-django-currentuser-0.5.3-5.el8pc.src.rpm
python-django-filter-22.1-2.el8pc.src.rpm
python-django-guid-3.3.0-1.el8pc.src.rpm
python-django-import-export-2.8.0-1.el8pc.src.rpm
python-django-lifecycle-1.0.0-1.el8pc.src.rpm
python-django-readonly-field-1.1.1-3.el8pc.src.rpm
python-djangorestframework-3.13.1-2.el8pc.src.rpm
python-djangorestframework-queryfields-1.0.0-5.el8pc.src.rpm
python-docutils-0.19-1.1.el8sat.src.rpm
python-drf-access-policy-1.1.2-1.el8pc.src.rpm
python-drf-nested-routers-0.93.4-3.el8pc.src.rpm
python-drf-spectacular-0.23.1-1.el8pc.src.rpm
python-dynaconf-3.1.9-1.el8pc.src.rpm
python-ecdsa-0.14.1-2.el8pc.src.rpm
python-enrich-1.2.6-5.el8pc.src.rpm
python-et-xmlfile-1.1.0-2.el8pc.src.rpm
python-flake8-3.9.2-5.el8pc.src.rpm
python-frozenlist-1.3.0-2.el8pc.src.rpm
python-future-0.18.2-5.el8pc.src.rpm
python-galaxy-importer-0.4.5-1.el8pc.src.rpm
python-gitdb-4.0.9-2.el8pc.src.rpm
python-gitpython-3.1.26-3.el8pc.src.rpm
python-gnupg-0.5.0-1.el8pc.src.rpm
python-gunicorn-20.1.0-5.el8pc.src.rpm
python-idna-3.3-2.el8pc.src.rpm
python-idna-ssl-1.1.0-5.el8pc.src.rpm
python-importlib-metadata-4.10.1-2.el8pc.src.rpm
python-inflection-0.5.1-3.el8pc.src.rpm
python-iniparse-0.4-35.el8pc.src.rpm
python-jinja2-3.1.2-1.el8pc.src.rpm
python-jsonschema-4.9.1-1.el8pc.src.rpm
python-lockfile-0.12.2-1.el8sat.src.rpm
python-lxml-4.7.1-2.el8pc.src.rpm
python-markdown-3.3.6-3.el8pc.src.rpm
python-markuppy-1.14-3.el8pc.src.rpm
python-markupsafe-2.0.1-3.el8pc.src.rpm
python-mccabe-0.6.1-3.el8pc.src.rpm
python-multidict-6.0.2-2.el8pc.src.rpm
python-naya-1.1.1-3.el8pc.src.rpm
python-odfpy-1.4.1-6.el8pc.src.rpm
python-openpyxl-3.0.9-2.el8pc.src.rpm
python-packaging-21.3-1.1.el8sat.src.rpm
python-parsley-1.3-2.el8pc.src.rpm
python-pbr-5.8.0-4.el8pc.src.rpm
python-pexpect-4.8.0-2.el8sat.src.rpm
python-productmd-1.33-3.el8pc.src.rpm
python-protobuf-4.21.6-1.el8pc.src.rpm
python-psycopg2-2.9.3-2.el8pc.src.rpm
python-ptyprocess-0.7.0-1.el8sat.src.rpm
python-pulp-ansible-0.15.0-1.el8pc.src.rpm
python-pulp-certguard-1.5.5-1.el8pc.src.rpm
python-pulp-cli-0.14.0-4.el8pc.src.rpm
python-pulp-container-2.14.3-1.el8pc.src.rpm
python-pulp-deb-2.20.0-1.el8pc.src.rpm
python-pulp-file-1.11.1-1.el8pc.src.rpm
python-pulp-rpm-3.18.11-1.el8pc.src.rpm
python-pulp_manifest-3.0.0-3.el8pc.src.rpm
python-pulpcore-3.21.6-1.el8pc.src.rpm
python-pyOpenSSL-19.1.0-3.el8pc.src.rpm
python-pycairo-1.20.1-3.el8pc.src.rpm
python-pycares-4.1.2-2.el8pc.src.rpm
python-pycodestyle-2.7.0-5.el8pc.src.rpm
python-pycparser-2.21-2.el8pc.src.rpm
python-pycryptodomex-3.14.1-2.el8pc.src.rpm
python-pyflakes-2.3.1-5.el8pc.src.rpm
python-pygments-2.11.2-2.el8pc.src.rpm
python-pygobject-3.40.1-4.el8pc.src.rpm
python-pygtrie-2.5.0-1.el8pc.src.rpm
python-pyjwkest-1.4.2-6.el8pc.src.rpm
python-pyjwt-2.5.0-2.el8pc.src.rpm
python-pyparsing-2.4.7-3.el8pc.src.rpm
python-pyrsistent-0.18.1-2.el8pc.src.rpm
python-pytz-2022.2.1-1.el8pc.src.rpm
python-pyyaml-5.4.1-4.el8pc.src.rpm
python-qpid-1.37.0-1.el8.src.rpm
python-redis-4.3.4-1.el8pc.src.rpm
python-requests-2.28.1-1.el8pc.src.rpm
python-requirements-parser-0.2.0-3.el8pc.src.rpm
python-rhsm-1.19.2-3.el8pc.src.rpm
python-rich-10.12.0-3.el8pc.src.rpm
python-ruamel-yaml-0.17.20-2.el8pc.src.rpm
python-ruamel-yaml-clib-0.2.6-2.el8pc.src.rpm
python-schema-0.7.5-2.el8pc.src.rpm
python-semantic-version-2.10.0-1.el8pc.src.rpm
python-six-1.16.0-2.el8pc.src.rpm
python-smmap-5.0.0-2.el8pc.src.rpm
python-sqlparse-0.4.2-3.el8pc.src.rpm
python-tablib-3.2.0-3.el8pc.src.rpm
python-tenacity-7.0.0-3.el8pc.src.rpm
python-toml-0.10.2-3.el8pc.src.rpm
python-types-cryptography-3.3.23-1.el8pc.src.rpm
python-typing-extensions-3.10.0.2-2.el8pc.src.rpm
python-uritemplate-4.1.1-2.el8pc.src.rpm
python-url-normalize-1.4.3-4.el8pc.src.rpm
python-urllib3-1.26.8-2.el8pc.src.rpm
python-urlman-2.0.1-1.el8pc.src.rpm
python-wcmatch-8.3-2.el8pc.src.rpm
python-webencodings-0.5.1-3.el8pc.src.rpm
python-websockify-0.10.0-3.el8sat.src.rpm
python-whitenoise-6.0.0-1.el8pc.src.rpm
python-wrapt-1.14.1-1.el8pc.src.rpm
python-xlrd-2.0.1-5.el8pc.src.rpm
python-xlwt-1.3.0-3.el8pc.src.rpm
python-yarl-1.7.2-2.el8pc.src.rpm
python-zipp-3.4.0-4.el8pc.src.rpm
qpid-cpp-1.39.0-7.el8amq.src.rpm
qpid-dispatch-1.14.0-6.el8.src.rpm
qpid-proton-0.33.0-4.el8.src.rpm
redhat-access-insights-puppet-1.0.1-1.el8sat.src.rpm
rubygem-actioncable-6.1.7-1.el8sat.src.rpm
rubygem-actionmailbox-6.1.7-1.el8sat.src.rpm
rubygem-actionmailer-6.1.7-1.el8sat.src.rpm
rubygem-actionpack-6.1.7-1.el8sat.src.rpm
rubygem-actiontext-6.1.7-1.el8sat.src.rpm
rubygem-actionview-6.1.7-1.el8sat.src.rpm
rubygem-activejob-6.1.7-1.el8sat.src.rpm
rubygem-activemodel-6.1.7-1.el8sat.src.rpm
rubygem-activerecord-6.1.7-1.el8sat.src.rpm
rubygem-activerecord-import-1.4.1-1.el8sat.src.rpm
rubygem-activerecord-session_store-2.0.0-1.el8sat.src.rpm
rubygem-activestorage-6.1.7-1.el8sat.src.rpm
rubygem-activesupport-6.1.7-1.el8sat.src.rpm
rubygem-acts_as_list-1.0.3-2.el8sat.src.rpm
rubygem-addressable-2.8.1-1.el8sat.src.rpm
rubygem-algebrick-0.7.5-1.el8sat.src.rpm
rubygem-amazing_print-1.4.0-1.el8sat.src.rpm
rubygem-ancestry-4.2.0-1.el8sat.src.rpm
rubygem-anemone-0.7.2-23.el8sat.src.rpm
rubygem-angular-rails-templates-1.1.0-2.el8sat.src.rpm
rubygem-ansi-1.5.0-3.el8sat.src.rpm
rubygem-apipie-bindings-0.6.0-1.el8sat.src.rpm
rubygem-apipie-dsl-2.5.0-1.el8sat.src.rpm
rubygem-apipie-params-0.0.5-5.1.el8sat.src.rpm
rubygem-apipie-rails-0.8.2-1.1.el8sat.src.rpm
rubygem-audited-5.0.2-1.el8sat.src.rpm
rubygem-azure_mgmt_compute-0.22.0-1.el8sat.src.rpm
rubygem-azure_mgmt_network-0.26.1-2.el8sat.src.rpm
rubygem-azure_mgmt_resources-0.18.2-1.el8sat.src.rpm
rubygem-azure_mgmt_storage-0.23.0-1.el8sat.src.rpm
rubygem-azure_mgmt_subscriptions-0.18.5-1.el8sat.src.rpm
rubygem-bcrypt-3.1.18-1.el8sat.src.rpm
rubygem-builder-3.2.4-2.el8sat.src.rpm
rubygem-bundler_ext-0.4.1-6.el8sat.src.rpm
rubygem-clamp-1.1.2-7.el8sat.src.rpm
rubygem-coffee-rails-5.0.0-2.el8sat.src.rpm
rubygem-coffee-script-2.4.1-5.el8sat.src.rpm
rubygem-coffee-script-source-1.12.2-5.el8sat.src.rpm
rubygem-colorize-0.8.1-2.el8sat.src.rpm
rubygem-concurrent-ruby-1.1.10-1.el8sat.src.rpm
rubygem-concurrent-ruby-edge-0.6.0-3.el8sat.src.rpm
rubygem-connection_pool-2.3.0-1.el8sat.src.rpm
rubygem-crass-1.0.6-2.el8sat.src.rpm
rubygem-css_parser-1.12.0-1.el8sat.src.rpm
rubygem-daemons-1.4.1-1.el8sat.src.rpm
rubygem-deacon-1.0.0-5.el8sat.src.rpm
rubygem-declarative-0.0.20-1.el8sat.src.rpm
rubygem-deep_cloneable-3.2.0-1.el8sat.src.rpm
rubygem-deface-1.5.3-3.el8sat.src.rpm
rubygem-diffy-3.0.1-6.1.el8sat.src.rpm
rubygem-domain_name-0.5.20190701-1.el8sat.src.rpm
rubygem-dynflow-1.6.10-1.el8sat.src.rpm
rubygem-erubi-1.11.0-1.el8sat.src.rpm
rubygem-excon-0.93.1-1.el8sat.src.rpm
rubygem-execjs-2.8.1-1.el8sat.src.rpm
rubygem-facter-4.2.13-1.el8sat.src.rpm
rubygem-faraday-1.10.2-1.el8sat.src.rpm
rubygem-faraday-cookie_jar-0.0.6-2.el8sat.src.rpm
rubygem-faraday-em_http-1.0.0-1.el8sat.src.rpm
rubygem-faraday-em_synchrony-1.0.0-1.el8sat.src.rpm
rubygem-faraday-excon-1.1.0-1.el8sat.src.rpm
rubygem-faraday-httpclient-1.0.1-1.el8sat.src.rpm
rubygem-faraday-multipart-1.0.4-1.el8sat.src.rpm
rubygem-faraday-net_http-1.0.1-1.el8sat.src.rpm
rubygem-faraday-net_http_persistent-1.2.0-1.el8sat.src.rpm
rubygem-faraday-patron-1.0.0-1.el8sat.src.rpm
rubygem-faraday-rack-1.0.0-1.el8sat.src.rpm
rubygem-faraday-retry-1.0.3-1.el8sat.src.rpm
rubygem-faraday_middleware-1.2.0-1.el8sat.src.rpm
rubygem-fast_gettext-1.8.0-1.el8sat.src.rpm
rubygem-ffi-1.15.5-1.el8sat.src.rpm
rubygem-fog-aws-3.15.0-1.el8sat.src.rpm
rubygem-fog-core-2.2.4-1.el8sat.src.rpm
rubygem-fog-json-1.2.0-4.el8sat.src.rpm
rubygem-fog-kubevirt-1.3.3-2.el8sat.src.rpm
rubygem-fog-libvirt-0.9.0-1.el8sat.src.rpm
rubygem-fog-openstack-1.1.0-1.el8sat.src.rpm
rubygem-fog-ovirt-2.0.2-1.el8sat.src.rpm
rubygem-fog-vsphere-3.6.0-1.el8sat.src.rpm
rubygem-fog-xml-0.1.4-1.el8sat.src.rpm
rubygem-foreman-tasks-7.2.1-1.el8sat.src.rpm
rubygem-foreman_ansible-10.4.0-1.el8sat.src.rpm
rubygem-foreman_azure_rm-2.2.7-1.el8sat.src.rpm
rubygem-foreman_bootdisk-21.0.3-1.1.el8sat.src.rpm
rubygem-foreman_discovery-22.0.2-1.1.el8sat.src.rpm
rubygem-foreman_google-1.0.3-1.el8sat.src.rpm
rubygem-foreman_hooks-0.3.17-3.1.el8sat.src.rpm
rubygem-foreman_kubevirt-0.1.9-5.1.el8sat.src.rpm
rubygem-foreman_leapp-0.1.13-1.el8sat.src.rpm
rubygem-foreman_maintain-1.2.8-1.el8sat.src.rpm
rubygem-foreman_openscap-5.2.3-1.el8sat.src.rpm
rubygem-foreman_puppet-5.0.0-1.el8sat.src.rpm
rubygem-foreman_remote_execution-8.2.1-1.el8sat.src.rpm
rubygem-foreman_rh_cloud-7.0.45-1.el8sat.src.rpm
rubygem-foreman_scap_client-0.5.0-1.el8sat.src.rpm
rubygem-foreman_templates-9.3.0-2.1.el8sat.src.rpm
rubygem-foreman_theme_satellite-11.0.0.5-1.el8sat.src.rpm
rubygem-foreman_virt_who_configure-0.5.13-1.el8sat.src.rpm
rubygem-foreman_webhooks-3.0.5-1.1.el8sat.src.rpm
rubygem-formatador-0.3.0-1.el8sat.src.rpm
rubygem-friendly_id-5.4.2-1.el8sat.src.rpm
rubygem-fx-0.7.0-1.el8sat.src.rpm
rubygem-gapic-common-0.12.0-1.el8sat.src.rpm
rubygem-get_process_mem-0.2.7-2.1.el8sat.src.rpm
rubygem-gettext_i18n_rails-1.9.0-1.el8sat.src.rpm
rubygem-git-1.11.0-1.el8sat.src.rpm
rubygem-gitlab-sidekiq-fetcher-0.9.0-2.el8sat.src.rpm
rubygem-globalid-1.0.0-1.el8sat.src.rpm
rubygem-google-apis-compute_v1-0.54.0-1.el8sat.src.rpm
rubygem-google-apis-core-0.9.1-1.el8sat.src.rpm
rubygem-google-cloud-common-1.1.0-1.el8sat.src.rpm
rubygem-google-cloud-compute-0.5.0-1.el8sat.src.rpm
rubygem-google-cloud-compute-v1-1.7.1-1.el8sat.src.rpm
rubygem-google-cloud-core-1.6.0-1.el8sat.src.rpm
rubygem-google-cloud-env-1.6.0-1.el8sat.src.rpm
rubygem-google-cloud-errors-1.3.0-1.el8sat.src.rpm
rubygem-google-protobuf-3.21.6-1.el8sat.src.rpm
rubygem-googleapis-common-protos-1.3.12-1.el8sat.src.rpm
rubygem-googleapis-common-protos-types-1.4.0-1.el8sat.src.rpm
rubygem-googleauth-1.3.0-1.el8sat.src.rpm
rubygem-graphql-1.13.16-1.el8sat.src.rpm
rubygem-graphql-batch-0.5.1-1.el8sat.src.rpm
rubygem-grpc-1.49.1-1.el8sat.src.rpm
rubygem-gssapi-1.3.1-1.el8sat.src.rpm
rubygem-hammer_cli-3.5.1-1.el8sat.src.rpm
rubygem-hammer_cli_foreman-3.5.1-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_ansible-0.4.0-2.el8sat.src.rpm
rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_bootdisk-0.3.0-3.el8sat.src.rpm
rubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_google-1.0.0-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_kubevirt-0.1.5-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_leapp-0.1.1-2.el8sat.src.rpm
rubygem-hammer_cli_foreman_openscap-0.1.13-2.el8sat.src.rpm
rubygem-hammer_cli_foreman_puppet-0.0.6-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_tasks-0.0.18-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_templates-0.2.0-3.el8sat.src.rpm
rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-2.el8sat.src.rpm
rubygem-hammer_cli_foreman_webhooks-0.0.4-1.el8sat.src.rpm
rubygem-hammer_cli_katello-1.7.3-1.el8sat.src.rpm
rubygem-hashie-5.0.0-1.el8sat.src.rpm
rubygem-highline-2.0.3-2.el8sat.src.rpm
rubygem-hocon-1.3.1-2.el8sat.src.rpm
rubygem-http-3.3.0-2.el8sat.src.rpm
rubygem-http-accept-1.7.0-1.el8sat.src.rpm
rubygem-http-cookie-1.0.5-1.el8sat.src.rpm
rubygem-http-form_data-2.1.1-2.el8sat.src.rpm
rubygem-http_parser.rb-0.6.0-3.1.el8sat.src.rpm
rubygem-httpclient-2.8.3-4.el8sat.src.rpm
rubygem-i18n-1.12.0-1.el8sat.src.rpm
rubygem-infoblox-3.0.0-4.el8sat.src.rpm
rubygem-jgrep-1.3.3-11.el8sat.src.rpm
rubygem-journald-logger-3.1.0-1.el8sat.src.rpm
rubygem-journald-native-1.0.12-1.el8sat.src.rpm
rubygem-jwt-2.5.0-1.el8sat.src.rpm
rubygem-kafo-6.5.0-1.el8sat.src.rpm
rubygem-kafo_parsers-1.2.1-1.el8sat.src.rpm
rubygem-kafo_wizards-0.0.2-2.el8sat.src.rpm
rubygem-katello-4.7.0.23-1.el8sat.src.rpm
rubygem-kubeclient-4.3.0-2.el8sat.src.rpm
rubygem-ldap_fluff-0.6.0-1.el8sat.src.rpm
rubygem-little-plugger-1.1.4-3.el8sat.src.rpm
rubygem-locale-2.1.3-1.el8sat.src.rpm
rubygem-logging-2.3.1-1.el8sat.src.rpm
rubygem-logging-journald-2.1.0-1.el8sat.src.rpm
rubygem-loofah-2.19.1-1.el8sat.src.rpm
rubygem-mail-2.7.1-2.el8sat.src.rpm
rubygem-marcel-1.0.2-1.el8sat.src.rpm
rubygem-memoist-0.16.2-1.el8sat.src.rpm
rubygem-method_source-1.0.0-1.el8sat.src.rpm
rubygem-mime-types-3.4.1-1.el8sat.src.rpm
rubygem-mime-types-data-3.2022.0105-1.el8sat.src.rpm
rubygem-mini_mime-1.1.2-1.el8sat.src.rpm
rubygem-mqtt-0.5.0-1.el8sat.src.rpm
rubygem-ms_rest-0.7.6-1.el8sat.src.rpm
rubygem-ms_rest_azure-0.12.0-1.el8sat.src.rpm
rubygem-msgpack-1.6.0-1.el8sat.src.rpm
rubygem-multi_json-1.15.0-1.el8sat.src.rpm
rubygem-multipart-post-2.2.3-1.el8sat.src.rpm
rubygem-mustermann-2.0.2-1.el8sat.src.rpm
rubygem-net-ldap-0.17.1-1.el8sat.src.rpm
rubygem-net-ping-2.0.8-1.el8sat.src.rpm
rubygem-net-scp-4.0.0-1.el8sat.src.rpm
rubygem-net-ssh-7.0.1-1.el8sat.src.rpm
rubygem-net-ssh-krb-0.4.0-4.el8sat.src.rpm
rubygem-net_http_unix-0.2.2-2.el8sat.src.rpm
rubygem-netrc-0.11.0-6.el8sat.src.rpm
rubygem-newt-0.9.7-3.1.el8sat.src.rpm
rubygem-nio4r-2.5.8-1.el8sat.src.rpm
rubygem-nokogiri-1.13.9-1.el8sat.src.rpm
rubygem-oauth-1.1.0-1.el8sat.src.rpm
rubygem-oauth-tty-1.0.5-1.el8sat.src.rpm
rubygem-openscap-0.4.9-8.el8sat.src.rpm
rubygem-openscap_parser-1.0.2-2.el8sat.src.rpm
rubygem-optimist-3.0.1-1.el8sat.src.rpm
rubygem-os-1.1.4-1.el8sat.src.rpm
rubygem-ovirt-engine-sdk-4.4.1-1.el8sat.src.rpm
rubygem-ovirt_provision_plugin-2.0.3-3.el8sat.src.rpm
rubygem-parallel-1.22.1-1.el8sat.src.rpm
rubygem-parse-cron-0.1.4-5.el8sat.src.rpm
rubygem-pg-1.4.4-1.el8sat.src.rpm
rubygem-polyglot-0.3.5-3.1.el8sat.src.rpm
rubygem-powerbar-2.0.1-3.el8sat.src.rpm
rubygem-prometheus-client-1.0.0-3.el8sat.src.rpm
rubygem-promise.rb-0.7.4-3.el8sat.src.rpm
rubygem-public_suffix-5.0.0-1.el8sat.src.rpm
rubygem-pulp_ansible_client-0.15.0-1.el8sat.src.rpm
rubygem-pulp_certguard_client-1.5.5-1.el8sat.src.rpm
rubygem-pulp_container_client-2.14.2-1.el8sat.src.rpm
rubygem-pulp_deb_client-2.20.0-1.el8sat.src.rpm
rubygem-pulp_file_client-1.11.2-1.el8sat.src.rpm
rubygem-pulp_ostree_client-2.0.0-0.1.a1.el8sat.src.rpm
rubygem-pulp_python_client-3.7.3-1.el8sat.src.rpm
rubygem-pulp_rpm_client-3.18.7-1.el8sat.src.rpm
rubygem-pulpcore_client-3.21.2-1.el8sat.src.rpm
rubygem-puma-5.6.5-1.el8sat.src.rpm
rubygem-puma-status-1.3-1.el8sat.src.rpm
rubygem-qpid_proton-0.33.0-5.el8sat.src.rpm
rubygem-quantile-0.2.0-5.el8sat.src.rpm
rubygem-rabl-0.16.1-1.el8sat.src.rpm
rubygem-rack-2.2.4-1.el8sat.src.rpm
rubygem-rack-cors-1.1.1-1.el8sat.src.rpm
rubygem-rack-jsonp-1.3.1-10.el8sat.src.rpm
rubygem-rack-protection-2.2.2-1.el8sat.src.rpm
rubygem-rack-test-2.0.2-1.el8sat.src.rpm
rubygem-rails-6.1.7-1.el8sat.src.rpm
rubygem-rails-dom-testing-2.0.3-7.el8sat.src.rpm
rubygem-rails-html-sanitizer-1.4.4-1.el8sat.src.rpm
rubygem-rails-i18n-7.0.5-1.el8sat.src.rpm
rubygem-railties-6.1.7-1.el8sat.src.rpm
rubygem-rainbow-2.2.2-1.el8sat.src.rpm
rubygem-rb-inotify-0.10.1-1.el8sat.src.rpm
rubygem-rbnacl-4.0.2-2.el8sat.src.rpm
rubygem-rbvmomi2-3.6.0-2.el8sat.src.rpm
rubygem-rchardet-1.8.0-1.el8sat.src.rpm
rubygem-recursive-open-struct-1.1.0-2.el8sat.src.rpm
rubygem-redfish_client-0.5.4-1.el8sat.src.rpm
rubygem-redis-4.5.1-1.el8sat.src.rpm
rubygem-representable-3.2.0-1.el8sat.src.rpm
rubygem-responders-3.0.1-1.el8sat.src.rpm
rubygem-rest-client-2.1.0-1.el8sat.src.rpm
rubygem-retriable-3.1.2-3.el8sat.src.rpm
rubygem-rkerberos-0.1.5-20.1.el8sat.src.rpm
rubygem-roadie-5.0.1-1.el8sat.src.rpm
rubygem-roadie-rails-3.0.0-1.el8sat.src.rpm
rubygem-robotex-1.0.0-22.el8sat.src.rpm
rubygem-rsec-0.4.3-5.el8sat.src.rpm
rubygem-ruby-libvirt-0.8.0-1.el8sat.src.rpm
rubygem-ruby2_keywords-0.0.5-1.el8sat.src.rpm
rubygem-ruby2ruby-2.5.0-1.el8sat.src.rpm
rubygem-ruby_parser-3.19.1-1.el8sat.src.rpm
rubygem-rubyipmi-0.11.1-1.el8sat.src.rpm
rubygem-runcible-2.13.1-2.el8sat.src.rpm
rubygem-safemode-1.3.7-1.el8sat.src.rpm
rubygem-scoped_search-4.1.10-1.el8sat.src.rpm
rubygem-sd_notify-0.1.1-1.el8sat.src.rpm
rubygem-secure_headers-6.5.0-1.el8sat.src.rpm
rubygem-sequel-5.62.0-1.el8sat.src.rpm
rubygem-server_sent_events-0.1.3-1.el8sat.src.rpm
rubygem-sexp_processor-4.16.1-1.el8sat.src.rpm
rubygem-sidekiq-6.3.1-2.el8sat.src.rpm
rubygem-signet-0.17.0-1.el8sat.src.rpm
rubygem-sinatra-2.2.2-1.el8sat.src.rpm
rubygem-smart_proxy_ansible-3.5.0-1.el8sat.src.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.src.rpm
rubygem-smart_proxy_dhcp_infoblox-0.0.17-1.el8sat.src.rpm
rubygem-smart_proxy_dhcp_remote_isc-0.0.5-6.el8sat.src.rpm
rubygem-smart_proxy_discovery-1.0.5-9.el8sat.src.rpm
rubygem-smart_proxy_discovery_image-1.6.0-2.el8sat.src.rpm
rubygem-smart_proxy_dns_infoblox-1.1.0-7.el8sat.src.rpm
rubygem-smart_proxy_dynflow-0.9.0-1.el8sat.src.rpm
rubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.src.rpm
rubygem-smart_proxy_openscap-0.9.2-1.el8sat.src.rpm
rubygem-smart_proxy_pulp-3.2.0-3.el8sat.src.rpm
rubygem-smart_proxy_remote_execution_ssh-0.10.1-1.el8sat.src.rpm
rubygem-smart_proxy_shellhooks-0.9.2-3.el8sat.src.rpm
rubygem-snaky_hash-2.0.1-1.el8sat.src.rpm
rubygem-sprockets-4.1.1-1.el8sat.src.rpm
rubygem-sprockets-rails-3.4.2-1.el8sat.src.rpm
rubygem-sqlite3-1.4.2-1.el8sat.src.rpm
rubygem-sshkey-2.0.0-1.el8sat.src.rpm
rubygem-statsd-instrument-2.9.2-1.el8sat.src.rpm
rubygem-stomp-1.4.10-1.el8sat.src.rpm
rubygem-thor-1.2.1-1.el8sat.src.rpm
rubygem-tilt-2.0.11-1.el8sat.src.rpm
rubygem-timeliness-0.3.10-2.el8sat.src.rpm
rubygem-trailblazer-option-0.1.2-1.el8sat.src.rpm
rubygem-tzinfo-2.0.5-1.el8sat.src.rpm
rubygem-uber-0.1.0-3.el8sat.src.rpm
rubygem-unf-0.1.4-1.el8sat.src.rpm
rubygem-unf_ext-0.0.8.2-1.el8sat.src.rpm
rubygem-unicode-0.4.4.4-4.1.el8sat.src.rpm
rubygem-unicode-display_width-1.8.0-1.el8sat.src.rpm
rubygem-validates_lengths_from_database-0.8.0-1.el8sat.src.rpm
rubygem-version_gem-1.1.1-1.el8sat.src.rpm
rubygem-webpack-rails-0.9.11-1.el8sat.src.rpm
rubygem-webrick-1.7.0-1.el8sat.src.rpm
rubygem-websocket-driver-0.7.5-1.el8sat.src.rpm
rubygem-websocket-extensions-0.1.5-2.el8sat.src.rpm
rubygem-will_paginate-3.3.1-1.el8sat.src.rpm
rubygem-xmlrpc-0.3.2-1.el8sat.src.rpm
rubygem-zeitwerk-2.6.4-1.el8sat.src.rpm
saslwrapper-0.22-6.el8sat.src.rpm
satellite-6.13.0-6.el8sat.src.rpm
satellite-installer-6.13.0.7-1.el8sat.src.rpm
satellite-maintain-0.0.1-1.el8sat.src.rpm
yggdrasil-worker-forwarder-0.0.1-1.el8sat.src.rpm
noarch:
ansible-collection-redhat-satellite-3.9.0-2.el8sat.noarch.rpm
ansible-collection-redhat-satellite_operations-1.3.0-2.el8sat.noarch.rpm
ansible-lint-5.0.8-4.el8pc.noarch.rpm
ansible-runner-2.2.1-3.el8sat.noarch.rpm
ansiblerole-foreman_scap_client-0.2.0-2.el8sat.noarch.rpm
ansiblerole-insights-client-1.7.1-2.el8sat.noarch.rpm
candlepin-4.2.13-1.el8sat.noarch.rpm
candlepin-selinux-4.2.13-1.el8sat.noarch.rpm
foreman-3.5.1.14-1.el8sat.noarch.rpm
foreman-bootloaders-redhat-202102220000-1.el8sat.noarch.rpm
foreman-bootloaders-redhat-tftpboot-202102220000-1.el8sat.noarch.rpm
foreman-cli-3.5.1.14-1.el8sat.noarch.rpm
foreman-debug-3.5.1.14-1.el8sat.noarch.rpm
foreman-discovery-image-4.1.0-10.el8sat.noarch.rpm
foreman-dynflow-sidekiq-3.5.1.14-1.el8sat.noarch.rpm
foreman-ec2-3.5.1.14-1.el8sat.noarch.rpm
foreman-installer-3.5.2.1-1.el8sat.noarch.rpm
foreman-installer-katello-3.5.2.1-1.el8sat.noarch.rpm
foreman-journald-3.5.1.14-1.el8sat.noarch.rpm
foreman-libvirt-3.5.1.14-1.el8sat.noarch.rpm
foreman-obsolete-packages-1.1-1.el8sat.noarch.rpm
foreman-openstack-3.5.1.14-1.el8sat.noarch.rpm
foreman-ovirt-3.5.1.14-1.el8sat.noarch.rpm
foreman-postgresql-3.5.1.14-1.el8sat.noarch.rpm
foreman-proxy-3.5.1-1.el8sat.noarch.rpm
foreman-proxy-journald-3.5.1-1.el8sat.noarch.rpm
foreman-selinux-3.5.1-1.el8sat.noarch.rpm
foreman-service-3.5.1.14-1.el8sat.noarch.rpm
foreman-telemetry-3.5.1.14-1.el8sat.noarch.rpm
foreman-vmware-3.5.1.14-1.el8sat.noarch.rpm
katello-4.7.0-1.el8sat.noarch.rpm
katello-certs-tools-2.9.0-1.el8sat.noarch.rpm
katello-client-bootstrap-1.7.9-1.el8sat.noarch.rpm
katello-common-4.7.0-1.el8sat.noarch.rpm
katello-debug-4.7.0-1.el8sat.noarch.rpm
katello-selinux-4.0.2-2.el8sat.noarch.rpm
puppet-agent-oauth-0.5.10-1.el8sat.noarch.rpm
puppet-foreman_scap_client-0.4.0-1.el8sat.noarch.rpm
puppetlabs-stdlib-5.2.0-1.el8sat.noarch.rpm
puppetserver-7.9.3-1.el8sat.noarch.rpm
python2-qpid-1.37.0-1.el8.noarch.rpm
python3-websockify-0.10.0-3.el8sat.noarch.rpm
python39-aiodns-3.0.0-3.el8pc.noarch.rpm
python39-aiofiles-22.1.0-1.el8pc.noarch.rpm
python39-aiohttp-xmlrpc-1.5.0-2.el8pc.noarch.rpm
python39-aioredis-2.0.1-2.el8pc.noarch.rpm
python39-aiosignal-1.2.0-2.el8pc.noarch.rpm
python39-ansible-builder-1.0.1-4.el8pc.noarch.rpm
python39-ansible-runner-2.2.1-3.el8sat.noarch.rpm
python39-asgiref-3.5.2-1.el8pc.noarch.rpm
python39-async-lru-1.0.3-1.el8pc.noarch.rpm
python39-async-timeout-4.0.2-2.el8pc.noarch.rpm
python39-asyncio-throttle-1.0.2-3.el8pc.noarch.rpm
python39-attrs-21.4.0-2.el8pc.noarch.rpm
python39-backoff-2.1.2-1.el8pc.noarch.rpm
python39-bindep-2.11.0-2.el8pc.noarch.rpm
python39-bleach-3.3.1-2.el8pc.noarch.rpm
python39-bleach-allowlist-1.0.3-3.el8pc.noarch.rpm
python39-bracex-2.2.1-2.el8pc.noarch.rpm
python39-certifi-2020.6.20-3.el8pc.noarch.rpm
python39-chardet-5.0.0-1.el8pc.noarch.rpm
python39-charset-normalizer-2.1.1-1.el8pc.noarch.rpm
python39-click-8.1.3-1.el8pc.noarch.rpm
python39-click-shell-2.1-3.el8pc.noarch.rpm
python39-colorama-0.4.4-3.el8pc.noarch.rpm
python39-commonmark-0.9.1-5.el8pc.noarch.rpm
python39-contextlib2-21.6.0-3.el8pc.noarch.rpm
python39-daemon-2.3.1-1.1.el8sat.noarch.rpm
python39-dataclasses-0.8-3.el8pc.noarch.rpm
python39-dateutil-2.8.2-2.el8pc.noarch.rpm
python39-debian-0.1.43-2.el8pc.noarch.rpm
python39-defusedxml-0.7.1-3.el8pc.noarch.rpm
python39-deprecated-1.2.13-1.el8pc.noarch.rpm
python39-diff-match-patch-20200713-3.el8pc.noarch.rpm
python39-distro-1.7.0-1.el8pc.noarch.rpm
python39-django-3.2.18-1.el8pc.noarch.rpm
python39-django-currentuser-0.5.3-5.el8pc.noarch.rpm
python39-django-filter-22.1-2.el8pc.noarch.rpm
python39-django-guid-3.3.0-1.el8pc.noarch.rpm
python39-django-import-export-2.8.0-1.el8pc.noarch.rpm
python39-django-lifecycle-1.0.0-1.el8pc.noarch.rpm
python39-django-readonly-field-1.1.1-3.el8pc.noarch.rpm
python39-djangorestframework-3.13.1-2.el8pc.noarch.rpm
python39-djangorestframework-queryfields-1.0.0-5.el8pc.noarch.rpm
python39-docutils-0.19-1.1.el8sat.noarch.rpm
python39-drf-access-policy-1.1.2-1.el8pc.noarch.rpm
python39-drf-nested-routers-0.93.4-3.el8pc.noarch.rpm
python39-drf-spectacular-0.23.1-1.el8pc.noarch.rpm
python39-dynaconf-3.1.9-1.el8pc.noarch.rpm
python39-ecdsa-0.14.1-2.el8pc.noarch.rpm
python39-enrich-1.2.6-5.el8pc.noarch.rpm
python39-et-xmlfile-1.1.0-2.el8pc.noarch.rpm
python39-flake8-3.9.2-5.el8pc.noarch.rpm
python39-future-0.18.2-5.el8pc.noarch.rpm
python39-galaxy-importer-0.4.5-1.el8pc.noarch.rpm
python39-gitdb-4.0.9-2.el8pc.noarch.rpm
python39-gitpython-3.1.26-3.el8pc.noarch.rpm
python39-gnupg-0.5.0-1.el8pc.noarch.rpm
python39-gunicorn-20.1.0-5.el8pc.noarch.rpm
python39-idna-3.3-2.el8pc.noarch.rpm
python39-idna-ssl-1.1.0-5.el8pc.noarch.rpm
python39-importlib-metadata-4.10.1-2.el8pc.noarch.rpm
python39-inflection-0.5.1-3.el8pc.noarch.rpm
python39-iniparse-0.4-35.el8pc.noarch.rpm
python39-jinja2-3.1.2-1.el8pc.noarch.rpm
python39-jsonschema-4.9.1-1.el8pc.noarch.rpm
python39-lockfile-0.12.2-1.el8sat.noarch.rpm
python39-markdown-3.3.6-3.el8pc.noarch.rpm
python39-markuppy-1.14-3.el8pc.noarch.rpm
python39-mccabe-0.6.1-3.el8pc.noarch.rpm
python39-naya-1.1.1-3.el8pc.noarch.rpm
python39-odfpy-1.4.1-6.el8pc.noarch.rpm
python39-openpyxl-3.0.9-2.el8pc.noarch.rpm
python39-packaging-21.3-1.1.el8sat.noarch.rpm
python39-parsley-1.3-2.el8pc.noarch.rpm
python39-pbr-5.8.0-4.el8pc.noarch.rpm
python39-pexpect-4.8.0-2.el8sat.noarch.rpm
python39-productmd-1.33-3.el8pc.noarch.rpm
python39-protobuf-4.21.6-1.el8pc.noarch.rpm
python39-ptyprocess-0.7.0-1.el8sat.noarch.rpm
python39-pulp-ansible-0.15.0-1.el8pc.noarch.rpm
python39-pulp-certguard-1.5.5-1.el8pc.noarch.rpm
python39-pulp-cli-0.14.0-4.el8pc.noarch.rpm
python39-pulp-container-2.14.3-1.el8pc.noarch.rpm
python39-pulp-deb-2.20.0-1.el8pc.noarch.rpm
python39-pulp-file-1.11.1-1.el8pc.noarch.rpm
python39-pulp-rpm-3.18.11-1.el8pc.noarch.rpm
python39-pulp_manifest-3.0.0-3.el8pc.noarch.rpm
python39-pulpcore-3.21.6-1.el8pc.noarch.rpm
python39-pyOpenSSL-19.1.0-3.el8pc.noarch.rpm
python39-pycodestyle-2.7.0-5.el8pc.noarch.rpm
python39-pycparser-2.21-2.el8pc.noarch.rpm
python39-pyflakes-2.3.1-5.el8pc.noarch.rpm
python39-pygments-2.11.2-2.el8pc.noarch.rpm
python39-pygtrie-2.5.0-1.el8pc.noarch.rpm
python39-pyjwkest-1.4.2-6.el8pc.noarch.rpm
python39-pyjwt-2.5.0-2.el8pc.noarch.rpm
python39-pyparsing-2.4.7-3.el8pc.noarch.rpm
python39-pytz-2022.2.1-1.el8pc.noarch.rpm
python39-redis-4.3.4-1.el8pc.noarch.rpm
python39-requests-2.28.1-1.el8pc.noarch.rpm
python39-requirements-parser-0.2.0-3.el8pc.noarch.rpm
python39-rich-10.12.0-3.el8pc.noarch.rpm
python39-ruamel-yaml-0.17.20-2.el8pc.noarch.rpm
python39-schema-0.7.5-2.el8pc.noarch.rpm
python39-semantic-version-2.10.0-1.el8pc.noarch.rpm
python39-six-1.16.0-2.el8pc.noarch.rpm
python39-smmap-5.0.0-2.el8pc.noarch.rpm
python39-sqlparse-0.4.2-3.el8pc.noarch.rpm
python39-tablib-3.2.0-3.el8pc.noarch.rpm
python39-tenacity-7.0.0-3.el8pc.noarch.rpm
python39-toml-0.10.2-3.el8pc.noarch.rpm
python39-types-cryptography-3.3.23-1.el8pc.noarch.rpm
python39-typing-extensions-3.10.0.2-2.el8pc.noarch.rpm
python39-uritemplate-4.1.1-2.el8pc.noarch.rpm
python39-url-normalize-1.4.3-4.el8pc.noarch.rpm
python39-urllib3-1.26.8-2.el8pc.noarch.rpm
python39-urlman-2.0.1-1.el8pc.noarch.rpm
python39-wcmatch-8.3-2.el8pc.noarch.rpm
python39-webencodings-0.5.1-3.el8pc.noarch.rpm
python39-whitenoise-6.0.0-1.el8pc.noarch.rpm
python39-xlrd-2.0.1-5.el8pc.noarch.rpm
python39-xlwt-1.3.0-3.el8pc.noarch.rpm
python39-zipp-3.4.0-4.el8pc.noarch.rpm
qpid-dispatch-tools-1.14.0-6.el8.noarch.rpm
qpid-tools-1.39.0-7.el8amq.noarch.rpm
redhat-access-insights-puppet-1.0.1-1.el8sat.noarch.rpm
rubygem-actioncable-6.1.7-1.el8sat.noarch.rpm
rubygem-actionmailbox-6.1.7-1.el8sat.noarch.rpm
rubygem-actionmailer-6.1.7-1.el8sat.noarch.rpm
rubygem-actionpack-6.1.7-1.el8sat.noarch.rpm
rubygem-actiontext-6.1.7-1.el8sat.noarch.rpm
rubygem-actionview-6.1.7-1.el8sat.noarch.rpm
rubygem-activejob-6.1.7-1.el8sat.noarch.rpm
rubygem-activemodel-6.1.7-1.el8sat.noarch.rpm
rubygem-activerecord-6.1.7-1.el8sat.noarch.rpm
rubygem-activerecord-import-1.4.1-1.el8sat.noarch.rpm
rubygem-activerecord-session_store-2.0.0-1.el8sat.noarch.rpm
rubygem-activestorage-6.1.7-1.el8sat.noarch.rpm
rubygem-activesupport-6.1.7-1.el8sat.noarch.rpm
rubygem-acts_as_list-1.0.3-2.el8sat.noarch.rpm
rubygem-addressable-2.8.1-1.el8sat.noarch.rpm
rubygem-algebrick-0.7.5-1.el8sat.noarch.rpm
rubygem-amazing_print-1.4.0-1.el8sat.noarch.rpm
rubygem-ancestry-4.2.0-1.el8sat.noarch.rpm
rubygem-anemone-0.7.2-23.el8sat.noarch.rpm
rubygem-angular-rails-templates-1.1.0-2.el8sat.noarch.rpm
rubygem-ansi-1.5.0-3.el8sat.noarch.rpm
rubygem-apipie-bindings-0.6.0-1.el8sat.noarch.rpm
rubygem-apipie-dsl-2.5.0-1.el8sat.noarch.rpm
rubygem-apipie-params-0.0.5-5.1.el8sat.noarch.rpm
rubygem-apipie-rails-0.8.2-1.1.el8sat.noarch.rpm
rubygem-audited-5.0.2-1.el8sat.noarch.rpm
rubygem-azure_mgmt_compute-0.22.0-1.el8sat.noarch.rpm
rubygem-azure_mgmt_network-0.26.1-2.el8sat.noarch.rpm
rubygem-azure_mgmt_resources-0.18.2-1.el8sat.noarch.rpm
rubygem-azure_mgmt_storage-0.23.0-1.el8sat.noarch.rpm
rubygem-azure_mgmt_subscriptions-0.18.5-1.el8sat.noarch.rpm
rubygem-builder-3.2.4-2.el8sat.noarch.rpm
rubygem-bundler_ext-0.4.1-6.el8sat.noarch.rpm
rubygem-clamp-1.1.2-7.el8sat.noarch.rpm
rubygem-coffee-rails-5.0.0-2.el8sat.noarch.rpm
rubygem-coffee-script-2.4.1-5.el8sat.noarch.rpm
rubygem-coffee-script-source-1.12.2-5.el8sat.noarch.rpm
rubygem-colorize-0.8.1-2.el8sat.noarch.rpm
rubygem-concurrent-ruby-1.1.10-1.el8sat.noarch.rpm
rubygem-concurrent-ruby-edge-0.6.0-3.el8sat.noarch.rpm
rubygem-connection_pool-2.3.0-1.el8sat.noarch.rpm
rubygem-crass-1.0.6-2.el8sat.noarch.rpm
rubygem-css_parser-1.12.0-1.el8sat.noarch.rpm
rubygem-daemons-1.4.1-1.el8sat.noarch.rpm
rubygem-deacon-1.0.0-5.el8sat.noarch.rpm
rubygem-declarative-0.0.20-1.el8sat.noarch.rpm
rubygem-deep_cloneable-3.2.0-1.el8sat.noarch.rpm
rubygem-deface-1.5.3-3.el8sat.noarch.rpm
rubygem-diffy-3.0.1-6.1.el8sat.noarch.rpm
rubygem-domain_name-0.5.20190701-1.el8sat.noarch.rpm
rubygem-dynflow-1.6.10-1.el8sat.noarch.rpm
rubygem-erubi-1.11.0-1.el8sat.noarch.rpm
rubygem-excon-0.93.1-1.el8sat.noarch.rpm
rubygem-execjs-2.8.1-1.el8sat.noarch.rpm
rubygem-facter-4.2.13-1.el8sat.noarch.rpm
rubygem-faraday-1.10.2-1.el8sat.noarch.rpm
rubygem-faraday-cookie_jar-0.0.6-2.el8sat.noarch.rpm
rubygem-faraday-em_http-1.0.0-1.el8sat.noarch.rpm
rubygem-faraday-em_synchrony-1.0.0-1.el8sat.noarch.rpm
rubygem-faraday-excon-1.1.0-1.el8sat.noarch.rpm
rubygem-faraday-httpclient-1.0.1-1.el8sat.noarch.rpm
rubygem-faraday-multipart-1.0.4-1.el8sat.noarch.rpm
rubygem-faraday-net_http-1.0.1-1.el8sat.noarch.rpm
rubygem-faraday-net_http_persistent-1.2.0-1.el8sat.noarch.rpm
rubygem-faraday-patron-1.0.0-1.el8sat.noarch.rpm
rubygem-faraday-rack-1.0.0-1.el8sat.noarch.rpm
rubygem-faraday-retry-1.0.3-1.el8sat.noarch.rpm
rubygem-faraday_middleware-1.2.0-1.el8sat.noarch.rpm
rubygem-fast_gettext-1.8.0-1.el8sat.noarch.rpm
rubygem-fog-aws-3.15.0-1.el8sat.noarch.rpm
rubygem-fog-core-2.2.4-1.el8sat.noarch.rpm
rubygem-fog-json-1.2.0-4.el8sat.noarch.rpm
rubygem-fog-kubevirt-1.3.3-2.el8sat.noarch.rpm
rubygem-fog-libvirt-0.9.0-1.el8sat.noarch.rpm
rubygem-fog-openstack-1.1.0-1.el8sat.noarch.rpm
rubygem-fog-ovirt-2.0.2-1.el8sat.noarch.rpm
rubygem-fog-vsphere-3.6.0-1.el8sat.noarch.rpm
rubygem-fog-xml-0.1.4-1.el8sat.noarch.rpm
rubygem-foreman-tasks-7.2.1-1.el8sat.noarch.rpm
rubygem-foreman_ansible-10.4.0-1.el8sat.noarch.rpm
rubygem-foreman_azure_rm-2.2.7-1.el8sat.noarch.rpm
rubygem-foreman_bootdisk-21.0.3-1.1.el8sat.noarch.rpm
rubygem-foreman_discovery-22.0.2-1.1.el8sat.noarch.rpm
rubygem-foreman_google-1.0.3-1.el8sat.noarch.rpm
rubygem-foreman_hooks-0.3.17-3.1.el8sat.noarch.rpm
rubygem-foreman_kubevirt-0.1.9-5.1.el8sat.noarch.rpm
rubygem-foreman_leapp-0.1.13-1.el8sat.noarch.rpm
rubygem-foreman_maintain-1.2.8-1.el8sat.noarch.rpm
rubygem-foreman_openscap-5.2.3-1.el8sat.noarch.rpm
rubygem-foreman_puppet-5.0.0-1.el8sat.noarch.rpm
rubygem-foreman_remote_execution-8.2.1-1.el8sat.noarch.rpm
rubygem-foreman_remote_execution-cockpit-8.2.1-1.el8sat.noarch.rpm
rubygem-foreman_rh_cloud-7.0.45-1.el8sat.noarch.rpm
rubygem-foreman_scap_client-0.5.0-1.el8sat.noarch.rpm
rubygem-foreman_templates-9.3.0-2.1.el8sat.noarch.rpm
rubygem-foreman_theme_satellite-11.0.0.5-1.el8sat.noarch.rpm
rubygem-foreman_virt_who_configure-0.5.13-1.el8sat.noarch.rpm
rubygem-foreman_webhooks-3.0.5-1.1.el8sat.noarch.rpm
rubygem-formatador-0.3.0-1.el8sat.noarch.rpm
rubygem-friendly_id-5.4.2-1.el8sat.noarch.rpm
rubygem-fx-0.7.0-1.el8sat.noarch.rpm
rubygem-gapic-common-0.12.0-1.el8sat.noarch.rpm
rubygem-get_process_mem-0.2.7-2.1.el8sat.noarch.rpm
rubygem-gettext_i18n_rails-1.9.0-1.el8sat.noarch.rpm
rubygem-git-1.11.0-1.el8sat.noarch.rpm
rubygem-gitlab-sidekiq-fetcher-0.9.0-2.el8sat.noarch.rpm
rubygem-globalid-1.0.0-1.el8sat.noarch.rpm
rubygem-google-apis-compute_v1-0.54.0-1.el8sat.noarch.rpm
rubygem-google-apis-core-0.9.1-1.el8sat.noarch.rpm
rubygem-google-cloud-common-1.1.0-1.el8sat.noarch.rpm
rubygem-google-cloud-compute-0.5.0-1.el8sat.noarch.rpm
rubygem-google-cloud-compute-v1-1.7.1-1.el8sat.noarch.rpm
rubygem-google-cloud-core-1.6.0-1.el8sat.noarch.rpm
rubygem-google-cloud-env-1.6.0-1.el8sat.noarch.rpm
rubygem-google-cloud-errors-1.3.0-1.el8sat.noarch.rpm
rubygem-googleapis-common-protos-1.3.12-1.el8sat.noarch.rpm
rubygem-googleapis-common-protos-types-1.4.0-1.el8sat.noarch.rpm
rubygem-googleauth-1.3.0-1.el8sat.noarch.rpm
rubygem-graphql-1.13.16-1.el8sat.noarch.rpm
rubygem-graphql-batch-0.5.1-1.el8sat.noarch.rpm
rubygem-gssapi-1.3.1-1.el8sat.noarch.rpm
rubygem-hammer_cli-3.5.1-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman-3.5.1-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_ansible-0.4.0-2.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_bootdisk-0.3.0-3.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_google-1.0.0-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_kubevirt-0.1.5-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_leapp-0.1.1-2.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_openscap-0.1.13-2.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_puppet-0.0.6-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_tasks-0.0.18-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_templates-0.2.0-3.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-2.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_webhooks-0.0.4-1.el8sat.noarch.rpm
rubygem-hammer_cli_katello-1.7.3-1.el8sat.noarch.rpm
rubygem-hashie-5.0.0-1.el8sat.noarch.rpm
rubygem-highline-2.0.3-2.el8sat.noarch.rpm
rubygem-hocon-1.3.1-2.el8sat.noarch.rpm
rubygem-http-3.3.0-2.el8sat.noarch.rpm
rubygem-http-accept-1.7.0-1.el8sat.noarch.rpm
rubygem-http-cookie-1.0.5-1.el8sat.noarch.rpm
rubygem-http-form_data-2.1.1-2.el8sat.noarch.rpm
rubygem-httpclient-2.8.3-4.el8sat.noarch.rpm
rubygem-i18n-1.12.0-1.el8sat.noarch.rpm
rubygem-infoblox-3.0.0-4.el8sat.noarch.rpm
rubygem-jgrep-1.3.3-11.el8sat.noarch.rpm
rubygem-journald-logger-3.1.0-1.el8sat.noarch.rpm
rubygem-jwt-2.5.0-1.el8sat.noarch.rpm
rubygem-kafo-6.5.0-1.el8sat.noarch.rpm
rubygem-kafo_parsers-1.2.1-1.el8sat.noarch.rpm
rubygem-kafo_wizards-0.0.2-2.el8sat.noarch.rpm
rubygem-katello-4.7.0.23-1.el8sat.noarch.rpm
rubygem-kubeclient-4.3.0-2.el8sat.noarch.rpm
rubygem-ldap_fluff-0.6.0-1.el8sat.noarch.rpm
rubygem-little-plugger-1.1.4-3.el8sat.noarch.rpm
rubygem-locale-2.1.3-1.el8sat.noarch.rpm
rubygem-logging-2.3.1-1.el8sat.noarch.rpm
rubygem-logging-journald-2.1.0-1.el8sat.noarch.rpm
rubygem-loofah-2.19.1-1.el8sat.noarch.rpm
rubygem-mail-2.7.1-2.el8sat.noarch.rpm
rubygem-marcel-1.0.2-1.el8sat.noarch.rpm
rubygem-memoist-0.16.2-1.el8sat.noarch.rpm
rubygem-method_source-1.0.0-1.el8sat.noarch.rpm
rubygem-mime-types-3.4.1-1.el8sat.noarch.rpm
rubygem-mime-types-data-3.2022.0105-1.el8sat.noarch.rpm
rubygem-mini_mime-1.1.2-1.el8sat.noarch.rpm
rubygem-mqtt-0.5.0-1.el8sat.noarch.rpm
rubygem-ms_rest-0.7.6-1.el8sat.noarch.rpm
rubygem-ms_rest_azure-0.12.0-1.el8sat.noarch.rpm
rubygem-multi_json-1.15.0-1.el8sat.noarch.rpm
rubygem-multipart-post-2.2.3-1.el8sat.noarch.rpm
rubygem-mustermann-2.0.2-1.el8sat.noarch.rpm
rubygem-net-ldap-0.17.1-1.el8sat.noarch.rpm
rubygem-net-ping-2.0.8-1.el8sat.noarch.rpm
rubygem-net-scp-4.0.0-1.el8sat.noarch.rpm
rubygem-net-ssh-7.0.1-1.el8sat.noarch.rpm
rubygem-net-ssh-krb-0.4.0-4.el8sat.noarch.rpm
rubygem-net_http_unix-0.2.2-2.el8sat.noarch.rpm
rubygem-netrc-0.11.0-6.el8sat.noarch.rpm
rubygem-oauth-1.1.0-1.el8sat.noarch.rpm
rubygem-oauth-tty-1.0.5-1.el8sat.noarch.rpm
rubygem-openscap-0.4.9-8.el8sat.noarch.rpm
rubygem-openscap_parser-1.0.2-2.el8sat.noarch.rpm
rubygem-optimist-3.0.1-1.el8sat.noarch.rpm
rubygem-os-1.1.4-1.el8sat.noarch.rpm
rubygem-ovirt_provision_plugin-2.0.3-3.el8sat.noarch.rpm
rubygem-parallel-1.22.1-1.el8sat.noarch.rpm
rubygem-parse-cron-0.1.4-5.el8sat.noarch.rpm
rubygem-polyglot-0.3.5-3.1.el8sat.noarch.rpm
rubygem-powerbar-2.0.1-3.el8sat.noarch.rpm
rubygem-prometheus-client-1.0.0-3.el8sat.noarch.rpm
rubygem-promise.rb-0.7.4-3.el8sat.noarch.rpm
rubygem-public_suffix-5.0.0-1.el8sat.noarch.rpm
rubygem-pulp_ansible_client-0.15.0-1.el8sat.noarch.rpm
rubygem-pulp_certguard_client-1.5.5-1.el8sat.noarch.rpm
rubygem-pulp_container_client-2.14.2-1.el8sat.noarch.rpm
rubygem-pulp_deb_client-2.20.0-1.el8sat.noarch.rpm
rubygem-pulp_file_client-1.11.2-1.el8sat.noarch.rpm
rubygem-pulp_ostree_client-2.0.0-0.1.a1.el8sat.noarch.rpm
rubygem-pulp_python_client-3.7.3-1.el8sat.noarch.rpm
rubygem-pulp_rpm_client-3.18.7-1.el8sat.noarch.rpm
rubygem-pulpcore_client-3.21.2-1.el8sat.noarch.rpm
rubygem-puma-status-1.3-1.el8sat.noarch.rpm
rubygem-quantile-0.2.0-5.el8sat.noarch.rpm
rubygem-rabl-0.16.1-1.el8sat.noarch.rpm
rubygem-rack-2.2.4-1.el8sat.noarch.rpm
rubygem-rack-cors-1.1.1-1.el8sat.noarch.rpm
rubygem-rack-jsonp-1.3.1-10.el8sat.noarch.rpm
rubygem-rack-protection-2.2.2-1.el8sat.noarch.rpm
rubygem-rack-test-2.0.2-1.el8sat.noarch.rpm
rubygem-rails-6.1.7-1.el8sat.noarch.rpm
rubygem-rails-dom-testing-2.0.3-7.el8sat.noarch.rpm
rubygem-rails-html-sanitizer-1.4.4-1.el8sat.noarch.rpm
rubygem-rails-i18n-7.0.5-1.el8sat.noarch.rpm
rubygem-railties-6.1.7-1.el8sat.noarch.rpm
rubygem-rainbow-2.2.2-1.el8sat.noarch.rpm
rubygem-rb-inotify-0.10.1-1.el8sat.noarch.rpm
rubygem-rbnacl-4.0.2-2.el8sat.noarch.rpm
rubygem-rbvmomi2-3.6.0-2.el8sat.noarch.rpm
rubygem-rchardet-1.8.0-1.el8sat.noarch.rpm
rubygem-recursive-open-struct-1.1.0-2.el8sat.noarch.rpm
rubygem-redfish_client-0.5.4-1.el8sat.noarch.rpm
rubygem-redis-4.5.1-1.el8sat.noarch.rpm
rubygem-representable-3.2.0-1.el8sat.noarch.rpm
rubygem-responders-3.0.1-1.el8sat.noarch.rpm
rubygem-rest-client-2.1.0-1.el8sat.noarch.rpm
rubygem-retriable-3.1.2-3.el8sat.noarch.rpm
rubygem-roadie-5.0.1-1.el8sat.noarch.rpm
rubygem-roadie-rails-3.0.0-1.el8sat.noarch.rpm
rubygem-robotex-1.0.0-22.el8sat.noarch.rpm
rubygem-rsec-0.4.3-5.el8sat.noarch.rpm
rubygem-ruby2_keywords-0.0.5-1.el8sat.noarch.rpm
rubygem-ruby2ruby-2.5.0-1.el8sat.noarch.rpm
rubygem-ruby_parser-3.19.1-1.el8sat.noarch.rpm
rubygem-rubyipmi-0.11.1-1.el8sat.noarch.rpm
rubygem-runcible-2.13.1-2.el8sat.noarch.rpm
rubygem-safemode-1.3.7-1.el8sat.noarch.rpm
rubygem-scoped_search-4.1.10-1.el8sat.noarch.rpm
rubygem-sd_notify-0.1.1-1.el8sat.noarch.rpm
rubygem-secure_headers-6.5.0-1.el8sat.noarch.rpm
rubygem-sequel-5.62.0-1.el8sat.noarch.rpm
rubygem-server_sent_events-0.1.3-1.el8sat.noarch.rpm
rubygem-sexp_processor-4.16.1-1.el8sat.noarch.rpm
rubygem-sidekiq-6.3.1-2.el8sat.noarch.rpm
rubygem-signet-0.17.0-1.el8sat.noarch.rpm
rubygem-sinatra-2.2.2-1.el8sat.noarch.rpm
rubygem-smart_proxy_ansible-3.5.0-1.el8sat.noarch.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.noarch.rpm
rubygem-smart_proxy_dhcp_infoblox-0.0.17-1.el8sat.noarch.rpm
rubygem-smart_proxy_dhcp_remote_isc-0.0.5-6.el8sat.noarch.rpm
rubygem-smart_proxy_discovery-1.0.5-9.el8sat.noarch.rpm
rubygem-smart_proxy_discovery_image-1.6.0-2.el8sat.noarch.rpm
rubygem-smart_proxy_dns_infoblox-1.1.0-7.el8sat.noarch.rpm
rubygem-smart_proxy_dynflow-0.9.0-1.el8sat.noarch.rpm
rubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.noarch.rpm
rubygem-smart_proxy_openscap-0.9.2-1.el8sat.noarch.rpm
rubygem-smart_proxy_pulp-3.2.0-3.el8sat.noarch.rpm
rubygem-smart_proxy_remote_execution_ssh-0.10.1-1.el8sat.noarch.rpm
rubygem-smart_proxy_shellhooks-0.9.2-3.el8sat.noarch.rpm
rubygem-snaky_hash-2.0.1-1.el8sat.noarch.rpm
rubygem-sprockets-4.1.1-1.el8sat.noarch.rpm
rubygem-sprockets-rails-3.4.2-1.el8sat.noarch.rpm
rubygem-sshkey-2.0.0-1.el8sat.noarch.rpm
rubygem-statsd-instrument-2.9.2-1.el8sat.noarch.rpm
rubygem-stomp-1.4.10-1.el8sat.noarch.rpm
rubygem-thor-1.2.1-1.el8sat.noarch.rpm
rubygem-tilt-2.0.11-1.el8sat.noarch.rpm
rubygem-timeliness-0.3.10-2.el8sat.noarch.rpm
rubygem-trailblazer-option-0.1.2-1.el8sat.noarch.rpm
rubygem-tzinfo-2.0.5-1.el8sat.noarch.rpm
rubygem-uber-0.1.0-3.el8sat.noarch.rpm
rubygem-unf-0.1.4-1.el8sat.noarch.rpm
rubygem-unicode-display_width-1.8.0-1.el8sat.noarch.rpm
rubygem-validates_lengths_from_database-0.8.0-1.el8sat.noarch.rpm
rubygem-version_gem-1.1.1-1.el8sat.noarch.rpm
rubygem-webpack-rails-0.9.11-1.el8sat.noarch.rpm
rubygem-webrick-1.7.0-1.el8sat.noarch.rpm
rubygem-websocket-extensions-0.1.5-2.el8sat.noarch.rpm
rubygem-will_paginate-3.3.1-1.el8sat.noarch.rpm
rubygem-xmlrpc-0.3.2-1.el8sat.noarch.rpm
rubygem-zeitwerk-2.6.4-1.el8sat.noarch.rpm
satellite-6.13.0-6.el8sat.noarch.rpm
satellite-cli-6.13.0-6.el8sat.noarch.rpm
satellite-common-6.13.0-6.el8sat.noarch.rpm
satellite-installer-6.13.0.7-1.el8sat.noarch.rpm
satellite-maintain-0.0.1-1.el8sat.noarch.rpm
x86_64:
cjson-1.7.14-5.el8sat.x86_64.rpm
cjson-debuginfo-1.7.14-5.el8sat.x86_64.rpm
cjson-debugsource-1.7.14-5.el8sat.x86_64.rpm
createrepo_c-0.20.1-1.el8pc.x86_64.rpm
createrepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpm
createrepo_c-debugsource-0.20.1-1.el8pc.x86_64.rpm
createrepo_c-libs-0.20.1-1.el8pc.x86_64.rpm
createrepo_c-libs-debuginfo-0.20.1-1.el8pc.x86_64.rpm
dynflow-utils-1.6.3-1.el8sat.x86_64.rpm
foreman-discovery-image-service-1.0.0-4.1.el8sat.x86_64.rpm
foreman-discovery-image-service-tui-1.0.0-4.1.el8sat.x86_64.rpm
libcomps-0.1.18-4.el8pc.x86_64.rpm
libcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpm
libcomps-debugsource-0.1.18-4.el8pc.x86_64.rpm
libdb-cxx-5.3.28-42.el8_4.x86_64.rpm
libdb-cxx-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-debugsource-5.3.28-42.el8_4.x86_64.rpm
libdb-java-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-sql-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-sql-devel-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-tcl-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-utils-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libsodium-1.0.17-3.el8sat.x86_64.rpm
libsodium-debuginfo-1.0.17-3.el8sat.x86_64.rpm
libsodium-debugsource-1.0.17-3.el8sat.x86_64.rpm
libsolv-0.7.22-4.el8pc.x86_64.rpm
libsolv-debuginfo-0.7.22-4.el8pc.x86_64.rpm
libsolv-debugsource-0.7.22-4.el8pc.x86_64.rpm
libsolv-demo-debuginfo-0.7.22-4.el8pc.x86_64.rpm
libsolv-tools-debuginfo-0.7.22-4.el8pc.x86_64.rpm
libwebsockets-2.4.2-2.el8.x86_64.rpm
libwebsockets-debuginfo-2.4.2-2.el8.x86_64.rpm
libwebsockets-debugsource-2.4.2-2.el8.x86_64.rpm
libwebsockets-tests-debuginfo-2.4.2-2.el8.x86_64.rpm
mosquitto-2.0.14-1.el8sat.x86_64.rpm
mosquitto-debuginfo-2.0.14-1.el8sat.x86_64.rpm
mosquitto-debugsource-2.0.14-1.el8sat.x86_64.rpm
postgresql-evr-0.0.2-1.el8sat.x86_64.rpm
pulpcore-selinux-1.3.2-1.el8pc.x86_64.rpm
puppet-agent-7.12.1-1.el8sat.x86_64.rpm
python-aiohttp-debugsource-3.8.1-3.el8pc.x86_64.rpm
python-brotli-debugsource-1.0.9-2.el8pc.x86_64.rpm
python-cchardet-debugsource-2.1.7-4.el8pc.x86_64.rpm
python-cffi-debugsource-1.15.1-1.el8pc.x86_64.rpm
python-cryptography-debugsource-3.4.8-1.el8pc.x86_64.rpm
python-frozenlist-debugsource-1.3.0-2.el8pc.x86_64.rpm
python-lxml-debugsource-4.7.1-2.el8pc.x86_64.rpm
python-markupsafe-debugsource-2.0.1-3.el8pc.x86_64.rpm
python-multidict-debugsource-6.0.2-2.el8pc.x86_64.rpm
python-psycopg2-debugsource-2.9.3-2.el8pc.x86_64.rpm
python-pycairo-debugsource-1.20.1-3.el8pc.x86_64.rpm
python-pycares-debugsource-4.1.2-2.el8pc.x86_64.rpm
python-pycryptodomex-debugsource-3.14.1-2.el8pc.x86_64.rpm
python-pygobject-debugsource-3.40.1-4.el8pc.x86_64.rpm
python-pyrsistent-debugsource-0.18.1-2.el8pc.x86_64.rpm
python-rhsm-debugsource-1.19.2-3.el8pc.x86_64.rpm
python-ruamel-yaml-clib-debugsource-0.2.6-2.el8pc.x86_64.rpm
python-wrapt-debugsource-1.14.1-1.el8pc.x86_64.rpm
python-yarl-debugsource-1.7.2-2.el8pc.x86_64.rpm
python2-qpid-qmf-1.39.0-7.el8amq.x86_64.rpm
python2-saslwrapper-0.22-6.el8sat.x86_64.rpm
python2-saslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpm
python3-createrepo_c-0.20.1-1.el8pc.x86_64.rpm
python3-createrepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpm
python3-libcomps-0.1.18-4.el8pc.x86_64.rpm
python3-libcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpm
python3-qpid-proton-0.33.0-4.el8.x86_64.rpm
python3-qpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpm
python3-solv-0.7.22-4.el8pc.x86_64.rpm
python3-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpm
python39-aiohttp-3.8.1-3.el8pc.x86_64.rpm
python39-aiohttp-debuginfo-3.8.1-3.el8pc.x86_64.rpm
python39-brotli-1.0.9-2.el8pc.x86_64.rpm
python39-brotli-debuginfo-1.0.9-2.el8pc.x86_64.rpm
python39-cchardet-2.1.7-4.el8pc.x86_64.rpm
python39-cchardet-debuginfo-2.1.7-4.el8pc.x86_64.rpm
python39-cffi-1.15.1-1.el8pc.x86_64.rpm
python39-cffi-debuginfo-1.15.1-1.el8pc.x86_64.rpm
python39-createrepo_c-0.20.1-1.el8pc.x86_64.rpm
python39-createrepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpm
python39-cryptography-3.4.8-1.el8pc.x86_64.rpm
python39-cryptography-debuginfo-3.4.8-1.el8pc.x86_64.rpm
python39-frozenlist-1.3.0-2.el8pc.x86_64.rpm
python39-frozenlist-debuginfo-1.3.0-2.el8pc.x86_64.rpm
python39-libcomps-0.1.18-4.el8pc.x86_64.rpm
python39-libcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpm
python39-lxml-4.7.1-2.el8pc.x86_64.rpm
python39-lxml-debuginfo-4.7.1-2.el8pc.x86_64.rpm
python39-markupsafe-2.0.1-3.el8pc.x86_64.rpm
python39-markupsafe-debuginfo-2.0.1-3.el8pc.x86_64.rpm
python39-multidict-6.0.2-2.el8pc.x86_64.rpm
python39-multidict-debuginfo-6.0.2-2.el8pc.x86_64.rpm
python39-psycopg2-2.9.3-2.el8pc.x86_64.rpm
python39-psycopg2-debuginfo-2.9.3-2.el8pc.x86_64.rpm
python39-pycairo-1.20.1-3.el8pc.x86_64.rpm
python39-pycairo-debuginfo-1.20.1-3.el8pc.x86_64.rpm
python39-pycares-4.1.2-2.el8pc.x86_64.rpm
python39-pycares-debuginfo-4.1.2-2.el8pc.x86_64.rpm
python39-pycryptodomex-3.14.1-2.el8pc.x86_64.rpm
python39-pycryptodomex-debuginfo-3.14.1-2.el8pc.x86_64.rpm
python39-pygobject-3.40.1-4.el8pc.x86_64.rpm
python39-pygobject-debuginfo-3.40.1-4.el8pc.x86_64.rpm
python39-pyrsistent-0.18.1-2.el8pc.x86_64.rpm
python39-pyrsistent-debuginfo-0.18.1-2.el8pc.x86_64.rpm
python39-pyyaml-5.4.1-4.el8pc.x86_64.rpm
python39-rhsm-1.19.2-3.el8pc.x86_64.rpm
python39-rhsm-debuginfo-1.19.2-3.el8pc.x86_64.rpm
python39-ruamel-yaml-clib-0.2.6-2.el8pc.x86_64.rpm
python39-ruamel-yaml-clib-debuginfo-0.2.6-2.el8pc.x86_64.rpm
python39-solv-0.7.22-4.el8pc.x86_64.rpm
python39-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpm
python39-wrapt-1.14.1-1.el8pc.x86_64.rpm
python39-wrapt-debuginfo-1.14.1-1.el8pc.x86_64.rpm
python39-yarl-1.7.2-2.el8pc.x86_64.rpm
python39-yarl-debuginfo-1.7.2-2.el8pc.x86_64.rpm
qpid-cpp-client-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-client-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-client-devel-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-client-devel-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-client-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-debugsource-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-ha-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-linearstore-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-linearstore-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-dispatch-debugsource-1.14.0-6.el8.x86_64.rpm
qpid-dispatch-router-1.14.0-6.el8.x86_64.rpm
qpid-dispatch-router-debuginfo-1.14.0-6.el8.x86_64.rpm
qpid-proton-c-0.33.0-4.el8.x86_64.rpm
qpid-proton-c-debuginfo-0.33.0-4.el8.x86_64.rpm
qpid-proton-cpp-debuginfo-0.33.0-4.el8.x86_64.rpm
qpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpm
qpid-proton-debugsource-0.33.0-4.el8.x86_64.rpm
qpid-qmf-1.39.0-7.el8amq.x86_64.rpm
qpid-qmf-debuginfo-1.39.0-7.el8amq.x86_64.rpm
ruby-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpm
rubygem-bcrypt-3.1.18-1.el8sat.x86_64.rpm
rubygem-bcrypt-debuginfo-3.1.18-1.el8sat.x86_64.rpm
rubygem-bcrypt-debugsource-3.1.18-1.el8sat.x86_64.rpm
rubygem-ffi-1.15.5-1.el8sat.x86_64.rpm
rubygem-ffi-debuginfo-1.15.5-1.el8sat.x86_64.rpm
rubygem-ffi-debugsource-1.15.5-1.el8sat.x86_64.rpm
rubygem-google-protobuf-3.21.6-1.el8sat.x86_64.rpm
rubygem-google-protobuf-debuginfo-3.21.6-1.el8sat.x86_64.rpm
rubygem-google-protobuf-debugsource-3.21.6-1.el8sat.x86_64.rpm
rubygem-grpc-1.49.1-1.el8sat.x86_64.rpm
rubygem-http_parser.rb-0.6.0-3.1.el8sat.x86_64.rpm
rubygem-http_parser.rb-debuginfo-0.6.0-3.1.el8sat.x86_64.rpm
rubygem-http_parser.rb-debugsource-0.6.0-3.1.el8sat.x86_64.rpm
rubygem-journald-native-1.0.12-1.el8sat.x86_64.rpm
rubygem-journald-native-debuginfo-1.0.12-1.el8sat.x86_64.rpm
rubygem-journald-native-debugsource-1.0.12-1.el8sat.x86_64.rpm
rubygem-msgpack-1.6.0-1.el8sat.x86_64.rpm
rubygem-msgpack-debuginfo-1.6.0-1.el8sat.x86_64.rpm
rubygem-msgpack-debugsource-1.6.0-1.el8sat.x86_64.rpm
rubygem-newt-0.9.7-3.1.el8sat.x86_64.rpm
rubygem-newt-debuginfo-0.9.7-3.1.el8sat.x86_64.rpm
rubygem-newt-debugsource-0.9.7-3.1.el8sat.x86_64.rpm
rubygem-nio4r-2.5.8-1.el8sat.x86_64.rpm
rubygem-nio4r-debuginfo-2.5.8-1.el8sat.x86_64.rpm
rubygem-nio4r-debugsource-2.5.8-1.el8sat.x86_64.rpm
rubygem-nokogiri-1.13.9-1.el8sat.x86_64.rpm
rubygem-nokogiri-debuginfo-1.13.9-1.el8sat.x86_64.rpm
rubygem-nokogiri-debugsource-1.13.9-1.el8sat.x86_64.rpm
rubygem-ovirt-engine-sdk-4.4.1-1.el8sat.x86_64.rpm
rubygem-ovirt-engine-sdk-debuginfo-4.4.1-1.el8sat.x86_64.rpm
rubygem-ovirt-engine-sdk-debugsource-4.4.1-1.el8sat.x86_64.rpm
rubygem-pg-1.4.4-1.el8sat.x86_64.rpm
rubygem-pg-debuginfo-1.4.4-1.el8sat.x86_64.rpm
rubygem-pg-debugsource-1.4.4-1.el8sat.x86_64.rpm
rubygem-puma-5.6.5-1.el8sat.x86_64.rpm
rubygem-puma-debuginfo-5.6.5-1.el8sat.x86_64.rpm
rubygem-puma-debugsource-5.6.5-1.el8sat.x86_64.rpm
rubygem-qpid_proton-0.33.0-4.el8.x86_64.rpm
rubygem-qpid_proton-0.33.0-5.el8sat.x86_64.rpm
rubygem-qpid_proton-debuginfo-0.33.0-4.el8.x86_64.rpm
rubygem-qpid_proton-debuginfo-0.33.0-5.el8sat.x86_64.rpm
rubygem-qpid_proton-debugsource-0.33.0-5.el8sat.x86_64.rpm
rubygem-rkerberos-0.1.5-20.1.el8sat.x86_64.rpm
rubygem-rkerberos-debuginfo-0.1.5-20.1.el8sat.x86_64.rpm
rubygem-rkerberos-debugsource-0.1.5-20.1.el8sat.x86_64.rpm
rubygem-ruby-libvirt-0.8.0-1.el8sat.x86_64.rpm
rubygem-ruby-libvirt-debuginfo-0.8.0-1.el8sat.x86_64.rpm
rubygem-ruby-libvirt-debugsource-0.8.0-1.el8sat.x86_64.rpm
rubygem-sqlite3-1.4.2-1.el8sat.x86_64.rpm
rubygem-sqlite3-debuginfo-1.4.2-1.el8sat.x86_64.rpm
rubygem-sqlite3-debugsource-1.4.2-1.el8sat.x86_64.rpm
rubygem-unf_ext-0.0.8.2-1.el8sat.x86_64.rpm
rubygem-unf_ext-debuginfo-0.0.8.2-1.el8sat.x86_64.rpm
rubygem-unf_ext-debugsource-0.0.8.2-1.el8sat.x86_64.rpm
rubygem-unicode-0.4.4.4-4.1.el8sat.x86_64.rpm
rubygem-unicode-debuginfo-0.4.4.4-4.1.el8sat.x86_64.rpm
rubygem-unicode-debugsource-0.4.4.4-4.1.el8sat.x86_64.rpm
rubygem-websocket-driver-0.7.5-1.el8sat.x86_64.rpm
rubygem-websocket-driver-debuginfo-0.7.5-1.el8sat.x86_64.rpm
rubygem-websocket-driver-debugsource-0.7.5-1.el8sat.x86_64.rpm
saslwrapper-0.22-6.el8sat.x86_64.rpm
saslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpm
saslwrapper-debugsource-0.22-6.el8sat.x86_64.rpm
yggdrasil-worker-forwarder-0.0.1-1.el8sat.x86_64.rpm
Red Hat Satellite 6.13 for RHEL 8:
Source:
ansible-collection-redhat-satellite-3.9.0-2.el8sat.src.rpm
ansible-collection-redhat-satellite_operations-1.3.0-2.el8sat.src.rpm
ansible-lint-5.0.8-4.el8pc.src.rpm
ansible-runner-2.2.1-3.el8sat.src.rpm
ansiblerole-foreman_scap_client-0.2.0-2.el8sat.src.rpm
ansiblerole-insights-client-1.7.1-2.el8sat.src.rpm
cjson-1.7.14-5.el8sat.src.rpm
createrepo_c-0.20.1-1.el8pc.src.rpm
dynflow-utils-1.6.3-1.el8sat.src.rpm
foreman-3.5.1.14-1.el8sat.src.rpm
foreman-bootloaders-redhat-202102220000-1.el8sat.src.rpm
foreman-discovery-image-4.1.0-10.el8sat.src.rpm
foreman-discovery-image-service-1.0.0-4.1.el8sat.src.rpm
foreman-installer-3.5.2.1-1.el8sat.src.rpm
foreman-proxy-3.5.1-1.el8sat.src.rpm
katello-4.7.0-1.el8sat.src.rpm
katello-certs-tools-2.9.0-1.el8sat.src.rpm
katello-client-bootstrap-1.7.9-1.el8sat.src.rpm
libcomps-0.1.18-4.el8pc.src.rpm
libsodium-1.0.17-3.el8sat.src.rpm
libsolv-0.7.22-4.el8pc.src.rpm
libwebsockets-2.4.2-2.el8.src.rpm
mosquitto-2.0.14-1.el8sat.src.rpm
pulpcore-selinux-1.3.2-1.el8pc.src.rpm
puppet-agent-7.12.1-1.el8sat.src.rpm
puppet-agent-oauth-0.5.10-1.el8sat.src.rpm
puppet-foreman_scap_client-0.4.0-1.el8sat.src.rpm
puppetlabs-stdlib-5.2.0-1.el8sat.src.rpm
puppetserver-7.9.3-1.el8sat.src.rpm
python-aiodns-3.0.0-3.el8pc.src.rpm
python-aiofiles-22.1.0-1.el8pc.src.rpm
python-aiohttp-3.8.1-3.el8pc.src.rpm
python-aiohttp-xmlrpc-1.5.0-2.el8pc.src.rpm
python-aioredis-2.0.1-2.el8pc.src.rpm
python-aiosignal-1.2.0-2.el8pc.src.rpm
python-ansible-builder-1.0.1-4.el8pc.src.rpm
python-asgiref-3.5.2-1.el8pc.src.rpm
python-async-lru-1.0.3-1.el8pc.src.rpm
python-async-timeout-4.0.2-2.el8pc.src.rpm
python-asyncio-throttle-1.0.2-3.el8pc.src.rpm
python-attrs-21.4.0-2.el8pc.src.rpm
python-backoff-2.1.2-1.el8pc.src.rpm
python-bindep-2.11.0-2.el8pc.src.rpm
python-bleach-3.3.1-2.el8pc.src.rpm
python-bleach-allowlist-1.0.3-3.el8pc.src.rpm
python-bracex-2.2.1-2.el8pc.src.rpm
python-brotli-1.0.9-2.el8pc.src.rpm
python-cchardet-2.1.7-4.el8pc.src.rpm
python-certifi-2020.6.20-3.el8pc.src.rpm
python-cffi-1.15.1-1.el8pc.src.rpm
python-chardet-5.0.0-1.el8pc.src.rpm
python-charset-normalizer-2.1.1-1.el8pc.src.rpm
python-click-8.1.3-1.el8pc.src.rpm
python-click-shell-2.1-3.el8pc.src.rpm
python-colorama-0.4.4-3.el8pc.src.rpm
python-commonmark-0.9.1-5.el8pc.src.rpm
python-contextlib2-21.6.0-3.el8pc.src.rpm
python-cryptography-3.4.8-1.el8pc.src.rpm
python-daemon-2.3.1-1.1.el8sat.src.rpm
python-dataclasses-0.8-3.el8pc.src.rpm
python-dateutil-2.8.2-2.el8pc.src.rpm
python-debian-0.1.43-2.el8pc.src.rpm
python-defusedxml-0.7.1-3.el8pc.src.rpm
python-deprecated-1.2.13-1.el8pc.src.rpm
python-diff-match-patch-20200713-3.el8pc.src.rpm
python-distro-1.7.0-1.el8pc.src.rpm
python-django-3.2.18-1.el8pc.src.rpm
python-django-currentuser-0.5.3-5.el8pc.src.rpm
python-django-filter-22.1-2.el8pc.src.rpm
python-django-guid-3.3.0-1.el8pc.src.rpm
python-django-import-export-2.8.0-1.el8pc.src.rpm
python-django-lifecycle-1.0.0-1.el8pc.src.rpm
python-django-readonly-field-1.1.1-3.el8pc.src.rpm
python-djangorestframework-3.13.1-2.el8pc.src.rpm
python-djangorestframework-queryfields-1.0.0-5.el8pc.src.rpm
python-docutils-0.19-1.1.el8sat.src.rpm
python-drf-access-policy-1.1.2-1.el8pc.src.rpm
python-drf-nested-routers-0.93.4-3.el8pc.src.rpm
python-drf-spectacular-0.23.1-1.el8pc.src.rpm
python-dynaconf-3.1.9-1.el8pc.src.rpm
python-ecdsa-0.14.1-2.el8pc.src.rpm
python-enrich-1.2.6-5.el8pc.src.rpm
python-et-xmlfile-1.1.0-2.el8pc.src.rpm
python-flake8-3.9.2-5.el8pc.src.rpm
python-frozenlist-1.3.0-2.el8pc.src.rpm
python-future-0.18.2-5.el8pc.src.rpm
python-galaxy-importer-0.4.5-1.el8pc.src.rpm
python-gitdb-4.0.9-2.el8pc.src.rpm
python-gitpython-3.1.26-3.el8pc.src.rpm
python-gnupg-0.5.0-1.el8pc.src.rpm
python-gunicorn-20.1.0-5.el8pc.src.rpm
python-idna-3.3-2.el8pc.src.rpm
python-idna-ssl-1.1.0-5.el8pc.src.rpm
python-importlib-metadata-4.10.1-2.el8pc.src.rpm
python-inflection-0.5.1-3.el8pc.src.rpm
python-iniparse-0.4-35.el8pc.src.rpm
python-jinja2-3.1.2-1.el8pc.src.rpm
python-jsonschema-4.9.1-1.el8pc.src.rpm
python-lockfile-0.12.2-1.el8sat.src.rpm
python-lxml-4.7.1-2.el8pc.src.rpm
python-markdown-3.3.6-3.el8pc.src.rpm
python-markuppy-1.14-3.el8pc.src.rpm
python-markupsafe-2.0.1-3.el8pc.src.rpm
python-mccabe-0.6.1-3.el8pc.src.rpm
python-multidict-6.0.2-2.el8pc.src.rpm
python-naya-1.1.1-3.el8pc.src.rpm
python-odfpy-1.4.1-6.el8pc.src.rpm
python-openpyxl-3.0.9-2.el8pc.src.rpm
python-packaging-21.3-1.1.el8sat.src.rpm
python-parsley-1.3-2.el8pc.src.rpm
python-pbr-5.8.0-4.el8pc.src.rpm
python-pexpect-4.8.0-2.el8sat.src.rpm
python-productmd-1.33-3.el8pc.src.rpm
python-protobuf-4.21.6-1.el8pc.src.rpm
python-psycopg2-2.9.3-2.el8pc.src.rpm
python-ptyprocess-0.7.0-1.el8sat.src.rpm
python-pulp-ansible-0.15.0-1.el8pc.src.rpm
python-pulp-certguard-1.5.5-1.el8pc.src.rpm
python-pulp-cli-0.14.0-4.el8pc.src.rpm
python-pulp-container-2.14.3-1.el8pc.src.rpm
python-pulp-deb-2.20.0-1.el8pc.src.rpm
python-pulp-file-1.11.1-1.el8pc.src.rpm
python-pulp-rpm-3.18.11-1.el8pc.src.rpm
python-pulpcore-3.21.6-1.el8pc.src.rpm
python-pyOpenSSL-19.1.0-3.el8pc.src.rpm
python-pycairo-1.20.1-3.el8pc.src.rpm
python-pycares-4.1.2-2.el8pc.src.rpm
python-pycodestyle-2.7.0-5.el8pc.src.rpm
python-pycparser-2.21-2.el8pc.src.rpm
python-pycryptodomex-3.14.1-2.el8pc.src.rpm
python-pyflakes-2.3.1-5.el8pc.src.rpm
python-pygments-2.11.2-2.el8pc.src.rpm
python-pygobject-3.40.1-4.el8pc.src.rpm
python-pygtrie-2.5.0-1.el8pc.src.rpm
python-pyjwkest-1.4.2-6.el8pc.src.rpm
python-pyjwt-2.5.0-2.el8pc.src.rpm
python-pyparsing-2.4.7-3.el8pc.src.rpm
python-pyrsistent-0.18.1-2.el8pc.src.rpm
python-pytz-2022.2.1-1.el8pc.src.rpm
python-pyyaml-5.4.1-4.el8pc.src.rpm
python-qpid-1.37.0-1.el8.src.rpm
python-redis-4.3.4-1.el8pc.src.rpm
python-requests-2.28.1-1.el8pc.src.rpm
python-requirements-parser-0.2.0-3.el8pc.src.rpm
python-rhsm-1.19.2-3.el8pc.src.rpm
python-rich-10.12.0-3.el8pc.src.rpm
python-ruamel-yaml-0.17.20-2.el8pc.src.rpm
python-ruamel-yaml-clib-0.2.6-2.el8pc.src.rpm
python-schema-0.7.5-2.el8pc.src.rpm
python-semantic-version-2.10.0-1.el8pc.src.rpm
python-six-1.16.0-2.el8pc.src.rpm
python-smmap-5.0.0-2.el8pc.src.rpm
python-sqlparse-0.4.2-3.el8pc.src.rpm
python-tablib-3.2.0-3.el8pc.src.rpm
python-tenacity-7.0.0-3.el8pc.src.rpm
python-toml-0.10.2-3.el8pc.src.rpm
python-types-cryptography-3.3.23-1.el8pc.src.rpm
python-typing-extensions-3.10.0.2-2.el8pc.src.rpm
python-uritemplate-4.1.1-2.el8pc.src.rpm
python-url-normalize-1.4.3-4.el8pc.src.rpm
python-urllib3-1.26.8-2.el8pc.src.rpm
python-urlman-2.0.1-1.el8pc.src.rpm
python-wcmatch-8.3-2.el8pc.src.rpm
python-webencodings-0.5.1-3.el8pc.src.rpm
python-whitenoise-6.0.0-1.el8pc.src.rpm
python-wrapt-1.14.1-1.el8pc.src.rpm
python-xlrd-2.0.1-5.el8pc.src.rpm
python-xlwt-1.3.0-3.el8pc.src.rpm
python-yarl-1.7.2-2.el8pc.src.rpm
python-zipp-3.4.0-4.el8pc.src.rpm
qpid-cpp-1.39.0-7.el8amq.src.rpm
qpid-dispatch-1.14.0-6.el8.src.rpm
qpid-proton-0.33.0-4.el8.src.rpm
redhat-access-insights-puppet-1.0.1-1.el8sat.src.rpm
rubygem-algebrick-0.7.5-1.el8sat.src.rpm
rubygem-ansi-1.5.0-3.el8sat.src.rpm
rubygem-apipie-params-0.0.5-5.1.el8sat.src.rpm
rubygem-bundler_ext-0.4.1-6.el8sat.src.rpm
rubygem-clamp-1.1.2-7.el8sat.src.rpm
rubygem-concurrent-ruby-1.1.10-1.el8sat.src.rpm
rubygem-concurrent-ruby-edge-0.6.0-3.el8sat.src.rpm
rubygem-domain_name-0.5.20190701-1.el8sat.src.rpm
rubygem-dynflow-1.6.10-1.el8sat.src.rpm
rubygem-excon-0.93.1-1.el8sat.src.rpm
rubygem-faraday-1.10.2-1.el8sat.src.rpm
rubygem-faraday-em_http-1.0.0-1.el8sat.src.rpm
rubygem-faraday-em_synchrony-1.0.0-1.el8sat.src.rpm
rubygem-faraday-excon-1.1.0-1.el8sat.src.rpm
rubygem-faraday-httpclient-1.0.1-1.el8sat.src.rpm
rubygem-faraday-multipart-1.0.4-1.el8sat.src.rpm
rubygem-faraday-net_http-1.0.1-1.el8sat.src.rpm
rubygem-faraday-net_http_persistent-1.2.0-1.el8sat.src.rpm
rubygem-faraday-patron-1.0.0-1.el8sat.src.rpm
rubygem-faraday-rack-1.0.0-1.el8sat.src.rpm
rubygem-faraday-retry-1.0.3-1.el8sat.src.rpm
rubygem-faraday_middleware-1.2.0-1.el8sat.src.rpm
rubygem-fast_gettext-1.8.0-1.el8sat.src.rpm
rubygem-ffi-1.15.5-1.el8sat.src.rpm
rubygem-foreman_maintain-1.2.8-1.el8sat.src.rpm
rubygem-gssapi-1.3.1-1.el8sat.src.rpm
rubygem-hashie-5.0.0-1.el8sat.src.rpm
rubygem-highline-2.0.3-2.el8sat.src.rpm
rubygem-http-accept-1.7.0-1.el8sat.src.rpm
rubygem-http-cookie-1.0.5-1.el8sat.src.rpm
rubygem-infoblox-3.0.0-4.el8sat.src.rpm
rubygem-journald-logger-3.1.0-1.el8sat.src.rpm
rubygem-journald-native-1.0.12-1.el8sat.src.rpm
rubygem-jwt-2.5.0-1.el8sat.src.rpm
rubygem-kafo-6.5.0-1.el8sat.src.rpm
rubygem-kafo_parsers-1.2.1-1.el8sat.src.rpm
rubygem-kafo_wizards-0.0.2-2.el8sat.src.rpm
rubygem-little-plugger-1.1.4-3.el8sat.src.rpm
rubygem-logging-2.3.1-1.el8sat.src.rpm
rubygem-logging-journald-2.1.0-1.el8sat.src.rpm
rubygem-mime-types-3.4.1-1.el8sat.src.rpm
rubygem-mime-types-data-3.2022.0105-1.el8sat.src.rpm
rubygem-mqtt-0.5.0-1.el8sat.src.rpm
rubygem-msgpack-1.6.0-1.el8sat.src.rpm
rubygem-multi_json-1.15.0-1.el8sat.src.rpm
rubygem-multipart-post-2.2.3-1.el8sat.src.rpm
rubygem-mustermann-2.0.2-1.el8sat.src.rpm
rubygem-net-ssh-7.0.1-1.el8sat.src.rpm
rubygem-net-ssh-krb-0.4.0-4.el8sat.src.rpm
rubygem-netrc-0.11.0-6.el8sat.src.rpm
rubygem-newt-0.9.7-3.1.el8sat.src.rpm
rubygem-nokogiri-1.13.9-1.el8sat.src.rpm
rubygem-oauth-1.1.0-1.el8sat.src.rpm
rubygem-oauth-tty-1.0.5-1.el8sat.src.rpm
rubygem-openscap-0.4.9-8.el8sat.src.rpm
rubygem-openscap_parser-1.0.2-2.el8sat.src.rpm
rubygem-powerbar-2.0.1-3.el8sat.src.rpm
rubygem-rack-2.2.4-1.el8sat.src.rpm
rubygem-rack-protection-2.2.2-1.el8sat.src.rpm
rubygem-rb-inotify-0.10.1-1.el8sat.src.rpm
rubygem-rbnacl-4.0.2-2.el8sat.src.rpm
rubygem-redfish_client-0.5.4-1.el8sat.src.rpm
rubygem-rest-client-2.1.0-1.el8sat.src.rpm
rubygem-rkerberos-0.1.5-20.1.el8sat.src.rpm
rubygem-rsec-0.4.3-5.el8sat.src.rpm
rubygem-ruby-libvirt-0.8.0-1.el8sat.src.rpm
rubygem-ruby2_keywords-0.0.5-1.el8sat.src.rpm
rubygem-rubyipmi-0.11.1-1.el8sat.src.rpm
rubygem-sd_notify-0.1.1-1.el8sat.src.rpm
rubygem-sequel-5.62.0-1.el8sat.src.rpm
rubygem-server_sent_events-0.1.3-1.el8sat.src.rpm
rubygem-sinatra-2.2.2-1.el8sat.src.rpm
rubygem-smart_proxy_ansible-3.5.0-1.el8sat.src.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.src.rpm
rubygem-smart_proxy_dhcp_infoblox-0.0.17-1.el8sat.src.rpm
rubygem-smart_proxy_dhcp_remote_isc-0.0.5-6.el8sat.src.rpm
rubygem-smart_proxy_discovery-1.0.5-9.el8sat.src.rpm
rubygem-smart_proxy_discovery_image-1.6.0-2.el8sat.src.rpm
rubygem-smart_proxy_dns_infoblox-1.1.0-7.el8sat.src.rpm
rubygem-smart_proxy_dynflow-0.9.0-1.el8sat.src.rpm
rubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.src.rpm
rubygem-smart_proxy_openscap-0.9.2-1.el8sat.src.rpm
rubygem-smart_proxy_pulp-3.2.0-3.el8sat.src.rpm
rubygem-smart_proxy_remote_execution_ssh-0.10.1-1.el8sat.src.rpm
rubygem-smart_proxy_shellhooks-0.9.2-3.el8sat.src.rpm
rubygem-snaky_hash-2.0.1-1.el8sat.src.rpm
rubygem-sqlite3-1.4.2-1.el8sat.src.rpm
rubygem-statsd-instrument-2.9.2-1.el8sat.src.rpm
rubygem-tilt-2.0.11-1.el8sat.src.rpm
rubygem-unf-0.1.4-1.el8sat.src.rpm
rubygem-unf_ext-0.0.8.2-1.el8sat.src.rpm
rubygem-version_gem-1.1.1-1.el8sat.src.rpm
rubygem-webrick-1.7.0-1.el8sat.src.rpm
rubygem-xmlrpc-0.3.2-1.el8sat.src.rpm
saslwrapper-0.22-6.el8sat.src.rpm
satellite-6.13.0-6.el8sat.src.rpm
satellite-installer-6.13.0.7-1.el8sat.src.rpm
satellite-maintain-0.0.1-1.el8sat.src.rpm
noarch:
ansible-collection-redhat-satellite-3.9.0-2.el8sat.noarch.rpm
ansible-collection-redhat-satellite_operations-1.3.0-2.el8sat.noarch.rpm
ansible-lint-5.0.8-4.el8pc.noarch.rpm
ansible-runner-2.2.1-3.el8sat.noarch.rpm
ansiblerole-foreman_scap_client-0.2.0-2.el8sat.noarch.rpm
ansiblerole-insights-client-1.7.1-2.el8sat.noarch.rpm
foreman-bootloaders-redhat-202102220000-1.el8sat.noarch.rpm
foreman-bootloaders-redhat-tftpboot-202102220000-1.el8sat.noarch.rpm
foreman-debug-3.5.1.14-1.el8sat.noarch.rpm
foreman-discovery-image-4.1.0-10.el8sat.noarch.rpm
foreman-installer-3.5.2.1-1.el8sat.noarch.rpm
foreman-installer-katello-3.5.2.1-1.el8sat.noarch.rpm
foreman-proxy-3.5.1-1.el8sat.noarch.rpm
foreman-proxy-content-4.7.0-1.el8sat.noarch.rpm
foreman-proxy-journald-3.5.1-1.el8sat.noarch.rpm
katello-certs-tools-2.9.0-1.el8sat.noarch.rpm
katello-client-bootstrap-1.7.9-1.el8sat.noarch.rpm
katello-common-4.7.0-1.el8sat.noarch.rpm
katello-debug-4.7.0-1.el8sat.noarch.rpm
puppet-agent-oauth-0.5.10-1.el8sat.noarch.rpm
puppet-foreman_scap_client-0.4.0-1.el8sat.noarch.rpm
puppetlabs-stdlib-5.2.0-1.el8sat.noarch.rpm
puppetserver-7.9.3-1.el8sat.noarch.rpm
python2-qpid-1.37.0-1.el8.noarch.rpm
python39-aiodns-3.0.0-3.el8pc.noarch.rpm
python39-aiofiles-22.1.0-1.el8pc.noarch.rpm
python39-aiohttp-xmlrpc-1.5.0-2.el8pc.noarch.rpm
python39-aioredis-2.0.1-2.el8pc.noarch.rpm
python39-aiosignal-1.2.0-2.el8pc.noarch.rpm
python39-ansible-builder-1.0.1-4.el8pc.noarch.rpm
python39-ansible-runner-2.2.1-3.el8sat.noarch.rpm
python39-asgiref-3.5.2-1.el8pc.noarch.rpm
python39-async-lru-1.0.3-1.el8pc.noarch.rpm
python39-async-timeout-4.0.2-2.el8pc.noarch.rpm
python39-asyncio-throttle-1.0.2-3.el8pc.noarch.rpm
python39-attrs-21.4.0-2.el8pc.noarch.rpm
python39-backoff-2.1.2-1.el8pc.noarch.rpm
python39-bindep-2.11.0-2.el8pc.noarch.rpm
python39-bleach-3.3.1-2.el8pc.noarch.rpm
python39-bleach-allowlist-1.0.3-3.el8pc.noarch.rpm
python39-bracex-2.2.1-2.el8pc.noarch.rpm
python39-certifi-2020.6.20-3.el8pc.noarch.rpm
python39-chardet-5.0.0-1.el8pc.noarch.rpm
python39-charset-normalizer-2.1.1-1.el8pc.noarch.rpm
python39-click-8.1.3-1.el8pc.noarch.rpm
python39-click-shell-2.1-3.el8pc.noarch.rpm
python39-colorama-0.4.4-3.el8pc.noarch.rpm
python39-commonmark-0.9.1-5.el8pc.noarch.rpm
python39-contextlib2-21.6.0-3.el8pc.noarch.rpm
python39-daemon-2.3.1-1.1.el8sat.noarch.rpm
python39-dataclasses-0.8-3.el8pc.noarch.rpm
python39-dateutil-2.8.2-2.el8pc.noarch.rpm
python39-debian-0.1.43-2.el8pc.noarch.rpm
python39-defusedxml-0.7.1-3.el8pc.noarch.rpm
python39-deprecated-1.2.13-1.el8pc.noarch.rpm
python39-diff-match-patch-20200713-3.el8pc.noarch.rpm
python39-distro-1.7.0-1.el8pc.noarch.rpm
python39-django-3.2.18-1.el8pc.noarch.rpm
python39-django-currentuser-0.5.3-5.el8pc.noarch.rpm
python39-django-filter-22.1-2.el8pc.noarch.rpm
python39-django-guid-3.3.0-1.el8pc.noarch.rpm
python39-django-import-export-2.8.0-1.el8pc.noarch.rpm
python39-django-lifecycle-1.0.0-1.el8pc.noarch.rpm
python39-django-readonly-field-1.1.1-3.el8pc.noarch.rpm
python39-djangorestframework-3.13.1-2.el8pc.noarch.rpm
python39-djangorestframework-queryfields-1.0.0-5.el8pc.noarch.rpm
python39-docutils-0.19-1.1.el8sat.noarch.rpm
python39-drf-access-policy-1.1.2-1.el8pc.noarch.rpm
python39-drf-nested-routers-0.93.4-3.el8pc.noarch.rpm
python39-drf-spectacular-0.23.1-1.el8pc.noarch.rpm
python39-dynaconf-3.1.9-1.el8pc.noarch.rpm
python39-ecdsa-0.14.1-2.el8pc.noarch.rpm
python39-enrich-1.2.6-5.el8pc.noarch.rpm
python39-et-xmlfile-1.1.0-2.el8pc.noarch.rpm
python39-flake8-3.9.2-5.el8pc.noarch.rpm
python39-future-0.18.2-5.el8pc.noarch.rpm
python39-galaxy-importer-0.4.5-1.el8pc.noarch.rpm
python39-gitdb-4.0.9-2.el8pc.noarch.rpm
python39-gitpython-3.1.26-3.el8pc.noarch.rpm
python39-gnupg-0.5.0-1.el8pc.noarch.rpm
python39-gunicorn-20.1.0-5.el8pc.noarch.rpm
python39-idna-3.3-2.el8pc.noarch.rpm
python39-idna-ssl-1.1.0-5.el8pc.noarch.rpm
python39-importlib-metadata-4.10.1-2.el8pc.noarch.rpm
python39-inflection-0.5.1-3.el8pc.noarch.rpm
python39-iniparse-0.4-35.el8pc.noarch.rpm
python39-jinja2-3.1.2-1.el8pc.noarch.rpm
python39-jsonschema-4.9.1-1.el8pc.noarch.rpm
python39-lockfile-0.12.2-1.el8sat.noarch.rpm
python39-markdown-3.3.6-3.el8pc.noarch.rpm
python39-markuppy-1.14-3.el8pc.noarch.rpm
python39-mccabe-0.6.1-3.el8pc.noarch.rpm
python39-naya-1.1.1-3.el8pc.noarch.rpm
python39-odfpy-1.4.1-6.el8pc.noarch.rpm
python39-openpyxl-3.0.9-2.el8pc.noarch.rpm
python39-packaging-21.3-1.1.el8sat.noarch.rpm
python39-parsley-1.3-2.el8pc.noarch.rpm
python39-pbr-5.8.0-4.el8pc.noarch.rpm
python39-pexpect-4.8.0-2.el8sat.noarch.rpm
python39-productmd-1.33-3.el8pc.noarch.rpm
python39-protobuf-4.21.6-1.el8pc.noarch.rpm
python39-ptyprocess-0.7.0-1.el8sat.noarch.rpm
python39-pulp-ansible-0.15.0-1.el8pc.noarch.rpm
python39-pulp-certguard-1.5.5-1.el8pc.noarch.rpm
python39-pulp-cli-0.14.0-4.el8pc.noarch.rpm
python39-pulp-container-2.14.3-1.el8pc.noarch.rpm
python39-pulp-deb-2.20.0-1.el8pc.noarch.rpm
python39-pulp-file-1.11.1-1.el8pc.noarch.rpm
python39-pulp-rpm-3.18.11-1.el8pc.noarch.rpm
python39-pulpcore-3.21.6-1.el8pc.noarch.rpm
python39-pyOpenSSL-19.1.0-3.el8pc.noarch.rpm
python39-pycodestyle-2.7.0-5.el8pc.noarch.rpm
python39-pycparser-2.21-2.el8pc.noarch.rpm
python39-pyflakes-2.3.1-5.el8pc.noarch.rpm
python39-pygments-2.11.2-2.el8pc.noarch.rpm
python39-pygtrie-2.5.0-1.el8pc.noarch.rpm
python39-pyjwkest-1.4.2-6.el8pc.noarch.rpm
python39-pyjwt-2.5.0-2.el8pc.noarch.rpm
python39-pyparsing-2.4.7-3.el8pc.noarch.rpm
python39-pytz-2022.2.1-1.el8pc.noarch.rpm
python39-redis-4.3.4-1.el8pc.noarch.rpm
python39-requests-2.28.1-1.el8pc.noarch.rpm
python39-requirements-parser-0.2.0-3.el8pc.noarch.rpm
python39-rich-10.12.0-3.el8pc.noarch.rpm
python39-ruamel-yaml-0.17.20-2.el8pc.noarch.rpm
python39-schema-0.7.5-2.el8pc.noarch.rpm
python39-semantic-version-2.10.0-1.el8pc.noarch.rpm
python39-six-1.16.0-2.el8pc.noarch.rpm
python39-smmap-5.0.0-2.el8pc.noarch.rpm
python39-sqlparse-0.4.2-3.el8pc.noarch.rpm
python39-tablib-3.2.0-3.el8pc.noarch.rpm
python39-tenacity-7.0.0-3.el8pc.noarch.rpm
python39-toml-0.10.2-3.el8pc.noarch.rpm
python39-types-cryptography-3.3.23-1.el8pc.noarch.rpm
python39-typing-extensions-3.10.0.2-2.el8pc.noarch.rpm
python39-uritemplate-4.1.1-2.el8pc.noarch.rpm
python39-url-normalize-1.4.3-4.el8pc.noarch.rpm
python39-urllib3-1.26.8-2.el8pc.noarch.rpm
python39-urlman-2.0.1-1.el8pc.noarch.rpm
python39-wcmatch-8.3-2.el8pc.noarch.rpm
python39-webencodings-0.5.1-3.el8pc.noarch.rpm
python39-whitenoise-6.0.0-1.el8pc.noarch.rpm
python39-xlrd-2.0.1-5.el8pc.noarch.rpm
python39-xlwt-1.3.0-3.el8pc.noarch.rpm
python39-zipp-3.4.0-4.el8pc.noarch.rpm
qpid-tools-1.39.0-7.el8amq.noarch.rpm
redhat-access-insights-puppet-1.0.1-1.el8sat.noarch.rpm
rubygem-algebrick-0.7.5-1.el8sat.noarch.rpm
rubygem-ansi-1.5.0-3.el8sat.noarch.rpm
rubygem-apipie-params-0.0.5-5.1.el8sat.noarch.rpm
rubygem-bundler_ext-0.4.1-6.el8sat.noarch.rpm
rubygem-clamp-1.1.2-7.el8sat.noarch.rpm
rubygem-concurrent-ruby-1.1.10-1.el8sat.noarch.rpm
rubygem-concurrent-ruby-edge-0.6.0-3.el8sat.noarch.rpm
rubygem-domain_name-0.5.20190701-1.el8sat.noarch.rpm
rubygem-dynflow-1.6.10-1.el8sat.noarch.rpm
rubygem-excon-0.93.1-1.el8sat.noarch.rpm
rubygem-faraday-1.10.2-1.el8sat.noarch.rpm
rubygem-faraday-em_http-1.0.0-1.el8sat.noarch.rpm
rubygem-faraday-em_synchrony-1.0.0-1.el8sat.noarch.rpm
rubygem-faraday-excon-1.1.0-1.el8sat.noarch.rpm
rubygem-faraday-httpclient-1.0.1-1.el8sat.noarch.rpm
rubygem-faraday-multipart-1.0.4-1.el8sat.noarch.rpm
rubygem-faraday-net_http-1.0.1-1.el8sat.noarch.rpm
rubygem-faraday-net_http_persistent-1.2.0-1.el8sat.noarch.rpm
rubygem-faraday-patron-1.0.0-1.el8sat.noarch.rpm
rubygem-faraday-rack-1.0.0-1.el8sat.noarch.rpm
rubygem-faraday-retry-1.0.3-1.el8sat.noarch.rpm
rubygem-faraday_middleware-1.2.0-1.el8sat.noarch.rpm
rubygem-fast_gettext-1.8.0-1.el8sat.noarch.rpm
rubygem-foreman_maintain-1.2.8-1.el8sat.noarch.rpm
rubygem-gssapi-1.3.1-1.el8sat.noarch.rpm
rubygem-hashie-5.0.0-1.el8sat.noarch.rpm
rubygem-highline-2.0.3-2.el8sat.noarch.rpm
rubygem-http-accept-1.7.0-1.el8sat.noarch.rpm
rubygem-http-cookie-1.0.5-1.el8sat.noarch.rpm
rubygem-infoblox-3.0.0-4.el8sat.noarch.rpm
rubygem-journald-logger-3.1.0-1.el8sat.noarch.rpm
rubygem-jwt-2.5.0-1.el8sat.noarch.rpm
rubygem-kafo-6.5.0-1.el8sat.noarch.rpm
rubygem-kafo_parsers-1.2.1-1.el8sat.noarch.rpm
rubygem-kafo_wizards-0.0.2-2.el8sat.noarch.rpm
rubygem-little-plugger-1.1.4-3.el8sat.noarch.rpm
rubygem-logging-2.3.1-1.el8sat.noarch.rpm
rubygem-logging-journald-2.1.0-1.el8sat.noarch.rpm
rubygem-mime-types-3.4.1-1.el8sat.noarch.rpm
rubygem-mime-types-data-3.2022.0105-1.el8sat.noarch.rpm
rubygem-mqtt-0.5.0-1.el8sat.noarch.rpm
rubygem-multi_json-1.15.0-1.el8sat.noarch.rpm
rubygem-multipart-post-2.2.3-1.el8sat.noarch.rpm
rubygem-mustermann-2.0.2-1.el8sat.noarch.rpm
rubygem-net-ssh-7.0.1-1.el8sat.noarch.rpm
rubygem-net-ssh-krb-0.4.0-4.el8sat.noarch.rpm
rubygem-netrc-0.11.0-6.el8sat.noarch.rpm
rubygem-oauth-1.1.0-1.el8sat.noarch.rpm
rubygem-oauth-tty-1.0.5-1.el8sat.noarch.rpm
rubygem-openscap-0.4.9-8.el8sat.noarch.rpm
rubygem-openscap_parser-1.0.2-2.el8sat.noarch.rpm
rubygem-powerbar-2.0.1-3.el8sat.noarch.rpm
rubygem-rack-2.2.4-1.el8sat.noarch.rpm
rubygem-rack-protection-2.2.2-1.el8sat.noarch.rpm
rubygem-rb-inotify-0.10.1-1.el8sat.noarch.rpm
rubygem-rbnacl-4.0.2-2.el8sat.noarch.rpm
rubygem-redfish_client-0.5.4-1.el8sat.noarch.rpm
rubygem-rest-client-2.1.0-1.el8sat.noarch.rpm
rubygem-rsec-0.4.3-5.el8sat.noarch.rpm
rubygem-ruby2_keywords-0.0.5-1.el8sat.noarch.rpm
rubygem-rubyipmi-0.11.1-1.el8sat.noarch.rpm
rubygem-sd_notify-0.1.1-1.el8sat.noarch.rpm
rubygem-sequel-5.62.0-1.el8sat.noarch.rpm
rubygem-server_sent_events-0.1.3-1.el8sat.noarch.rpm
rubygem-sinatra-2.2.2-1.el8sat.noarch.rpm
rubygem-smart_proxy_ansible-3.5.0-1.el8sat.noarch.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.noarch.rpm
rubygem-smart_proxy_dhcp_infoblox-0.0.17-1.el8sat.noarch.rpm
rubygem-smart_proxy_dhcp_remote_isc-0.0.5-6.el8sat.noarch.rpm
rubygem-smart_proxy_discovery-1.0.5-9.el8sat.noarch.rpm
rubygem-smart_proxy_discovery_image-1.6.0-2.el8sat.noarch.rpm
rubygem-smart_proxy_dns_infoblox-1.1.0-7.el8sat.noarch.rpm
rubygem-smart_proxy_dynflow-0.9.0-1.el8sat.noarch.rpm
rubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.noarch.rpm
rubygem-smart_proxy_openscap-0.9.2-1.el8sat.noarch.rpm
rubygem-smart_proxy_pulp-3.2.0-3.el8sat.noarch.rpm
rubygem-smart_proxy_remote_execution_ssh-0.10.1-1.el8sat.noarch.rpm
rubygem-smart_proxy_shellhooks-0.9.2-3.el8sat.noarch.rpm
rubygem-snaky_hash-2.0.1-1.el8sat.noarch.rpm
rubygem-statsd-instrument-2.9.2-1.el8sat.noarch.rpm
rubygem-tilt-2.0.11-1.el8sat.noarch.rpm
rubygem-unf-0.1.4-1.el8sat.noarch.rpm
rubygem-version_gem-1.1.1-1.el8sat.noarch.rpm
rubygem-webrick-1.7.0-1.el8sat.noarch.rpm
rubygem-xmlrpc-0.3.2-1.el8sat.noarch.rpm
satellite-capsule-6.13.0-6.el8sat.noarch.rpm
satellite-common-6.13.0-6.el8sat.noarch.rpm
satellite-installer-6.13.0.7-1.el8sat.noarch.rpm
satellite-maintain-0.0.1-1.el8sat.noarch.rpm
x86_64:
cjson-1.7.14-5.el8sat.x86_64.rpm
cjson-debuginfo-1.7.14-5.el8sat.x86_64.rpm
cjson-debugsource-1.7.14-5.el8sat.x86_64.rpm
createrepo_c-0.20.1-1.el8pc.x86_64.rpm
createrepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpm
createrepo_c-debugsource-0.20.1-1.el8pc.x86_64.rpm
createrepo_c-libs-0.20.1-1.el8pc.x86_64.rpm
createrepo_c-libs-debuginfo-0.20.1-1.el8pc.x86_64.rpm
dynflow-utils-1.6.3-1.el8sat.x86_64.rpm
foreman-discovery-image-service-1.0.0-4.1.el8sat.x86_64.rpm
foreman-discovery-image-service-tui-1.0.0-4.1.el8sat.x86_64.rpm
libcomps-0.1.18-4.el8pc.x86_64.rpm
libcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpm
libcomps-debugsource-0.1.18-4.el8pc.x86_64.rpm
libdb-cxx-5.3.28-42.el8_4.x86_64.rpm
libdb-cxx-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-debugsource-5.3.28-42.el8_4.x86_64.rpm
libdb-java-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-sql-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-sql-devel-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-tcl-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libdb-utils-debuginfo-5.3.28-42.el8_4.x86_64.rpm
libsodium-1.0.17-3.el8sat.x86_64.rpm
libsodium-debuginfo-1.0.17-3.el8sat.x86_64.rpm
libsodium-debugsource-1.0.17-3.el8sat.x86_64.rpm
libsolv-0.7.22-4.el8pc.x86_64.rpm
libsolv-debuginfo-0.7.22-4.el8pc.x86_64.rpm
libsolv-debugsource-0.7.22-4.el8pc.x86_64.rpm
libsolv-demo-debuginfo-0.7.22-4.el8pc.x86_64.rpm
libsolv-tools-debuginfo-0.7.22-4.el8pc.x86_64.rpm
libwebsockets-2.4.2-2.el8.x86_64.rpm
libwebsockets-debuginfo-2.4.2-2.el8.x86_64.rpm
libwebsockets-debugsource-2.4.2-2.el8.x86_64.rpm
libwebsockets-tests-debuginfo-2.4.2-2.el8.x86_64.rpm
mosquitto-2.0.14-1.el8sat.x86_64.rpm
mosquitto-debuginfo-2.0.14-1.el8sat.x86_64.rpm
mosquitto-debugsource-2.0.14-1.el8sat.x86_64.rpm
pulpcore-selinux-1.3.2-1.el8pc.x86_64.rpm
puppet-agent-7.12.1-1.el8sat.x86_64.rpm
python-aiohttp-debugsource-3.8.1-3.el8pc.x86_64.rpm
python-brotli-debugsource-1.0.9-2.el8pc.x86_64.rpm
python-cchardet-debugsource-2.1.7-4.el8pc.x86_64.rpm
python-cffi-debugsource-1.15.1-1.el8pc.x86_64.rpm
python-cryptography-debugsource-3.4.8-1.el8pc.x86_64.rpm
python-frozenlist-debugsource-1.3.0-2.el8pc.x86_64.rpm
python-lxml-debugsource-4.7.1-2.el8pc.x86_64.rpm
python-markupsafe-debugsource-2.0.1-3.el8pc.x86_64.rpm
python-multidict-debugsource-6.0.2-2.el8pc.x86_64.rpm
python-psycopg2-debugsource-2.9.3-2.el8pc.x86_64.rpm
python-pycairo-debugsource-1.20.1-3.el8pc.x86_64.rpm
python-pycares-debugsource-4.1.2-2.el8pc.x86_64.rpm
python-pycryptodomex-debugsource-3.14.1-2.el8pc.x86_64.rpm
python-pygobject-debugsource-3.40.1-4.el8pc.x86_64.rpm
python-pyrsistent-debugsource-0.18.1-2.el8pc.x86_64.rpm
python-rhsm-debugsource-1.19.2-3.el8pc.x86_64.rpm
python-ruamel-yaml-clib-debugsource-0.2.6-2.el8pc.x86_64.rpm
python-wrapt-debugsource-1.14.1-1.el8pc.x86_64.rpm
python-yarl-debugsource-1.7.2-2.el8pc.x86_64.rpm
python2-qpid-qmf-1.39.0-7.el8amq.x86_64.rpm
python2-saslwrapper-0.22-6.el8sat.x86_64.rpm
python2-saslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpm
python3-createrepo_c-0.20.1-1.el8pc.x86_64.rpm
python3-createrepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpm
python3-libcomps-0.1.18-4.el8pc.x86_64.rpm
python3-libcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpm
python3-qpid-proton-0.33.0-4.el8.x86_64.rpm
python3-qpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpm
python3-solv-0.7.22-4.el8pc.x86_64.rpm
python3-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpm
python39-aiohttp-3.8.1-3.el8pc.x86_64.rpm
python39-aiohttp-debuginfo-3.8.1-3.el8pc.x86_64.rpm
python39-brotli-1.0.9-2.el8pc.x86_64.rpm
python39-brotli-debuginfo-1.0.9-2.el8pc.x86_64.rpm
python39-cchardet-2.1.7-4.el8pc.x86_64.rpm
python39-cchardet-debuginfo-2.1.7-4.el8pc.x86_64.rpm
python39-cffi-1.15.1-1.el8pc.x86_64.rpm
python39-cffi-debuginfo-1.15.1-1.el8pc.x86_64.rpm
python39-createrepo_c-0.20.1-1.el8pc.x86_64.rpm
python39-createrepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpm
python39-cryptography-3.4.8-1.el8pc.x86_64.rpm
python39-cryptography-debuginfo-3.4.8-1.el8pc.x86_64.rpm
python39-frozenlist-1.3.0-2.el8pc.x86_64.rpm
python39-frozenlist-debuginfo-1.3.0-2.el8pc.x86_64.rpm
python39-libcomps-0.1.18-4.el8pc.x86_64.rpm
python39-libcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpm
python39-lxml-4.7.1-2.el8pc.x86_64.rpm
python39-lxml-debuginfo-4.7.1-2.el8pc.x86_64.rpm
python39-markupsafe-2.0.1-3.el8pc.x86_64.rpm
python39-markupsafe-debuginfo-2.0.1-3.el8pc.x86_64.rpm
python39-multidict-6.0.2-2.el8pc.x86_64.rpm
python39-multidict-debuginfo-6.0.2-2.el8pc.x86_64.rpm
python39-psycopg2-2.9.3-2.el8pc.x86_64.rpm
python39-psycopg2-debuginfo-2.9.3-2.el8pc.x86_64.rpm
python39-pycairo-1.20.1-3.el8pc.x86_64.rpm
python39-pycairo-debuginfo-1.20.1-3.el8pc.x86_64.rpm
python39-pycares-4.1.2-2.el8pc.x86_64.rpm
python39-pycares-debuginfo-4.1.2-2.el8pc.x86_64.rpm
python39-pycryptodomex-3.14.1-2.el8pc.x86_64.rpm
python39-pycryptodomex-debuginfo-3.14.1-2.el8pc.x86_64.rpm
python39-pygobject-3.40.1-4.el8pc.x86_64.rpm
python39-pygobject-debuginfo-3.40.1-4.el8pc.x86_64.rpm
python39-pyrsistent-0.18.1-2.el8pc.x86_64.rpm
python39-pyrsistent-debuginfo-0.18.1-2.el8pc.x86_64.rpm
python39-pyyaml-5.4.1-4.el8pc.x86_64.rpm
python39-rhsm-1.19.2-3.el8pc.x86_64.rpm
python39-rhsm-debuginfo-1.19.2-3.el8pc.x86_64.rpm
python39-ruamel-yaml-clib-0.2.6-2.el8pc.x86_64.rpm
python39-ruamel-yaml-clib-debuginfo-0.2.6-2.el8pc.x86_64.rpm
python39-solv-0.7.22-4.el8pc.x86_64.rpm
python39-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpm
python39-wrapt-1.14.1-1.el8pc.x86_64.rpm
python39-wrapt-debuginfo-1.14.1-1.el8pc.x86_64.rpm
python39-yarl-1.7.2-2.el8pc.x86_64.rpm
python39-yarl-debuginfo-1.7.2-2.el8pc.x86_64.rpm
qpid-cpp-client-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-client-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-client-devel-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-client-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-debugsource-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-ha-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-linearstore-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-linearstore-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-cpp-server-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpm
qpid-dispatch-debugsource-1.14.0-6.el8.x86_64.rpm
qpid-dispatch-router-1.14.0-6.el8.x86_64.rpm
qpid-dispatch-router-debuginfo-1.14.0-6.el8.x86_64.rpm
qpid-proton-c-0.33.0-4.el8.x86_64.rpm
qpid-proton-c-debuginfo-0.33.0-4.el8.x86_64.rpm
qpid-proton-cpp-debuginfo-0.33.0-4.el8.x86_64.rpm
qpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpm
qpid-proton-debugsource-0.33.0-4.el8.x86_64.rpm
qpid-qmf-1.39.0-7.el8amq.x86_64.rpm
qpid-qmf-debuginfo-1.39.0-7.el8amq.x86_64.rpm
ruby-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpm
rubygem-ffi-1.15.5-1.el8sat.x86_64.rpm
rubygem-ffi-debuginfo-1.15.5-1.el8sat.x86_64.rpm
rubygem-ffi-debugsource-1.15.5-1.el8sat.x86_64.rpm
rubygem-journald-native-1.0.12-1.el8sat.x86_64.rpm
rubygem-journald-native-debuginfo-1.0.12-1.el8sat.x86_64.rpm
rubygem-journald-native-debugsource-1.0.12-1.el8sat.x86_64.rpm
rubygem-msgpack-1.6.0-1.el8sat.x86_64.rpm
rubygem-msgpack-debuginfo-1.6.0-1.el8sat.x86_64.rpm
rubygem-msgpack-debugsource-1.6.0-1.el8sat.x86_64.rpm
rubygem-newt-0.9.7-3.1.el8sat.x86_64.rpm
rubygem-newt-debuginfo-0.9.7-3.1.el8sat.x86_64.rpm
rubygem-newt-debugsource-0.9.7-3.1.el8sat.x86_64.rpm
rubygem-nokogiri-1.13.9-1.el8sat.x86_64.rpm
rubygem-nokogiri-debuginfo-1.13.9-1.el8sat.x86_64.rpm
rubygem-nokogiri-debugsource-1.13.9-1.el8sat.x86_64.rpm
rubygem-qpid_proton-debuginfo-0.33.0-4.el8.x86_64.rpm
rubygem-rkerberos-0.1.5-20.1.el8sat.x86_64.rpm
rubygem-rkerberos-debuginfo-0.1.5-20.1.el8sat.x86_64.rpm
rubygem-rkerberos-debugsource-0.1.5-20.1.el8sat.x86_64.rpm
rubygem-ruby-libvirt-0.8.0-1.el8sat.x86_64.rpm
rubygem-ruby-libvirt-debuginfo-0.8.0-1.el8sat.x86_64.rpm
rubygem-ruby-libvirt-debugsource-0.8.0-1.el8sat.x86_64.rpm
rubygem-sqlite3-1.4.2-1.el8sat.x86_64.rpm
rubygem-sqlite3-debuginfo-1.4.2-1.el8sat.x86_64.rpm
rubygem-sqlite3-debugsource-1.4.2-1.el8sat.x86_64.rpm
rubygem-unf_ext-0.0.8.2-1.el8sat.x86_64.rpm
rubygem-unf_ext-debuginfo-0.0.8.2-1.el8sat.x86_64.rpm
rubygem-unf_ext-debugsource-0.0.8.2-1.el8sat.x86_64.rpm
saslwrapper-0.22-6.el8sat.x86_64.rpm
saslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpm
saslwrapper-debugsource-0.22-6.el8sat.x86_64.rpm
Red Hat Satellite 6.13 for RHEL 8:
Source:
rubygem-clamp-1.1.2-7.el8sat.src.rpm
rubygem-foreman_maintain-1.2.8-1.el8sat.src.rpm
rubygem-highline-2.0.3-2.el8sat.src.rpm
satellite-clone-3.3.0-1.el8sat.src.rpm
satellite-maintain-0.0.1-1.el8sat.src.rpm
noarch:
rubygem-clamp-1.1.2-7.el8sat.noarch.rpm
rubygem-foreman_maintain-1.2.8-1.el8sat.noarch.rpm
rubygem-highline-2.0.3-2.el8sat.noarch.rpm
satellite-clone-3.3.0-1.el8sat.noarch.rpm
satellite-maintain-0.0.1-1.el8sat.noarch.rpm
Red Hat Satellite 6.13 for RHEL 8:
Source:
foreman-3.5.1.14-1.el8sat.src.rpm
python-pulp_manifest-3.0.0-3.el8pc.src.rpm
rubygem-amazing_print-1.4.0-1.el8sat.src.rpm
rubygem-apipie-bindings-0.6.0-1.el8sat.src.rpm
rubygem-clamp-1.1.2-7.el8sat.src.rpm
rubygem-domain_name-0.5.20190701-1.el8sat.src.rpm
rubygem-fast_gettext-1.8.0-1.el8sat.src.rpm
rubygem-ffi-1.15.5-1.el8sat.src.rpm
rubygem-gssapi-1.3.1-1.el8sat.src.rpm
rubygem-hammer_cli-3.5.1-1.el8sat.src.rpm
rubygem-hammer_cli_foreman-3.5.1-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_ansible-0.4.0-2.el8sat.src.rpm
rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_bootdisk-0.3.0-3.el8sat.src.rpm
rubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_google-1.0.0-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_openscap-0.1.13-2.el8sat.src.rpm
rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_tasks-0.0.18-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_templates-0.2.0-3.el8sat.src.rpm
rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-2.el8sat.src.rpm
rubygem-hammer_cli_foreman_webhooks-0.0.4-1.el8sat.src.rpm
rubygem-hammer_cli_katello-1.7.3-1.el8sat.src.rpm
rubygem-hashie-5.0.0-1.el8sat.src.rpm
rubygem-highline-2.0.3-2.el8sat.src.rpm
rubygem-http-accept-1.7.0-1.el8sat.src.rpm
rubygem-http-cookie-1.0.5-1.el8sat.src.rpm
rubygem-jwt-2.5.0-1.el8sat.src.rpm
rubygem-little-plugger-1.1.4-3.el8sat.src.rpm
rubygem-locale-2.1.3-1.el8sat.src.rpm
rubygem-logging-2.3.1-1.el8sat.src.rpm
rubygem-mime-types-3.4.1-1.el8sat.src.rpm
rubygem-mime-types-data-3.2022.0105-1.el8sat.src.rpm
rubygem-multi_json-1.15.0-1.el8sat.src.rpm
rubygem-netrc-0.11.0-6.el8sat.src.rpm
rubygem-oauth-1.1.0-1.el8sat.src.rpm
rubygem-oauth-tty-1.0.5-1.el8sat.src.rpm
rubygem-powerbar-2.0.1-3.el8sat.src.rpm
rubygem-rest-client-2.1.0-1.el8sat.src.rpm
rubygem-snaky_hash-2.0.1-1.el8sat.src.rpm
rubygem-unf-0.1.4-1.el8sat.src.rpm
rubygem-unf_ext-0.0.8.2-1.el8sat.src.rpm
rubygem-unicode-0.4.4.4-4.1.el8sat.src.rpm
rubygem-unicode-display_width-1.8.0-1.el8sat.src.rpm
rubygem-version_gem-1.1.1-1.el8sat.src.rpm
satellite-6.13.0-6.el8sat.src.rpm
noarch:
foreman-cli-3.5.1.14-1.el8sat.noarch.rpm
python39-pulp_manifest-3.0.0-3.el8pc.noarch.rpm
rubygem-amazing_print-1.4.0-1.el8sat.noarch.rpm
rubygem-apipie-bindings-0.6.0-1.el8sat.noarch.rpm
rubygem-clamp-1.1.2-7.el8sat.noarch.rpm
rubygem-domain_name-0.5.20190701-1.el8sat.noarch.rpm
rubygem-fast_gettext-1.8.0-1.el8sat.noarch.rpm
rubygem-gssapi-1.3.1-1.el8sat.noarch.rpm
rubygem-hammer_cli-3.5.1-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman-3.5.1-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_ansible-0.4.0-2.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_bootdisk-0.3.0-3.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_google-1.0.0-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_openscap-0.1.13-2.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_tasks-0.0.18-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_templates-0.2.0-3.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_virt_who_configure-0.0.9-2.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_webhooks-0.0.4-1.el8sat.noarch.rpm
rubygem-hammer_cli_katello-1.7.3-1.el8sat.noarch.rpm
rubygem-hashie-5.0.0-1.el8sat.noarch.rpm
rubygem-highline-2.0.3-2.el8sat.noarch.rpm
rubygem-http-accept-1.7.0-1.el8sat.noarch.rpm
rubygem-http-cookie-1.0.5-1.el8sat.noarch.rpm
rubygem-jwt-2.5.0-1.el8sat.noarch.rpm
rubygem-little-plugger-1.1.4-3.el8sat.noarch.rpm
rubygem-locale-2.1.3-1.el8sat.noarch.rpm
rubygem-logging-2.3.1-1.el8sat.noarch.rpm
rubygem-mime-types-3.4.1-1.el8sat.noarch.rpm
rubygem-mime-types-data-3.2022.0105-1.el8sat.noarch.rpm
rubygem-multi_json-1.15.0-1.el8sat.noarch.rpm
rubygem-netrc-0.11.0-6.el8sat.noarch.rpm
rubygem-oauth-1.1.0-1.el8sat.noarch.rpm
rubygem-oauth-tty-1.0.5-1.el8sat.noarch.rpm
rubygem-powerbar-2.0.1-3.el8sat.noarch.rpm
rubygem-rest-client-2.1.0-1.el8sat.noarch.rpm
rubygem-snaky_hash-2.0.1-1.el8sat.noarch.rpm
rubygem-unf-0.1.4-1.el8sat.noarch.rpm
rubygem-unicode-display_width-1.8.0-1.el8sat.noarch.rpm
rubygem-version_gem-1.1.1-1.el8sat.noarch.rpm
satellite-cli-6.13.0-6.el8sat.noarch.rpm
x86_64:
rubygem-ffi-1.15.5-1.el8sat.x86_64.rpm
rubygem-ffi-debuginfo-1.15.5-1.el8sat.x86_64.rpm
rubygem-ffi-debugsource-1.15.5-1.el8sat.x86_64.rpm
rubygem-unf_ext-0.0.8.2-1.el8sat.x86_64.rpm
rubygem-unf_ext-debuginfo-0.0.8.2-1.el8sat.x86_64.rpm
rubygem-unf_ext-debugsource-0.0.8.2-1.el8sat.x86_64.rpm
rubygem-unicode-0.4.4.4-4.1.el8sat.x86_64.rpm
rubygem-unicode-debuginfo-0.4.4.4-4.1.el8sat.x86_64.rpm
rubygem-unicode-debugsource-0.4.4.4-4.1.el8sat.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2022-1471
https://access.redhat.com/security/cve/CVE-2022-22577
https://access.redhat.com/security/cve/CVE-2022-23514
https://access.redhat.com/security/cve/CVE-2022-23515
https://access.redhat.com/security/cve/CVE-2022-23516
https://access.redhat.com/security/cve/CVE-2022-23517
https://access.redhat.com/security/cve/CVE-2022-23518
https://access.redhat.com/security/cve/CVE-2022-23519
https://access.redhat.com/security/cve/CVE-2022-23520
https://access.redhat.com/security/cve/CVE-2022-25857
https://access.redhat.com/security/cve/CVE-2022-27777
https://access.redhat.com/security/cve/CVE-2022-31163
https://access.redhat.com/security/cve/CVE-2022-32224
https://access.redhat.com/security/cve/CVE-2022-33980
https://access.redhat.com/security/cve/CVE-2022-38749
https://access.redhat.com/security/cve/CVE-2022-38750
https://access.redhat.com/security/cve/CVE-2022-38751
https://access.redhat.com/security/cve/CVE-2022-38752
https://access.redhat.com/security/cve/CVE-2022-41323
https://access.redhat.com/security/cve/CVE-2022-41946
https://access.redhat.com/security/cve/CVE-2022-42003
https://access.redhat.com/security/cve/CVE-2022-42004
https://access.redhat.com/security/cve/CVE-2022-42889
https://access.redhat.com/security/cve/CVE-2023-23969
https://access.redhat.com/security/cve/CVE-2023-24580
https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=XUnu
-----END PGP SIGNATURE-----
–
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Related news
Gentoo Linux Security Advisory 202408-24 - A vulnerability has been discovered in Ruby on Rails, which can lead to remote code execution via serialization of data. Versions greater than or equal to 6.1.6.1:6.1 are affected.
Red Hat Security Advisory 2024-0778-03 - An update for Jenkins and Jenkins-2-plugins is now available for OpenShift Developer Tools and Services for OCP 4.12. Issues addressed include bypass, code execution, cross site request forgery, cross site scripting, denial of service, improper authorization, information leakage, insecure permissions, and open redirection vulnerabilities.
Atlassian has released software fixes to address four critical flaws in its software that, if successfully exploited, could result in remote code execution. The list of vulnerabilities is below - CVE-2022-1471 (CVSS score: 9.8) - Deserialization vulnerability in SnakeYAML library that can lead to remote code execution in multiple products CVE-2023-22522 (CVSS score
The PyTorch model server contains multiple vulnerabilities that can be chained together to permit an unauthenticated remote attacker arbitrary Java code execution. The first vulnerability is that the management interface is bound to all IP addresses and not just the loop back interface as the documentation suggests. The second vulnerability (CVE-2023-43654) allows attackers with access to the management interface to register MAR model files from arbitrary servers. The third vulnerability is that when an MAR file is loaded, it can contain a YAML configuration file that when deserialized by snakeyaml, can lead to loading an arbitrary Java class.
A reflected cross-site scripting (XSS) vulnerability was found in the 'oob' OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.
Red Hat Security Advisory 2023-5165-01 - Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. Issues addressed include code execution, denial of service, deserialization, and integer overflow vulnerabilities.
Red Hat Security Advisory 2023-4692-01 - Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language. Issues addressed include cross site request forgery, denial of service, and remote shell upload vulnerabilities.
An update is now available for Red Hat Ansible Automation Platform 2.4 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24580: A memory exhaustion flaw was found in the python-django package. This issue occurs when passing certain inputs, leading to a system crash and denial of service. * CVE-2023-36053: A regular expression denial of service vulnerability has been found in Django. Email and URL validators are vulnerable to this flaw when processing a very large number o...
Debian Linux Security Advisory 5465-1 - Seokchan Yoon discovered that missing sanitising in the email and URL validators of Django, a Python web development framework, could result in denial of service.
A minor version update (from 7.11 to 7.12) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2012-5783: It was found that Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or su...
An update for jenkins and jenkins-2-plugins is now available for OpenShift Developer Tools and Services for OCP 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2048: A flaw was found in the Eclipse Jetty http2-server package. This flaw allows an attacker to cause a denial of service in the server via HTTP/2 requests. * CVE-2022-22976: A flaw was found in Spring Framework. The encoder does not perform any salt rounds when using the BCrypt class with the maximum wo...
Camel for Spring Boot 3.18.3 Patch 2 release and security update is now available. Red Hat Product Security has rated this update as having an impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25857: A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections. * CVE-2022-38749: A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remot...
The Web Frontend of KNIME Business Hub before 1.4.0 allows an unauthenticated remote attacker to access internals about the application such as versions, host names, or IP addresses. No personal information or application data was exposed.
An update for jenkins and jenkins-2-plugins is now available for OpenShift Developer Tools and Services for OCP 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-7692: PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An...
An update for jenkins and jenkins-2-plugins is now available for OpenShift Developer Tools and Services for OCP 4.12. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42889: A flaw was found in Apache Commons Text packages 1.5 through 1.9. The affected versions allow an attacker to benefit from a variable interpolation process contained in Apache Commons Text, which can cause properties to be dynamically defined. Server applications are vulnerable to remote code execut...
Red Hat Security Advisory 2023-2867-01 - PostgreSQL is an advanced object-relational database management system. The postgresql-jdbc package includes the .jar files needed for Java programs to access a PostgreSQL database. Issues addressed include an information leakage vulnerability.
Red Hat Security Advisory 2023-2710-01 - Red Hat Single Sign-On is an integrated sign-on solution, available as a Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat Single Sign-On for OpenShift image provides an authentication server that you can use to log in centrally, log out, and register. You can also manage user accounts for web applications, mobile applications, and RESTful web services. This erratum releases a new image for Red Hat Single Sign-On 7.6.3 for use within the Red Hat OpenShift Container Platform cloud computing Platform-as-a-Service for on-premise or private cloud deployments, aligning with the standalone product release. Issues addressed include denial of service and information leakage vulnerabilities.
Red Hat Security Advisory 2023-2707-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.3 on RHEL 9 serves as a replacement for Red Hat Single Sign-On 7.6.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include denial of service and information leakage vulnerabilities.
A security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-0341: In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1...
New Red Hat Single Sign-On 7.6.3 packages are now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-0341: In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1...
Red Hat Security Advisory 2023-2378-01 - PostgreSQL is an advanced object-relational database management system. The postgresql-jdbc package includes the .jar files needed for Java programs to access a PostgreSQL database. Issues addressed include an information leakage vulnerability.
Red Hat Security Advisory 2023-2100-01 - This release of Camel for Spring Boot 3.20.1 serves as a replacement for Camel for Spring Boot 3.18.3 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. The purpose of this text-only errata is to inform you about the security issues fixed. Issues addressed include bypass, code execution, cross site scripting, denial of service, man-in-the-middle, memory exhaustion, resource exhaustion, and traversal vulnerabilities.
Red Hat Security Advisory 2023-2101-01 - Red Hat Update Infrastructure offers a highly scalable, highly redundant framework that enables you to manage repositories and content. It also enables cloud providers to deliver content and updates to Red Hat Enterprise Linux instances. Issues addressed include denial of service and remote shell upload vulnerabilities.
An updated version of Red Hat Update Infrastructure (RHUI) is now available. RHUI 4.4 fixes several security and operational bugs, and introduces multiple new features.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-40899: An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server. * CVE-2023-23969: A flaw was found in python-django. The parsed values of the Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial of service vector via excessive memory usage if large header values are sent. * CVE-2023-24580: A memory exhaustion flaw was found in the python-django package....
An updated version of Red Hat Update Infrastructure (RHUI) is now available. RHUI 4.4 fixes several security and operational bugs, and introduces multiple new features.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-40899: An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server. * CVE-2023-23969: A flaw was found in python-django. The parsed values of the Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial of service vector via excessive memory usage if large header values are sent. * CVE-2023-24580: A memory exhaustion flaw was found in the python-django package....
Red Hat Integration Camel for Spring Boot 3.20.1 release and security update is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37533: A flaw was found in Apache Commons Net's FTP, where the client trusts the host from PASV response by default. A malicious server could redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This issue could lead to leakage of information about service...
Red Hat Security Advisory 2023-1866-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.58. Issues addressed include a cross site scripting vulnerability.
Red Hat Security Advisory 2023-1815-01 - Debezium is a distributed platform that turns your existing databases into event streams, so applications can see and respond immediately to each row-level change in the databases. Issues addressed include an information leakage vulnerability.
A security update for Debezium is now available for Red Hat Integration. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41946: A flaw was found in org.postgresql. This issue allows the creation of a temporary file when using PreparedStatement.setText(int, InputStream) and PreparedStatemet.setBytea(int, InputStream). This could allow a user to create an unexpected file available to all users, which could end in unexpected behavior.
Red Hat OpenShift Container Platform release 4.9.59 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42889: A flaw was found in Apache Commons Text packages 1.5 through 1.9. The affected versions allow an attacker to benefit from a variable interpolation process contained in Apache Commons Text, which can cause properties to be dynamically defined. Server applications are vu...
Red Hat Security Advisory 2023-1630-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. Issues addressed include an information leakage vulnerability.
Red Hat Security Advisory 2023-1486-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include HTTP request smuggling, code execution, and denial of service vulnerabilities.
Debian Linux Security Advisory 5372-1 - Multiple vulnerabilities were discovered in rails, the Ruby based server-side MVC web application framework, which could result in XSS, data disclosure and open redirect.
Debian Linux Security Advisory 5372-1 - Multiple vulnerabilities were discovered in rails, the Ruby based server-side MVC web application framework, which could result in XSS, data disclosure and open redirect.
Red Hat Security Advisory 2023-1177-01 - A security update for Red Hat Integration Camel Extensions for Quarkus 2.7-1 is now available. Issues addressed include denial of service and information leakage vulnerabilities.
Red Hat Security Advisory 2023-1006-01 - This release of Red Hat build of Quarkus 2.7.7 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Issues addressed include code execution, denial of service, deserialization, information leakage, memory leak, and remote SQL injection vulnerabilities.
Red Hat Integration Camel Extensions for Quarkus 2.7-1 release and security update is now available. The purpose of this text-only errata is to inform you about the security issues fixed. Red Hat Product Security has rated this update as having an impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41946: A flaw was found in org.postgresql. This issue allows the creation of a temporary file when using PreparedStatement.setText(int, InputStream) and PreparedStatemet.setBytea(int, InputStream). This could allow a user to create an unexpected...
Red Hat Security Advisory 2023-1151-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
Updated Satellite 6.11 packages that fixes critical security bugs and several regular bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32224: An insecure deserialization flaw was found in Active Record, which uses YAML.unsafe_load to convert the YAML data into Ruby objects. An attacker supplying crafted data to the database can perform remote code execution (RCE), resulting in complete system compromise.
Red Hat Security Advisory 2023-1047-01 - A new image is available for Red Hat Single Sign-On 7.6.2, running on Red Hat OpenShift Container Platform from the release of 3.11 up to the release of 4.12.0. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1047-01 - A new image is available for Red Hat Single Sign-On 7.6.2, running on Red Hat OpenShift Container Platform from the release of 3.11 up to the release of 4.12.0. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1047-01 - A new image is available for Red Hat Single Sign-On 7.6.2, running on Red Hat OpenShift Container Platform from the release of 3.11 up to the release of 4.12.0. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1047-01 - A new image is available for Red Hat Single Sign-On 7.6.2, running on Red Hat OpenShift Container Platform from the release of 3.11 up to the release of 4.12.0. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1045-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 9 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1045-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 9 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1045-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 9 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1043-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1043-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1043-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1043-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1044-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1044-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1044-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1044-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
New Red Hat Single Sign-On 7.6.2 packages are now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-14040: In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. * CVE-2018-14042: In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. * CVE-2019-11358: A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modi...
New Red Hat Single Sign-On 7.6.2 packages are now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-14040: In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. * CVE-2018-14042: In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. * CVE-2019-11358: A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modi...
New Red Hat Single Sign-On 7.6.2 packages are now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-14040: In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. * CVE-2018-14042: In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. * CVE-2019-11358: A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modi...
Red Hat Security Advisory 2023-0777-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.9.56. Issues addressed include bypass, code execution, cross site request forgery, cross site scripting, denial of service, deserialization, and improper authorization vulnerabilities.
Red Hat Security Advisory 2023-0778-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.56.
Red Hat Security Advisory 2023-0778-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.56.
Red Hat OpenShift Container Platform release 4.9.56 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-7692: PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enou...
Red Hat OpenShift Container Platform release 4.9.56 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3064: A flaw was found in go-yaml. This issue causes the consumption of excessive amounts of CPU or memory when attempting to parse a large or maliciously crafted YAML document.
Red Hat OpenShift Container Platform release 4.9.56 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3064: A flaw was found in go-yaml. This issue causes the consumption of excessive amounts of CPU or memory when attempting to parse a large or maliciously crafted YAML document.
Red Hat Security Advisory 2023-0698-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.52.
Red Hat Security Advisory 2023-0697-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.52. Issues addressed include code execution and deserialization vulnerabilities.
Red Hat Security Advisory 2023-0759-01 - PostgreSQL is an advanced object-relational database management system. The postgresql-jdbc package includes the .jar files needed for Java programs to access a PostgreSQL database.
Red Hat OpenShift Container Platform release 4.10.52 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1471: A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE). *...
Red Hat OpenShift Container Platform release 4.10.52 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3064: A flaw was found in go-yaml. This issue causes the consumption of excessive amounts of CPU or memory when attempting to parse a large or maliciously crafted YAML document.
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
Ubuntu Security Notice 5868-1 - Jakob Ackermann discovered that Django incorrectly handled certain file uploads. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service.
Red Hat Security Advisory 2023-0742-01 - Red Hat Update Infrastructure offers a highly scalable, highly redundant framework that enables you to manage repositories and content. It also enables cloud providers to deliver content and updates to Red Hat Enterprise Linux instances. Issues addressed include a bypass vulnerability.
An update for ovirt-ansible-collection, ovirt-engine, and postgresql-jdbc is now available for Red Hat Virtualization 4 Tools for Red Hat Enterprise Linux 8, Red Hat Virtualization 4 for Red Hat Enterprise Linux 8, and Red Hat Virtualization Engine 4.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41946: A flaw was found in org.postgresql. This issue allows the creation of a temporary file when using PreparedStatement.setText(int, InputStream) and PreparedStatemet.se...
Red Hat Security Advisory 2023-0560-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include bypass, cross site request forgery, cross site scripting, denial of service, deserialization, and improper authorization vulnerabilities.
An update for Red Hat Data Grid 8 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-36313: A flaw was found in the file-type npm package. A malformed MKV file could lead the file type detector to a denial of Service. This issue allows an attacker to input a malicious file and make the server unresponsive. * CVE-2022-37603: A flaw was found in loader-utils webpack library. When the url variable from interpolateName is set, the prototype can be polluted. ...
An issue was discovered in Couchbase Server 7.x before 7.0.5 and 7.1.x before 7.1.2. A crafted HTTP REST request from an administrator account to the Couchbase Server Backup Service can exhaust memory resources, causing the process to be killed, which can be used for denial of service.
An issue was discovered in Couchbase Server 7.x before 7.0.5 and 7.1.x before 7.1.2. A crafted HTTP REST request from an administrator account to the Couchbase Server Backup Service can exhaust memory resources, causing the process to be killed, which can be used for denial of service.
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
Ubuntu Security Notice 5837-2 - USN-5837-1 fixed a vulnerability in Django. This update provides the corresponding update for Ubuntu 16.04 ESM. Nick Pope discovered that Django incorrectly handled certain Accept-Language headers. A remote attacker could possibly use this issue to cause Django to consume memory, leading to a denial of service.
Ubuntu Security Notice 5837-1 - Nick Pope discovered that Django incorrectly handled certain Accept-Language headers. A remote attacker could possibly use this issue to cause Django to consume memory, leading to a denial of service.
An update is now available for Migration Toolkit for Runtimes (v1.0.1). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42920: Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing
An update for Logging Subsystem (5.6.0) is now available for Red Hat OpenShift Container Platform. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server error...
An update for Logging Subsystem (5.6.0) is now available for Red Hat OpenShift Container Platform. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server error...
Red Hat Security Advisory 2023-0261-02 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
Red Hat Security Advisory 2023-0261-02 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
Red Hat Security Advisory 2023-0189-01 - Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. This release of Red Hat AMQ Streams 2.3.0 serves as a replacement for Red Hat AMQ Streams 2.2.0, and includes security and bug fixes, and enhancements. Issues addressed include a denial of service vulnerability.
Updated Satellite 6.12 packages that fixes critical security bugs and several regular bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32224: activerecord: Possible RCE escalation bug with Serialized Columns in Active Record * CVE-2022-42889: apache-commons-text: variable interpolation RCE
Updated Satellite 6.12 packages that fixes critical security bugs and several regular bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32224: activerecord: Possible RCE escalation bug with Serialized Columns in Active Record * CVE-2022-42889: apache-commons-text: variable interpolation RCE
Red Hat AMQ Streams 2.3.0 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2047: jetty-http: improver hostname input handling * CVE-2022-2048: http2-server: Invalid HTTP/2 requests cause DoS * CVE-2022-2191: jetty-server: Improper release of ByteBuffers in SslConnections * CVE-2022-38752: snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode * CVE-2022-42003: jackson-databind: deep wrapper array nesting...
Dell EMC SCG Policy Manager, versions from 5.10 to 5.12, contain(s) a contain a Hard-coded Cryptographic Key vulnerability. An attacker with the knowledge of the hard-coded sensitive information, could potentially exploit this vulnerability to login to the system to gain admin privileges.
IBM Spectrum Control 5.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 233982.
IBM Spectrum Control 5.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 233982.
IBM Security Guardium 11.4 could allow a privileged user to obtain sensitive information inside of an HTTP response. IBM X-Force ID: 235405.
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could be vulnerable to sensitive information exposure by passing API keys to log files. If these keys contain sensitive information, it could lead to further attacks. IBM X-Force ID: 240450.
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could be vulnerable to sensitive information exposure by passing API keys to log files. If these keys contain sensitive information, it could lead to further attacks. IBM X-Force ID: 240450.
Red Hat Security Advisory 2022-9058-01 - Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Issues addressed include code execution and deserialization vulnerabilities.
An update for prometheus-jmx-exporter is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1471: SnakeYaml: Constructor Deserialization Remote Code Execution
rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both "select" and "style" elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version 1.4.4. All users overriding the allowed tags to include both "select" and "style" should either upgrade or use this workaround: Remove either "select" or "style" from the overridden allowed tags. NOTE: Code is _not_ impacted if allowed tags are overridden using either the :tags option to the Action View helper method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize.
rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags in either of the following ways: allow both "math" and "style" elements, or allow both "svg" and "style" elements. Code is only impacted if allowed tags are being overridden. . This issue is fixed in version 1.4.4. All users overriding the allowed tags to include "math" or "svg" and "style" should either upgrade or use the following workaround immediately: Remove "style" from the overridden allowed tags, or remove "math" and "svg" from the overridden allowed tags.
Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah >= 2.1.0, < 2.19.1 is vulnerable to cross-site scripting via the image/svg+xml media type in data URIs. This issue is patched in version 2.19.1.
Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah < 2.19.1 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1.
Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah >= 2.2.0, < 2.19.1 uses recursion for sanitizing CDATA sections, making it susceptible to stack exhaustion and raising a SystemStackError exception. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1. Users who are unable to upgrade may be able to mitigate this vulnerability by limiting the length of the strings that are sanitized.
## Summary There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer. This is due to an incomplete fix of CVE-2022-32209. - Versions affected: ALL - Not affected: NONE - Fixed versions: 1.4.4 ## Impact A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both "select" and "style" elements. Code is only impacted if allowed tags are being overridden using either of the following two mechanisms: 1. Using the Rails configuration `config.action_view.sanitized_allow_tags=`: ```ruby # In config/application.rb config.action_view.sanitized_allowed_tags = ["select", "style"] ``` (see https://guides.rubyonrails.org/configuring.html#configuring-action-view) 2. Using the class method `Rails::Html::SafeListSanitizer.allowed_tags=`: ```ruby # class-level option Rails::Html::SafeListSanitizer...
## Summary There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer. - Versions affected: ALL - Not affected: NONE - Fixed versions: 1.4.4 ## Impact A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags in either of the following ways: - allow both "math" and "style" elements, - or allow both "svg" and "style" elements Code is only impacted if allowed tags are being overridden. Applications may be doing this in four different ways: 1. using application configuration: ```ruby # In config/application.rb config.action_view.sanitized_allowed_tags = ["math", "style"] # or config.action_view.sanitized_allowed_tags = ["svg", "style"] ``` see https://guides.rubyonrails.org/configuring.html#configuring-action-view 2. using a `:tags` option to the Action View helper `sanitize`: ``` <%= saniti...
## Summary rails-html-sanitizer `>= 1.0.3, < 1.4.4` is vulnerable to cross-site scripting via data URIs when used in combination with Loofah `>= 2.1.0`. ## Mitigation Upgrade to rails-html-sanitizer `>= 1.4.4`. ## Severity The maintainers have evaluated this as [Medium Severity 6.1](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ## References - [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html) - [SVG MIME Type (image/svg+xml) is misleading to developers · Issue #266 · w3c/svgwg](https://github.com/w3c/svgwg/issues/266) - https://github.com/rails/rails-html-sanitizer/issues/135 - https://hackerone.com/reports/1694173 ## Credit This vulnerability was independently reported by Maciej Piechota (@haqpl) and Mrinmoy Das (@goromlagche).
## Summary Certain configurations of rails-html-sanitizer `< 1.4.4` use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. ## Mitigation Upgrade to rails-html-sanitizer `>= 1.4.4`. ## Severity The maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ## References - [CWE - CWE-1333: Inefficient Regular Expression Complexity (4.9)](https://cwe.mitre.org/data/definitions/1333.html) - https://hackerone.com/reports/1684163 ## Credit This vulnerability was responsibly reported by @ooooooo-q (https://github.com/ooooooo-q).
## Summary Loofah `>= 2.2.0, < 2.19.1` uses recursion for sanitizing `CDATA` sections, making it susceptible to stack exhaustion and raising a `SystemStackError` exception. This may lead to a denial of service through CPU resource consumption. ## Mitigation Upgrade to Loofah `>= 2.19.1`. Users who are unable to upgrade may be able to mitigate this vulnerability by limiting the length of the strings that are sanitized. ## Severity The Loofah maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ## References - [CWE - CWE-674: Uncontrolled Recursion (4.9)](https://cwe.mitre.org/data/definitions/674.html)
## Summary Loofah `>= 2.1.0, < 2.19.1` is vulnerable to cross-site scripting via the `image/svg+xml` media type in data URIs. ## Mitigation Upgrade to Loofah `>= 2.19.1`. ## Severity The Loofah maintainers have evaluated this as [Medium Severity 6.1](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ## References - [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html) - [SVG MIME Type (image/svg+xml) is misleading to developers · Issue #266 · w3c/svgwg](https://github.com/w3c/svgwg/issues/266) - https://hackerone.com/reports/1694173 - https://github.com/flavorjones/loofah/issues/101 ## Credit This vulnerability was responsibly reported by Maciej Piechota (@haqpl).
## Summary Loofah `< 2.19.1` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. ## Mitigation Upgrade to Loofah `>= 2.19.1`. ## Severity The Loofah maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ## References - [CWE - CWE-1333: Inefficient Regular Expression Complexity (4.9)](https://cwe.mitre.org/data/definitions/1333.html) - https://hackerone.com/reports/1684163 ## Credit This vulnerability was responsibly reported by @ooooooo-q (https://github.com/ooooooo-q).
IBM Cloud Transformation Advisor 2.0.1 through 3.3.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 237214.
IBM Cloud Transformation Advisor 2.0.1 through 3.3.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 237214.
Red Hat Security Advisory 2022-8902-01 - This release of Camel for Spring Boot 3.18.3 serves as a replacement for Camel for Spring Boot 3.14.2 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.
Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...
Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...
Red Hat Security Advisory 2022-8876-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.10.2 includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-8876-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.10.2 includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a denial of service vulnerability.
Red Hat AMQ Broker 7.10.2 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25857: snakeyaml: Denial of Service due to missing nested depth limitation for collections * CVE-2022-38749: snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode * CVE-2022-38750: snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject * CVE-2022-38751: snakeyaml: Uncaugh...
Red Hat AMQ Broker 7.10.2 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25857: snakeyaml: Denial of Service due to missing nested depth limitation for collections * CVE-2022-38749: snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode * CVE-2022-38750: snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject * CVE-2022-38751: snakeyaml: Uncaugh...
Redmine 5.x before 5.0.4 allows downloading of file attachments of any Issue or any Wiki page due to insufficient permission checks. Depending on the configuration, this may require login as a registered user.
A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization.
**Vulnerability** `PreparedStatement.setText(int, InputStream)` and `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 2k Example of vulnerable code: ``` String s = new String("some very large string greater than 2048 bytes) PreparedStatement.setText(1, s); ``` This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. Impact On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. When analyzing the impact of this vulnerability, here are the important questions to ask: Is the driver running in an environment where the OS has other unt...
pgjdbc is an open source postgresql JDBC Driver. In affected versions a prepared statement using either `PreparedStatement.setText(int, InputStream)` or `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 2k. This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. Java 1.7 and higher users: this vulnerability is fixed in 4.5.0. Java 1.6 and lower users: no ...
Red Hat Security Advisory 2022-8524-01 - Red Hat Data Grid is an in-memory, distributed, NoSQL datastore solution. It increases application response times and allows for dramatically improving performance while providing availability, reliability, and elastic scale. Data Grid 8.4.0 replaces Data Grid 8.3.1 and includes bug fixes and enhancements. Find out more about Data Grid 8.4.0 in the Release Notes[3]. Issues addressed include cross site scripting and denial of service vulnerabilities.
Red Hat Security Advisory 2022-8524-01 - Red Hat Data Grid is an in-memory, distributed, NoSQL datastore solution. It increases application response times and allows for dramatically improving performance while providing availability, reliability, and elastic scale. Data Grid 8.4.0 replaces Data Grid 8.3.1 and includes bug fixes and enhancements. Find out more about Data Grid 8.4.0 in the Release Notes[3]. Issues addressed include cross site scripting and denial of service vulnerabilities.
An update for Red Hat Data Grid 8 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-23647: prismjs: improperly escaped output allows a XSS * CVE-2022-24823: netty: world readable temporary file containing sensitive data * CVE-2022-25857: snakeyaml: Denial of Service due to missing nested depth limitation for collections * CVE-2022-38749: snakeyaml: Uncaught exception...
An update for Red Hat Data Grid 8 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-23647: prismjs: improperly escaped output allows a XSS * CVE-2022-24823: netty: world readable temporary file containing sensitive data * CVE-2022-25857: snakeyaml: Denial of Service due to missing nested depth limitation for collections * CVE-2022-38749: snakeyaml: Uncaught exception...
An update for Red Hat Data Grid 8 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-23647: prismjs: improperly escaped output allows a XSS * CVE-2022-24823: netty: world readable temporary file containing sensitive data * CVE-2022-25857: snakeyaml: Denial of Service due to missing nested depth limitation for collections * CVE-2022-38749: snakeyaml: Uncaught exception...
An update for Red Hat Data Grid 8 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-23647: prismjs: improperly escaped output allows a XSS * CVE-2022-24823: netty: world readable temporary file containing sensitive data * CVE-2022-25857: snakeyaml: Denial of Service due to missing nested depth limitation for collections * CVE-2022-38749: snakeyaml: Uncaught exception...
Debian Linux Security Advisory 5283-1 - Several flaws were discovered in jackson-databind, a fast and powerful JSON library for Java.
Debian Linux Security Advisory 5283-1 - Several flaws were discovered in jackson-databind, a fast and powerful JSON library for Java.
Jenkins Violations Plugin 0.7.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Jenkins Reverse Proxy Auth Plugin 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system.
A missing permission check in Jenkins loader.io Plugin 1.0.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Jenkins Naginator Plugin 1.18.1 and earlier does not escape display names of source builds in builds that were triggered via Retry action, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to edit build display names.
Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.
Jenkins CCCC Plugin 0.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
An incorrect permission check in Jenkins Support Core Plugin 1206.v14049fa_b_d860 and earlier allows attackers with Support/DownloadBundle permission to download a previously created support bundle containing information limited to users with Overall/Administer permission.
Jenkins JAPEX Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
A missing permission check in Jenkins XP-Dev Plugin 1.0 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to an attacker-specified repository.
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.
Updated Satellite 6.11 packages that fix several bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30122: rubygem-rack: crafted multipart POST request may cause a DoS * CVE-2022-31163: rubygem-tzinfo: arbitrary code execution
WordPress security company Wordfence on Thursday said it started detecting exploitation attempts targeting the newly disclosed flaw in Apache Commons Text on October 18, 2022. The vulnerability, tracked as CVE-2022-42889 aka Text4Shell, has been assigned a severity ranking of 9.8 out of a possible 10.0 on the CVSS scale and affects versions 1.5 through 1.9 of the library. It's also similar to
Experts say CVE-2022-42899 is a serious vulnerability, but widespread exploitation is unlikely because of the specific conditions that need to exist for it to happen.
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
There's nothing yet to suggest CVE-2022-42889 is the next Log4j. But proof-of-concept code is available, and interest appears to be ticking up.
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression.
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolator...
Red Hat Security Advisory 2022-6823-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.7 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.6, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.7 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6822-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.7 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.6, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.7 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include a denial of service vulnerability.
An update for prometheus-jmx-exporter is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25857: snakeyaml: Denial of Service due to missing nested depth limitation for collections
A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1259: undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) * CVE-2022-2053: undertow: Large AJP request may cause DoS * CVE-2022-25857: snakeyaml: Denial of Service due to missing nested depth limitation for collections
An update is now available for Red Hat build of Eclipse Vert.x. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE pages listed in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25857: snakeyaml: Denial of Service due to missing nested depth limitation for collections * CVE-2022-37734: graphql-java: DoS by malicious query * CVE-2022-38749: snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode * CVE-2022-38750: snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructo...
Ubuntu Security Notice 5653-1 - Benjamin Balder Bach discovered that Django incorrectly handled certain internationalized URLs. A remote attacker could possibly use this issue to cause Django to crash, resulting in a denial of service.
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DoS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
Arvados is an open source platform for managing, processing, and sharing genomic and other large scientific and biomedical data. A remote code execution (RCE) vulnerability in the Arvados Workbench allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This exists in all versions up to 2.4.1 and is fixed in 2.4.2. This vulnerability is specific to the Ruby on Rails Workbench application (“Workbench 1”). We do not believe any other Arvados components, including the TypesScript browser-based Workbench application (“Workbench 2”) or API Server, are vulnerable to this attack. For versions of Arvados earlier than 2.4.2: remove the Ruby-based "Workbench 1" app ("apt-get remove arvados-workbench") from your installation as a workaround.
Arvados is an open source platform for managing, processing, and sharing genomic and other large scientific and biomedical data. A remote code execution (RCE) vulnerability in the Arvados Workbench allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This exists in all versions up to 2.4.1 and is fixed in 2.4.2. This vulnerability is specific to the Ruby on Rails Workbench application (“Workbench 1”). We do not believe any other Arvados components, including the TypesScript browser-based Workbench application (“Workbench 2”) or API Server, are vulnerable to this attack. For versions of Arvados earlier than 2.4.2: remove the Ruby-based "Workbench 1" app ("apt-get remove arvados-workbench") from your installation as a workaround.
TZInfo is a Ruby library that provides access to time zone data and allows times to be converted using time zone rules. Versions prior to 0.36.1, as well as those prior to 1.2.10 when used with the Ruby data source tzinfo-data, are vulnerable to relative path traversal. With the Ruby data source, time zones are defined in Ruby files. There is one file per time zone. Time zone files are loaded with `require` on demand. In the affected versions, `TZInfo::Timezone.get` fails to validate time zone identifiers correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later, `TZInfo::Timezone.get` can be made to load unintended files with `require`, executing them within the Ruby process. Versions 0.3.61 and 1.2.10 include fixes to correctly validate time zone identifiers. Versions 2.0.0 and later are not vulnerable. Version 0.3.61 can still load arbitrary files from the Ruby load path if their name follows the rules for a valid time zone identifier and the ...
### Impact #### Affected versions - 0.3.60 and earlier. - 1.0.0 to 1.2.9 when used with the Ruby data source (tzinfo-data). #### Vulnerability With the Ruby data source (the tzinfo-data gem for tzinfo version 1.0.0 and later and built-in to earlier versions), time zones are defined in Ruby files. There is one file per time zone. Time zone files are loaded with `require` on demand. In the affected versions, `TZInfo::Timezone.get` fails to validate time zone identifiers correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later, `TZInfo::Timezone.get` can be made to load unintended files with `require`, executing them within the Ruby process. For example, with version 1.2.9, you can run the following to load a file with path `/tmp/payload.rb`: ```ruby TZInfo::Timezone.get("foo\n/../../../../../../../../../../../../../../../../tmp/payload") ``` The exact number of parent directory traversals needed will vary depending on the location of t...
When serialized columns that use YAML (the default) are deserialized, Rails uses YAML.unsafe_load to convert the YAML data in to Ruby objects. If an attacker can manipulate data in the database (via means like SQL injection), then it may be possible for the attacker to escalate to an RCE. There are no feasible workarounds for this issue, but other coders (such as JSON) are not impacted.
An XSS Vulnerability in Action Pack >= 5.2.0 and < 5.2.0 that could allow an attacker to bypass CSP for non HTML like responses.
A XSS Vulnerability in Action View tag helpers >= 5.2.0 and < 5.2.0 which would allow an attacker to inject content if able to control input into specific attributes.