Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2022-8506-01

Red Hat Security Advisory 2022-8506-01 - Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool. Issues addressed include code execution, cross site scripting, denial of service, remote SQL injection, and traversal vulnerabilities.

Packet Storm
#sql#xss#vulnerability#web#ios#mac#google#linux#debian#red_hat#dos#apache#redis#js#git#java#perl#ldap#vmware#oauth#auth#ssh#ruby#rpm#mongo#postgres#docker#sap#ssl
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256====================================================================                   Red Hat Security AdvisorySynopsis:          Important: Satellite 6.12 ReleaseAdvisory ID:       RHSA-2022:8506-01Product:           Red Hat Satellite 6Advisory URL:      https://access.redhat.com/errata/RHSA-2022:8506Issue date:        2022-11-16CVE Names:         CVE-2021-37136 CVE-2021-37137 CVE-2022-22818                   CVE-2022-24836 CVE-2022-25648 CVE-2022-29970                   CVE-2022-32209 CVE-2022-34265====================================================================1. Summary:An update is now available for Red Hat Satellite 6.12. The release containsa new version of Satellite and important security fixes for variouscomponents.2. Relevant releases/architectures:Red Hat Satellite 6.12 for RHEL 8 - noarch, x86_643. Description:Red Hat Satellite is a systems management tool for Linux-basedinfrastructure. It allows for provisioning, remote management, andmonitoring of multiple Linux deployments with a single centralized tool.Security Fix(es):* netty-codec: Bzip2Decoder doesn't allow setting size restrictions fordecompressed data (CVE-2021-37136)* netty-codec: SnappyFrameDecoder doesn't restrict chunk length and maybuffer skippable chunks in an unnecessary way (CVE-2021-37137)* python3-django: Possible XSS via template tag (CVE-2022-22818)* tfm-rubygem-nokogiri: ReDoS in HTML encoding detection (CVE-2022-24836)* tfm-rubygem-sinatra: Path traversal possible outside of public_dir whenserving static files (CVE-2022-29970)* tfm-rubygem-git: Package vulnerable to Command Injection via git argumentinjection (CVE-2022-25648)* rubygem-rails-html-sanitizer: Possible XSS with certain configurations(CVE-2022-32209)* python3-django: Potential SQL injection via Trunc and Extract arguments(CVE-2022-34265)For more details about the security issue(s), including the impact, a CVSSscore, acknowledgments, and other related information, refer to the CVEpage(s) listed in the References section.Additional Changes:The items above are not a complete list of changes. This update also fixesseveral bugs and adds various enhancements. Documentation for these changesis available from the Release Notes document.4. Solution:For Red Hat Satellite 6.12, see the following documentation for therelease.https://access.redhat.com/documentation/en-us/red_hat_satellite/6.12The important instructions on how to upgrade are available below.https://access.redhat.com/documentation/en-us/red_hat_satellite/6.12/html/upgrading_and_updating_red_hat_satellite5. Bugs fixed (https://bugzilla.redhat.com/):1309740 - [RFE] As a user, I want to schedule a job and receive an e-mail summary when it completes1703496 - Satellite audits cleanup1732590 - Cannot add filter on same RPM name with different architectures1775813 - A publish content view displays (Invalid Date) for the date and time of when the content view was published.1829468 - [RFE] Be able to retrieve the software vendor package from the installed package1830968 - [RFE] API should return simple results to understand if the repositories for hosts are enabled or not.1834897 - [RFE] Remove the configuration 'env=Library' created by the virt-who configuration plugin in the Satellite WebUI1850393 - [RFE] REX Pull Provider1868175 - Red Hat Satellite should notify about published content view while removing Lifecycle environment1868323 - "Confirm services restart" modal window grammatically does not respect that multiple systems are selected for a reboot1870816 - Deploy script breaks when the password of hypervisor contains single quotes1879811 - [ALL_LANG] [SAT_6.8 | 6.9 | 6.10|6.11 ] Web elements are not localized (Available Button, ON/OFF Switch Button)1884148 - description of filter_host_parents does not match virt-who-config1892218 - Multi-page listing when adding repositories to Content Views confuses the number of repositories to add1892752 - Scheduled job "Create RSS notifications" does not use proxy1894033 - [RFE] Add SSH User field to Advanced Fields in Job Invocation of SSH Command - remote_execution_ssh_user per Remote Execution task1908841 - Capsule certs regeneration fails with an error if the organization has a `'` in the name1912941 - Verbose log outputs for Ansible jobs are reported to all Hosts present on the Job.1925165 - [RFE] Unordered RPMs in repodata decrease compression efficiency1930577 - when running ReX via SSH on 2242 hosts, got "Timed out reading data from server"1931532 - When running remote execution from Satellite to an RHEL 8 with tlog enabled it fails.1931665 - Need clearer error message when manifest is no longer valid when syncing inventory1934210 - Bad HTTP method requests filling up /var/log/messages with stack traces1938092 - [RFE] Insights recommendations should have url links for related knowledgebase article and c.r.c.1940396 - [RFE] Introduction of GUI based option to be able to bulk select and remove Content View versions in Red Hat Satellite 61951542 - Insights Table doesnt translate the pagination strings1952939 - [RFE] Support for Satellite Tools version-1 repository is version.1959136 - Backtick in password causes failure during deployment of virt-who config.1962253 - Global registration succeeded but throwing error messages when auto-attach is true1964080 - [BUG] The != and ~ search params does not work with os_minor parameter in Satellite 6.91970132 - [BUG] Invalid choice for template_kind listed for os_default_template module1970623 - [BUG] Error Can't join 'Katello::ContentFacetRepository' to association named 'hostgroup' when clicking on "Errata Installation" inside a host_collection as a non-admin user1971747 - "Registered Content Hosts" Report is Showing the Wrong Available Kernel Version for RHEL 7.7 Client1973329 - Provide upstream repository name value to allow a name change on the repository to not break Satellite if an enabled repository's name gets changed1974180 - Default user input value is not set for job invocation1981444 - "Subscription - Entitlement Report" does not show correct number of subscriptions attached/consumed1982698 - Ansible playbook execution crash for Hosts: localhost1982745 - Reprovisioning a host using new HostGroup does not inherit root password from the new HostGroup1984400 - Capsule upgrade/install fails due to proxy configuration in  'HTTP(S) proxy' in settings1989631 - Ruby warning: URI.escape is obsolete after the host is provisioned1990119 - Documentation bug for the compute_resource module1991557 - Many Postgres ERRORs (duplicate key) especially on RedHat repo sync1994877 - [RFE] Example is missing in "Install packages" option in the Advanced Tab of "Register Host" form.1994945 - hammer cannot  use the cluster name or id as valid input when clusters are residing inside folders and fails with error Fog::Vsphere::Compute::NotFound error1998477 - Add Simple content access status API to check whether SCA is enabled or disabled in Satellite2000613 - The login page exposes version of the satellite2001517 - [RFE] Allow "on_demand" download policy for repositories of content_type docker2001552 - Host facts are not uploaded to satellite when content host is registered with Satellite using global registration form.2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way2006974 - [ALL_LANG] [SAT_6.10 | 6.11] 'No matches found' text is untranslated in search bar2007117 - [ ALL_LANG] [SAT_6.10 | 6.11] 'Filter' string from switcher section search box is not marked as translatable string2011312 - Misspelled word in tooltip "Toggel" instead of "Toggle"2013611 - Hammer compute-profile create missing 'boot_order' from 'compute-attributes'2015062 - Scap Content Page redirects to Satellite documentation instead of  Scap Content2015757 - 'Mail enabled' setting cannot be switched with the hammer user command.2016924 - The value set by 'hammer activation-key content-override'command cannot be confirmed by 'hammer activation-key info' command.2022065 - ansible modules don't work correctly when a HTTP?HTTPS redirect occurs2022649 - Hammer unable to send correct value for for Job Templates in order to update ALL packages.2024175 - [RFE] Include Tower extra vars feature when calling the API callback2024576 - Extra audit record created on Organization create action2024968 - [RFE] Expose parameter trusted_proxies on satellite-installer2025892 - [RFE] Allow configuring cockpit with multiple origins through satellite-installer2025926 - [RFE] Identify host Build Token using hammer2027947 - HypervisorHeartbeatUpdateJob is taking long time to process and updates wrong consumer records2028112 - Ansible roles are failed with exit status 0 but the job is showing status success and the task is also showing result success.2033321 - Manifest refresh fails on Candlepin: One or more pools was left in an undefined state2033381 - Remove the space at the end of foreman-proxy-certs-generate printed installer cmd2035287 - The online backup attempt still shows a warning about mongodb when executed in Satellite 6.102036151 - Can't assign different networks on 2+ NICs with vNIC profiles selected2038989 - [RFE] Satellite Security Concerns for Apache2043126 - Non-enabled repository types make it into the apipie help-text2043242 - [RFE] make worker show what task they are currently running2048547 - When using async_ssh true and for some reason the script retrieve.sh fails to, the task remain stuck2048775 - CVE-2022-22818 django: Possible XSS via '{% debug %}' template tag2049595 - missing information about puppet attributes in API/CLI2051648 - [RFE] Better Detail When Job Fails Due To SSH Problem2051891 - vCPUs in RHV getting reset to one vCPU after editing a host in Satellite2052076 - foreman-proxy does not log permissions errors when trying to read ssl_ca.pem2053842 - The "Serve via HTTP" and "Verify SSL" options in Repo Discovery page does not functions at all in Satellite 7.02054011 - Submit button on Edit page of a host will revert back to a invalid page on Satellite2054042 - [RFE] Logs in dynflow console needs more descriptive when SSH REX job fails on Satellite 7.2054786 - {"publication":["Invalid hyperlink - Object does not exist."]} error when syncing a repository2054969 - Navigation switch between multiple capsules don't work as expected2055391 - After upgrade products with repositories that had Ignorable Content = drpm can no longer be modified2055416 - redhat.satellite.content_upload ansible module with unexpected src parameter behavior2055979 - [RFE] - use native Ansible module for Install from git job template2056188 - The redesigned Host page in Satellite does not offers any option to invoke/schedule a remote execution job for a client system2056702 - Import library with overlapping content can fail with unique-constraint violation2058037 - UEFI: Grub network boot templates need to be updated2059179 - job template selector missing id in the new rex wizard2060651 - Cannot upload a package to a repository if the same package already exists in another repository, but is not downloaded2062800 - OpenSCAP is using the removed puppetrun setting2064979 - Clients can't subscribe to or enable Red Hat repositories after renewing subscriptions2068454 - repositories/import_uploads API endpoint do require two mandatory parameters2069306 - [RFE] Need syncable yum-format repository exports2069440 - [RFE] new host ui details, upgrades to host status2069634 - new host ui details, unable to read the host from different taxonomies when logged in2070001 - Space reclaiming fails on a blank Satellite2070535 - Content View publish fails with error PG::CardinalityViolation: ERROR: ON CONFLICT DO UPDATE command cannot affect row a second time.2070732 - Use more accurate messaging when host statuses are cleared2070972 - Sentence case fixes needed in the new Host page2072696 - Creating ESX compute resource on vcenter 7.x fails with InvalidArgument: A specified parameter was not correct: deviceChange[1].device.key2073305 - installer spams with katello-certs-check output when using custom certs2074346 - CVE-2022-24836 nokogiri: ReDoS in HTML encoding detection2075056 - new host ui details, repository sets, search auto-complete is missing2076843 - CVE-2022-25648 ruby-git: package vulnerable to Command Injection via git argument injection2077811 - new host ui, content, errata subtab,  when N/A is chosen as severity filter erratas results are empty2077822 - new host ui details, add button to navigate to old content UI2077824 - [RFE] API to allow search by object ID on any object2080324 - Satellite incorrectly reports email test success2080423 - Docker pull fails with 'missing or empty Content-Length header'2081096 - CVE-2022-29970 sinatra: path traversal possible outside of public_dir when serving static files2084130 - CertificateCleanupJob fails with foreign key constraint violation on table cp_upstream_consumer2085490 - Discovery and bootdisk templates don't get description populated from metadata2088303 - Webhook raises "certificate verify failed" error  even the target host is trusted by the system SSL CA bundle2089445 - The About page under Administer still refers to IRC channel at Freenode2089828 - default Organization and location not set for AD users2091044 - new host ui details,ansible roles, submitting form without any roles should show warning2092039 - Content import fails if repo labels differ and repo is already imported2093884 - Every CV Publish+Promote action followed by an automated Capsule sync task generates a huge traceback "(ActiveRecord::RecordNotFound): Couldn't find ForemanTasks::Task::DynflowTask" in Satellite 6.112094019 - Missing LCE and CV label in CLI CDN configuration2095187 - Fail to create virtwho config on nutanix env for error "Invalid option for hypervisor [ahv]"2095820 - All errata are applied when user only selects certain errata2096429 - Global Registration will fail if use a different language2098240 - [RFE] Add 'System purpose' card to new host details / Overview tab2099620 - Starting or Restarting foreman.socket will raise a harmless "TCP_NODELAY failed: Operation not supported" error in Red Hat Satellite 6.9/6.10/6.112100578 - satellite-clone should enable the Satellite module2100887 - Repository sets and Errata tabs do not show toggle group when host is in Library environment but non-default content view2101579 - Retain packages on Repository removes RPMs from Pulp but not from Katello2101882 - CVE-2022-32209 rubygem-rails-html-sanitizer: possible xss with certain configurations2101986 - Getting "NoPermission: Permission to perform this operation was denied." when edit host or compute profile2102145 - 'Satellite-maintain backup online' states info about Mongo in the warning message2102456 - [RFE] - Add static ouia-id to modal with wizard for publishing a cv2102825 - satellite-clone fails to adjust ownership of /var/lib/pulp if it's owned by non-existing user/group2102867 - Post upgrade to satellite 6.10, sync summary email notification shows the incorrect summary for newly added errata.2102896 - CVE-2022-34265 python-django: Potential SQL injection via Trunc(kind) and Extract(lookup_name) arguments2103096 - After syncing a repository, it doesn't sync to the capsule automatically.2103099 - satellite-clone fails to restore online backup on RHEL82103102 - MemoryError when importing large repo to disconnected Satellite2103106 - Attempt to disable a Red Hat Repository fails with error "Cannot delete record because of dependent library_instances_inverse" if the repository is part of any CV versions in Satellite 6.102103110 - undefined method `find' for nil:NilClass when importing content that has gpg_keys associated to it2103129 - RHEL 9 appstream and baseos not showing as recommended repositories2103522 - Capsule sync fails with "Parsing interrupted: The repository metadata being synced into Pulp is erroneous in a way that makes it ambiguous (duplicate NEVRAs).."2104401 - Improve speed of manifest refresh by running RefreshIfNeeded steps concurrently2104498 - Unable to sync jfrog artifactory-pro-rpms repository2105048 - Error 'modulemd-yaml-error-quark' while synchronizing fedora modular repository on Satellite 6.10.2105107 - Data issue for users on RHEL7 syncing EL8+ EPEL or Fedora Modular repositories2105144 - Scheduling a remote execution job through API calls are using UTC instead of timezone2105299 - Email notification shows incorrect new errata after syncing an Epel repository2105941 - After 6.10 to 6.11 upgrade on FIPS setup, repository sync operations fail with an error "[digital envelope routines: EVP_DigestInit_ex] disabled for fips"2106000 - Manifest Refresh should ensure environment-content association2106090 - Running smart-proxy-openscap-send command returns "Gemfile lists the gem rsec (< 1) more than once" on Satellite 6.10.2106091 - Exclude filter may exclude errata and packages that are needed2106092 - Manifest refresh randomly fails with "No such file or directory" when having multile dynflow workers2106093 - Simplify self-upgrade mechanism2106333 - Add Satellite and Capsule 6.12 upgrade scenarios2106659 - Inconsistent packages versioning2106691 - Satellite 6.12 still defaults to the legacy host UI2106700 - Invocations fail with NoMethodError - undefined method `code' if capsule loses script feature without satellite noticing2106885 - Upgrade to Satellite 6.11 fails in db:seed state with error "ActiveRecord::RecordInvalid: Validation failed: Name has already been taken"2107252 - Last item in Webhooks table is overflowing2107572 - packaging request for pull provider dependencies2107577 - execution of roles with missing modules doesn't fail the execution2107701 - [Pulp 3] If a modulemd metadata artifact is missing from the filesystem but has an artifact_id associated with it in database, "Verify Content Checksum" cannot fix this problem2108169 - foreman-maintain self-upgrade enables RH repos when custom repo mentioned with --maintenance-repo-label for RHEL82108611 - Broken link when accessing the Registration Doc from the Satellite register hosts screen2108637 - Remote execution fails for SSH Default when Remote Execution configured for Kerberos Authentication2108719 - Upgrading to Satellite 6.11 fails on db:migrate stage with error "null value in column "created_at" violates not-null constraint"2109254 - Remove orphans task going to the paused state with error "Cannot delete some instances of model 'Repository' because they are referenced through protected foreign keys" on Red Hat Satellite 6.112109260 - When using immediate downloads and retain_package_versions=X, all packages are downloaded and many are immediately orphaned2109298 - ModuleStreamErratumPackages aren't indexed at first repository syncing2109421 - Sendmail package not present on RHEL8 and needs manual configuration2109594 - After upgrading to Satellite 6.11 , foreman log is flooded with  huge tracebacks related to "unknown class DockerRegistry, ignoring" and "unknown class Container, ignoring"2109606 - Not able to enable repositories when FIPS is enabled.2109810 - Search for string in n-v-r.a format fails for custom packages but not for Red Hat packages2110003 - smart-proxy consumes 100% cpu after connecting to WebConsole with krb5 auth on RHEL82110163 - Generate All Reports Job Fails After Upgrade to 6.11 with Missing Logger Method2110222 - Insights client traffic through a Satellite 6.11 Capsule fails2110731 - [ BUG ] Sync errata  email notification is not workng in Satellite 6.11 whereas "Test Email" functions fine2110872 - Moving between tabs generates "undefined method `parent_task' for nil:NilClass"2111038 - new host ui details,ansible roles, bug when all ansible roles are assigned2111074 - After LEAPP upgrade katello_candlepin_port_t definition is missing2111222 - Need a static ouia-id for the close button on the Confirmation Modal2111373 - new host ui details, edit ansible roles, when assigned, wait and not confirmed, role is unassigned automatically2111469 - Single host contains too many NICs2111570 - AVC denials noticed for gunicorn process after upgrading the Satellite 6.11 OS from RHEL 7 to RHEL 8 using leapp2111571 - Multiples of every module stream show in the web UI2111578 - Rebooting Sat611 on RHEL8 removes all pulp logs2111921 - [New Host UI] Ansible tab only shows "view all assigned roles" when at least one host specific role has been added2112015 - After deploying custom certs on Satellite, signed by a new CA, capsule can't fetch on-demand content2112093 - GUI shows "Capsule Authorization" disabled even if it was enabled during the creation of the webhook in Satellite 6.102112098 - Need to be able to provide custom cert for ISS for Red Hat CDN2112436 - After initial build of a UEFI VM using Red Hat Satellite, the system fails to boot up with error "Partition with known EFI file not found" when VM Hardware version is 17 or above2112979 - Don't ship foreman-proxy-selinux in capsule repos2113013 - documentation button on capsule page goes to a broken link2113905 - [RHSSO] [Installer][RHEL8]- RHSSO feature settings are not getting enabled and failed with HTTPD CONF issue .2113946 - Mirroring complete ansible galaxy fails with the following message:  'NoneType' object has no attribute 'get'2113996 - Search for non-integer job id will result in error page2115229 - pull-provider rex jobs occassionally hanging2115686 - [RFE] Provide a functionality in Satellite to import pre-existing Ansible playbooks into Job Templates2115767 - Unable to apply all Errata via Remote Execution on Web UI with "Select All"2115775 - hammer command not working for non-root user post upgrading satellite to version 6.112115822 - New host details UI does not work at all2115832 - Running "satellite-maintain self-upgrade" on a Satellite\Capsule 6.11.1.1 fails with error "Error: 'satellite-maintenance-6.11.2-for-rhel-8-x86_64-rpms' does not match a valid repository ID"2116123 - Even though the CreateRssNotifications job gets completed, It fails to fetch RSS with error '(NameError): uninitialized constant Foreman::HttpProxy::NetHttpExt' in Satellite 6.122116276 - Hammmer task progress command returns Error: undefined method `empty?' for nil:NilClass2116385 - [RFE] Add deprecation warning/banner on Compute Resources page about deprecation of RHEV support2116871 - Package "python3-pulp_manifest" is not available in Satellite Utils repository2117382 - Only first certificate from a content credential is considered by katello when updating CDN configuration to use Network Sync2117489 - not all dependencies are allowed by foreman-protector2117522 - satellite-upgrade to 6.12 fails in packages-update step to resolve python dependencies2118055 - When installing errata via katello-agent, content_action_finish_timeout is ignored and tasks don't wait for client status to finish2118252 - dnf can't load foreman-protector.py as a regular user2118356 - katello-pull-transport-migrate missing in RHEL9 Client repos2118431 - Incremental export on repository exports not working correctly after syncably exporting repository2118689 - Boding interface bondig slaves are always changed to lower case2118694 - Upgrade fails during db:migrate with PG::ForeignKeyViolation: ERROR:  ERROR:  update or delete on table "katello_module_profiles" violates foreign key constraint "katello_mod_profile_rpm_mod_profile_id_fk" on table "katello_module_profile_rpms"2118772 - Satellite upgrade to 6.12 fails during db:migrate with PG::UndefinedColumn: ERROR:  column "created_at" of relation "taxable_taxonomies" does not exist2118790 - Convert2rhel playbook tries to install RHEL8 convert2rhel package2118950 - Unable to configure cloud connector on Satellite 6.12.02118966 - [Pulp3] When working with docker type repos, syslogs is flooded with warnings "The model <class 'pulp_container.app.models.ContainerNamespace'> defines the 'ACCESS_POLICY_VIEWSET_NAME' class attribute" in Satellite 6.122119112 - subpaths field is mandatory while creating ACS in the UI2119117 - ACS create fails when --smart-proxy-ids option not passed with "undefined method `uniq' for nil:NilClass"2119120 - ACS create fails when same name used with "PG::UniqueViolation: ERROR:  duplicate key value violates unique constraint"2119124 - ACS create form displays capsule names without spaces on review details page in UI2119190 - ACS create wizard: select capsule step says "Name source"2119234 - Timezone/timestamp issue with Ansible configuration management reports run via Capsule servers2119688 - running ansible default roles in Satellite 6.11.1.1 shows an error page2120148 - Remove spinner from Packages & Module streams tabs during REX job polling2120224 - Host collections card shows empty card without any text when no host collections are present2120299 - 'This host has errata that are applicable, but not installable' message incorrectly appears2120327 - Discovery Organization setting is shown as Discovery Location setting2120414 - Show arch restrictions on Repository Sets tab (new host details)2120579 - remote execution interface missing in global registration dialog2120632 - After Upgrading LEAPPed Satellite to 6.12 pulp is not connected to redis2120715 - Satellite 6.11 GUI documentation URL takes to a non existing URL with 4042120992 - Running satellite-clone on SAT6.12 fails beacuse it's not supported2121238 - Importing a custom repository with different label but same name causes validation error2121249 - Syncable Exports have spaces in the exported paths2121583 - Sync of an Ansible collection repo to the Capsule fails2121689 - foreman-maintain still enables ansible-2.9-for-rhel-8-x86_64-rpms repository for running an update to 6.11.z when no packages are installed from that repository2121738 - host details jobs - change from list to table2121739 - host details audits, change from list to table2121954 - When searching for content, dropdown filters are literal search terms.2122090 - Syncable exports not properly validated2122214 - katello-certs-check propose not valid command for capsule2122764 - Indexing error if a collection to be synced from galaxy doesn't have tags associated.2122780 - Pub url is not accessible on the Satellite nor Capsule server2122945 - Satellite manifest upload/import error: Unexpected exception occurred while executing transactional block2123352 - Updating katello-ca package does not update certs in yggdrasild service for REX pull mode client2123405 - [RFE] - Add rhel-6-server-els-rpms repository under recommended repositories2124047 - Accessing an external capsule from UI, shows "Last sync failed: 404 Not Found" even if the last capsule content sync was successful in Satellite 6.122124051 - Ansible-type REX jobs are still delegated by satellite 6.12 to be executed via an external Capsule 6.12 even if the ansible feature is not enabled on the same2124087 - The "Change Content Source" option does not provides steps to change the yggdrasil configuration in case putt-mqtt mode is use in Satellite 6.122124271 - After installing katello-agent on a RHEL 9 host, Goferd service fails to start with error  AttributeError: 'Scheduler' object has no attribute 'isAlive'2124568 - 'candlepin-validate-db' pre-upgrade check fails with "Could not open SSL root certificate file /root/.postgresql/root.crt" error for external DB setup with SSL2124663 - Host details statuses clear button is always disabled2124850 - failure to enable async-ssh rex mode with Couldn't enable 'script'2124851 - Post upgrade to 6.11.z, DHCP error with wrong number of arguments for validate_supported_address2124928 - Webhooks page in UI is broken2125022 - Content View Versions generated by Export are still listed in Composite CVs page2125244 - Sync of a docker type repository containing schema 1 manifest fails with error2125317 - Fix details tab cards Expand/collapse all behavior2125585 - Satellite can not be installed on RHEL 8.72125669 - Navigating to content view page from the left panel after creating a cv does not work2127099 - Unsupported Installer report plugin exist in the downstream Satellite 6.122127318 - ACS create wizard: review details step displays password in plaintext when manual auth is selected2127934 - rex pull-provider client not configured during host provisioning2127940 - save_to_file macro does not work if the thing being saved contains a heredoc terminated with EOF2128209 - ssh-async rex job fails with OpenSSL::SSL::SSLError2128422 - Repository Sets on new Hosts details produces error page2129002 - ACS create wizard: select capsule shows duplicate entries in dual-list selector widget2131729 - Repository sets does not work on new host details page2133468 - Upgrade fails to apply rpm.0044_noartifact_modules pulpcore migration2139368 - can't save discovery settings on an upgraded Satellite 6.122139369 - can't save bootdisk settings on an upgraded Satellite 6.122139371 - can't save RH Cloud settings on an upgraded Satellite 6.126. Package List:Red Hat Satellite 6.12 for RHEL 8:Source:ansible-collection-redhat-satellite-3.7.0-2.el8sat.src.rpmansible-collection-redhat-satellite_operations-1.2.3-1.el8sat.src.rpmansible-lint-5.0.8-4.el8pc.src.rpmansible-runner-1.4.7-1.el8ar.src.rpmansiblerole-foreman_scap_client-0.2.0-2.el8sat.src.rpmansiblerole-insights-client-1.7.1-2.el8sat.src.rpmcandlepin-4.1.15-1.el8sat.src.rpmcjson-1.7.14-5.el8sat.src.rpmcreaterepo_c-0.20.1-1.el8pc.src.rpmdynflow-utils-1.6.3-1.el8sat.src.rpmforeman-3.3.0.17-1.el8sat.src.rpmforeman-bootloaders-redhat-202102220000-1.el8sat.src.rpmforeman-discovery-image-3.8.2-1.el8sat.src.rpmforeman-discovery-image-service-1.0.0-4.1.el8sat.src.rpmforeman-installer-3.3.0.8-1.el8sat.src.rpmforeman-proxy-3.3.0-1.el8sat.src.rpmforeman-selinux-3.3.0-2.el8sat.src.rpmkatello-4.5.0-1.el8sat.src.rpmkatello-certs-tools-2.9.0-1.el8sat.src.rpmkatello-client-bootstrap-1.7.9-1.el8sat.src.rpmkatello-selinux-4.0.2-2.el8sat.src.rpmlibcomps-0.1.18-4.el8pc.src.rpmlibdb-5.3.28-42.el8_4.src.rpmlibsodium-1.0.17-3.el8sat.src.rpmlibsolv-0.7.22-4.el8pc.src.rpmlibwebsockets-2.4.2-2.el8.src.rpmmosquitto-2.0.14-1.el8sat.src.rpmpostgresql-evr-0.0.2-1.el8sat.src.rpmpulpcore-selinux-1.3.2-1.el8pc.src.rpmpuppet-agent-7.12.1-1.el8sat.src.rpmpuppet-agent-oauth-0.5.1-3.el8sat.src.rpmpuppet-foreman_scap_client-0.4.0-1.el8sat.src.rpmpuppetlabs-stdlib-5.2.0-1.el8sat.src.rpmpuppetserver-7.4.2-1.el8sat.src.rpmpython-aiodns-3.0.0-3.el8pc.src.rpmpython-aiofiles-0.8.0-2.el8pc.src.rpmpython-aiohttp-3.8.1-3.el8pc.src.rpmpython-aiohttp-xmlrpc-1.5.0-2.el8pc.src.rpmpython-aioredis-2.0.1-2.el8pc.src.rpmpython-aiosignal-1.2.0-2.el8pc.src.rpmpython-ansible-builder-1.0.1-4.el8pc.src.rpmpython-asgiref-3.5.0-2.el8pc.src.rpmpython-async-lru-1.0.2-3.el8pc.src.rpmpython-async-timeout-4.0.2-2.el8pc.src.rpmpython-asyncio-throttle-1.0.2-3.el8pc.src.rpmpython-attrs-21.4.0-2.el8pc.src.rpmpython-backoff-1.11.1-2.el8pc.src.rpmpython-bindep-2.10.2-4.el8pc.src.rpmpython-bleach-3.3.1-2.el8pc.src.rpmpython-bleach-allowlist-1.0.3-3.el8pc.src.rpmpython-bracex-2.2.1-2.el8pc.src.rpmpython-brotli-1.0.9-2.el8pc.src.rpmpython-cchardet-2.1.7-4.el8pc.src.rpmpython-certifi-2020.6.20-3.el8pc.src.rpmpython-cffi-1.15.0-2.el8pc.src.rpmpython-chardet-4.0.0-2.el8pc.src.rpmpython-charset-normalizer-2.0.11-4.el8pc.src.rpmpython-click-8.0.3-2.el8pc.src.rpmpython-click-shell-2.1-3.el8pc.src.rpmpython-colorama-0.4.4-3.el8pc.src.rpmpython-commonmark-0.9.1-5.el8pc.src.rpmpython-contextlib2-21.6.0-3.el8pc.src.rpmpython-cryptography-3.4.8-1.el8pc.src.rpmpython-daemon-2.1.2-9.el8ar.src.rpmpython-dataclasses-0.8-3.el8pc.src.rpmpython-dateutil-2.8.2-2.el8pc.src.rpmpython-debian-0.1.43-2.el8pc.src.rpmpython-defusedxml-0.7.1-3.el8pc.src.rpmpython-diff-match-patch-20200713-3.el8pc.src.rpmpython-distro-1.6.0-3.el8pc.src.rpmpython-django-3.2.14-2.el8pc.src.rpmpython-django-currentuser-0.5.3-5.el8pc.src.rpmpython-django-filter-21.1-3.el8pc.src.rpmpython-django-guardian-2.4.0-5.el8pc.src.rpmpython-django-guid-3.2.2-1.el8pc.src.rpmpython-django-import-export-2.7.1-6.el8pc.src.rpmpython-django-lifecycle-0.9.6-3.el8pc.src.rpmpython-django-prometheus-2.1.0-3.el8pc.src.rpmpython-django-readonly-field-1.1.1-3.el8pc.src.rpmpython-djangorestframework-3.13.1-2.el8pc.src.rpmpython-djangorestframework-queryfields-1.0.0-5.el8pc.src.rpmpython-drf-access-policy-1.1.0-3.el8pc.src.rpmpython-drf-nested-routers-0.93.4-3.el8pc.src.rpmpython-drf-spectacular-0.21.2-2.el8pc.src.rpmpython-dynaconf-3.1.7-4.el8pc.src.rpmpython-ecdsa-0.14.1-2.el8pc.src.rpmpython-enrich-1.2.6-5.el8pc.src.rpmpython-et-xmlfile-1.1.0-2.el8pc.src.rpmpython-flake8-3.9.2-5.el8pc.src.rpmpython-frozenlist-1.3.0-2.el8pc.src.rpmpython-future-0.18.2-5.el8pc.src.rpmpython-galaxy-importer-0.4.5-1.el8pc.src.rpmpython-gitdb-4.0.9-2.el8pc.src.rpmpython-gitpython-3.1.26-3.el8pc.src.rpmpython-gnupg-0.4.8-2.el8pc.src.rpmpython-gunicorn-20.1.0-5.el8pc.src.rpmpython-idna-3.3-2.el8pc.src.rpmpython-idna-ssl-1.1.0-5.el8pc.src.rpmpython-importlib-metadata-4.10.1-2.el8pc.src.rpmpython-importlib-resources-5.4.0-4.el8pc.src.rpmpython-inflection-0.5.1-3.el8pc.src.rpmpython-iniparse-0.4-35.el8pc.src.rpmpython-jinja2-3.0.3-2.el8pc.src.rpmpython-jsonschema-4.6.0-4.el8pc.src.rpmpython-lockfile-0.11.0-8.el8ar.src.rpmpython-lxml-4.7.1-2.el8pc.src.rpmpython-markdown-3.3.6-3.el8pc.src.rpmpython-markuppy-1.14-3.el8pc.src.rpmpython-markupsafe-2.0.1-3.el8pc.src.rpmpython-mccabe-0.6.1-3.el8pc.src.rpmpython-multidict-6.0.2-2.el8pc.src.rpmpython-naya-1.1.1-3.el8pc.src.rpmpython-odfpy-1.4.1-6.el8pc.src.rpmpython-openpyxl-3.0.9-2.el8pc.src.rpmpython-packaging-21.3-1.el8pc.src.rpmpython-parsley-1.3-2.el8pc.src.rpmpython-pbr-5.8.0-4.el8pc.src.rpmpython-pexpect-4.6-2.el8ar.src.rpmpython-productmd-1.33-3.el8pc.src.rpmpython-prometheus-client-0.8.0-3.el8pc.src.rpmpython-psutil-5.7.2-2.el8sat.src.rpmpython-psycopg2-2.9.3-2.el8pc.src.rpmpython-pulp-ansible-0.13.2-2.el8pc.src.rpmpython-pulp-certguard-1.5.2-3.el8pc.src.rpmpython-pulp-cli-0.14.0-4.el8pc.src.rpmpython-pulp-container-2.10.9-1.el8pc.src.rpmpython-pulp-deb-2.18.0-3.el8pc.src.rpmpython-pulp-file-1.10.2-2.el8pc.src.rpmpython-pulp-rpm-3.18.7-1.el8pc.src.rpmpython-pulp_manifest-3.0.0-3.el8pc.src.rpmpython-pulpcore-3.18.10-1.el8pc.src.rpmpython-pyOpenSSL-19.1.0-3.el8pc.src.rpmpython-pycairo-1.20.1-3.el8pc.src.rpmpython-pycares-4.1.2-2.el8pc.src.rpmpython-pycodestyle-2.7.0-5.el8pc.src.rpmpython-pycparser-2.21-2.el8pc.src.rpmpython-pycryptodomex-3.14.1-2.el8pc.src.rpmpython-pyflakes-2.3.1-5.el8pc.src.rpmpython-pygments-2.11.2-2.el8pc.src.rpmpython-pygobject-3.40.1-3.el8pc.src.rpmpython-pygtrie-2.4.2-3.el8pc.src.rpmpython-pyjwkest-1.4.2-6.el8pc.src.rpmpython-pyjwt-1.7.1-8.el8pc.src.rpmpython-pyparsing-2.4.7-3.el8pc.src.rpmpython-pyrsistent-0.18.1-2.el8pc.src.rpmpython-pytz-2021.3-2.el8pc.src.rpmpython-pyyaml-5.4.1-4.el8pc.src.rpmpython-qpid-1.37.0-1.el8.src.rpmpython-redis-3.5.3-3.el8pc.src.rpmpython-requests-2.27.1-2.el8pc.src.rpmpython-requirements-parser-0.2.0-3.el8pc.src.rpmpython-rhsm-1.19.2-3.el8pc.src.rpmpython-rich-10.12.0-3.el8pc.src.rpmpython-ruamel-yaml-0.17.20-2.el8pc.src.rpmpython-ruamel-yaml-clib-0.2.6-2.el8pc.src.rpmpython-schema-0.7.5-2.el8pc.src.rpmpython-semantic-version-2.10.0-1.el8pc.src.rpmpython-six-1.16.0-2.el8pc.src.rpmpython-smmap-5.0.0-2.el8pc.src.rpmpython-sqlparse-0.4.2-3.el8pc.src.rpmpython-tablib-3.2.0-3.el8pc.src.rpmpython-tenacity-7.0.0-3.el8pc.src.rpmpython-toml-0.10.2-3.el8pc.src.rpmpython-typing-extensions-3.10.0.2-2.el8pc.src.rpmpython-uritemplate-4.1.1-2.el8pc.src.rpmpython-url-normalize-1.4.3-4.el8pc.src.rpmpython-urllib3-1.26.8-2.el8pc.src.rpmpython-urlman-1.4.0-3.el8pc.src.rpmpython-wcmatch-8.3-2.el8pc.src.rpmpython-webencodings-0.5.1-3.el8pc.src.rpmpython-whitenoise-6.0.0-1.el8pc.src.rpmpython-xlrd-2.0.1-5.el8pc.src.rpmpython-xlwt-1.3.0-3.el8pc.src.rpmpython-yarl-1.7.2-2.el8pc.src.rpmpython-zipp-3.4.0-4.el8pc.src.rpmqpid-cpp-1.39.0-7.el8amq.src.rpmqpid-dispatch-1.14.0-6.el8.src.rpmqpid-proton-0.33.0-4.el8.src.rpmredhat-access-insights-puppet-1.0.1-1.el8sat.src.rpmrubygem-actioncable-6.0.4.7-1.el8sat.src.rpmrubygem-actionmailbox-6.0.4.7-1.el8sat.src.rpmrubygem-actionmailer-6.0.4.7-1.el8sat.src.rpmrubygem-actionpack-6.0.4.7-1.el8sat.src.rpmrubygem-actiontext-6.0.4.7-1.el8sat.src.rpmrubygem-actionview-6.0.4.7-1.el8sat.src.rpmrubygem-activejob-6.0.4.7-1.el8sat.src.rpmrubygem-activemodel-6.0.4.7-1.el8sat.src.rpmrubygem-activerecord-6.0.4.7-1.el8sat.src.rpmrubygem-activerecord-import-1.1.0-1.el8sat.src.rpmrubygem-activerecord-session_store-2.0.0-1.el8sat.src.rpmrubygem-activestorage-6.0.4.7-1.el8sat.src.rpmrubygem-activesupport-6.0.4.7-1.el8sat.src.rpmrubygem-acts_as_list-1.0.3-2.el8sat.src.rpmrubygem-addressable-2.8.0-1.el8sat.src.rpmrubygem-algebrick-0.7.3-8.el8sat.src.rpmrubygem-amazing_print-1.1.0-2.el8sat.src.rpmrubygem-ancestry-3.0.7-2.el8sat.src.rpmrubygem-anemone-0.7.2-23.el8sat.src.rpmrubygem-angular-rails-templates-1.1.0-2.el8sat.src.rpmrubygem-ansi-1.5.0-3.el8sat.src.rpmrubygem-apipie-bindings-0.5.0-1.el8sat.src.rpmrubygem-apipie-dsl-2.4.0-1.el8sat.src.rpmrubygem-apipie-params-0.0.5-5.1.el8sat.src.rpmrubygem-apipie-rails-0.5.17-4.el8sat.src.rpmrubygem-audited-4.9.0-4.el8sat.src.rpmrubygem-azure_mgmt_compute-0.22.0-1.el8sat.src.rpmrubygem-azure_mgmt_network-0.26.1-2.el8sat.src.rpmrubygem-azure_mgmt_resources-0.18.2-1.el8sat.src.rpmrubygem-azure_mgmt_storage-0.23.0-1.el8sat.src.rpmrubygem-azure_mgmt_subscriptions-0.18.5-1.el8sat.src.rpmrubygem-bcrypt-3.1.12-4.1.el8sat.src.rpmrubygem-builder-3.2.4-2.el8sat.src.rpmrubygem-bundler_ext-0.4.1-6.el8sat.src.rpmrubygem-clamp-1.1.2-7.el8sat.src.rpmrubygem-coffee-rails-5.0.0-2.el8sat.src.rpmrubygem-coffee-script-2.4.1-5.el8sat.src.rpmrubygem-coffee-script-source-1.12.2-5.el8sat.src.rpmrubygem-colorize-0.8.1-2.el8sat.src.rpmrubygem-concurrent-ruby-1.1.6-3.el8sat.src.rpmrubygem-concurrent-ruby-edge-0.6.0-3.el8sat.src.rpmrubygem-connection_pool-2.2.2-3.el8sat.src.rpmrubygem-crass-1.0.6-2.el8sat.src.rpmrubygem-css_parser-1.4.7-5.el8sat.src.rpmrubygem-daemons-1.2.3-7.1.el8sat.src.rpmrubygem-deacon-1.0.0-5.el8sat.src.rpmrubygem-declarative-0.0.10-3.el8sat.src.rpmrubygem-declarative-option-0.1.0-3.el8sat.src.rpmrubygem-deep_cloneable-3.0.0-4.el8sat.src.rpmrubygem-deface-1.5.3-3.el8sat.src.rpmrubygem-diffy-3.0.1-6.1.el8sat.src.rpmrubygem-domain_name-0.5.20160310-5.el8sat.src.rpmrubygem-dynflow-1.6.4-1.el8sat.src.rpmrubygem-erubi-1.9.0-2.el8sat.src.rpmrubygem-excon-0.76.0-2.el8sat.src.rpmrubygem-execjs-2.7.0-5.el8sat.src.rpmrubygem-facter-4.0.51-2.el8sat.src.rpmrubygem-faraday-0.17.3-2.el8sat.src.rpmrubygem-faraday-cookie_jar-0.0.6-2.el8sat.src.rpmrubygem-faraday_middleware-0.13.1-3.el8sat.src.rpmrubygem-fast_gettext-1.4.1-5.el8sat.src.rpmrubygem-ffi-1.12.2-2.1.el8sat.src.rpmrubygem-fog-aws-3.6.5-2.el8sat.src.rpmrubygem-fog-core-2.1.0-4.el8sat.src.rpmrubygem-fog-google-1.11.0-2.el8sat.src.rpmrubygem-fog-json-1.2.0-4.el8sat.src.rpmrubygem-fog-kubevirt-1.3.3-2.el8sat.src.rpmrubygem-fog-libvirt-0.9.0-1.el8sat.src.rpmrubygem-fog-openstack-1.0.8-4.el8sat.src.rpmrubygem-fog-ovirt-2.0.2-1.el8sat.src.rpmrubygem-fog-vsphere-3.5.2-1.el8sat.src.rpmrubygem-fog-xml-0.1.2-9.el8sat.src.rpmrubygem-foreman-tasks-6.0.3-1.el8sat.src.rpmrubygem-foreman_ansible-7.1.4.1-1.el8sat.src.rpmrubygem-foreman_azure_rm-2.2.6-3.1.el8sat.src.rpmrubygem-foreman_bootdisk-19.0.7-1.el8sat.src.rpmrubygem-foreman_discovery-21.0.4-1.el8sat.src.rpmrubygem-foreman_hooks-0.3.17-3.el8sat.src.rpmrubygem-foreman_kubevirt-0.1.9-4.el8sat.src.rpmrubygem-foreman_leapp-0.1.10-2.1.el8sat.src.rpmrubygem-foreman_maintain-1.1.8-1.el8sat.src.rpmrubygem-foreman_openscap-5.2.2-2.el8sat.src.rpmrubygem-foreman_puppet-4.0.3-1.el8sat.src.rpmrubygem-foreman_remote_execution-7.2.2-1.el8sat.src.rpmrubygem-foreman_rh_cloud-6.0.42.2-1.el8sat.src.rpmrubygem-foreman_scap_client-0.5.0-1.el8sat.src.rpmrubygem-foreman_templates-9.3.0-1.1.el8sat.src.rpmrubygem-foreman_theme_satellite-10.0.0.4-1.el8sat.src.rpmrubygem-foreman_virt_who_configure-0.5.9-1.el8sat.src.rpmrubygem-foreman_webhooks-3.0.4-1.el8sat.src.rpmrubygem-formatador-0.2.1-13.el8sat.src.rpmrubygem-friendly_id-5.3.0-2.el8sat.src.rpmrubygem-fx-0.5.0-2.el8sat.src.rpmrubygem-get_process_mem-0.2.7-2.1.el8sat.src.rpmrubygem-gettext_i18n_rails-1.8.0-3.el8sat.src.rpmrubygem-git-1.11.0-1.el8sat.src.rpmrubygem-gitlab-sidekiq-fetcher-0.6.0-2.el8sat.src.rpmrubygem-globalid-0.4.2-2.el8sat.src.rpmrubygem-google-api-client-0.33.2-2.el8sat.src.rpmrubygem-google-cloud-env-1.3.3-2.el8sat.src.rpmrubygem-googleauth-0.13.1-2.el8sat.src.rpmrubygem-graphql-1.8.14-3.el8sat.src.rpmrubygem-graphql-batch-0.3.10-3.el8sat.src.rpmrubygem-gssapi-1.2.0-8.el8sat.src.rpmrubygem-hammer_cli-3.3.0-1.el8sat.src.rpmrubygem-hammer_cli_foreman-3.3.0.1-1.el8sat.src.rpmrubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.src.rpmrubygem-hammer_cli_foreman_ansible-0.3.4-1.el8sat.src.rpmrubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.src.rpmrubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el8sat.src.rpmrubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.src.rpmrubygem-hammer_cli_foreman_kubevirt-0.1.5-1.el8sat.src.rpmrubygem-hammer_cli_foreman_leapp-0.1.1-1.el8sat.src.rpmrubygem-hammer_cli_foreman_openscap-0.1.13-1.el8sat.src.rpmrubygem-hammer_cli_foreman_puppet-0.0.6-1.el8sat.src.rpmrubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.src.rpmrubygem-hammer_cli_foreman_tasks-0.0.18-1.el8sat.src.rpmrubygem-hammer_cli_foreman_templates-0.2.0-2.el8sat.src.rpmrubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el8sat.src.rpmrubygem-hammer_cli_foreman_webhooks-0.0.3-1.el8sat.src.rpmrubygem-hammer_cli_katello-1.6.0.1-1.el8sat.src.rpmrubygem-hashie-3.6.0-3.el8sat.src.rpmrubygem-highline-2.0.3-2.el8sat.src.rpmrubygem-hocon-1.3.1-2.el8sat.src.rpmrubygem-http-3.3.0-2.el8sat.src.rpmrubygem-http-cookie-1.0.2-5.1.el8sat.src.rpmrubygem-http-form_data-2.1.1-2.el8sat.src.rpmrubygem-http_parser.rb-0.6.0-3.1.el8sat.src.rpmrubygem-httpclient-2.8.3-4.el8sat.src.rpmrubygem-i18n-1.8.2-2.el8sat.src.rpmrubygem-infoblox-3.0.0-4.el8sat.src.rpmrubygem-ipaddress-0.8.3-1.el8sat.src.rpmrubygem-jgrep-1.3.3-11.el8sat.src.rpmrubygem-journald-logger-2.0.4-3.el8sat.src.rpmrubygem-journald-native-1.0.11-4.1.el8sat.src.rpmrubygem-jwt-2.2.2-2.el8sat.src.rpmrubygem-kafo-6.4.0-1.el8sat.src.rpmrubygem-kafo_parsers-1.2.1-1.el8sat.src.rpmrubygem-kafo_wizards-0.0.2-2.el8sat.src.rpmrubygem-katello-4.5.0.20-1.el8sat.src.rpmrubygem-kubeclient-4.3.0-2.el8sat.src.rpmrubygem-ldap_fluff-0.6.0-1.el8sat.src.rpmrubygem-little-plugger-1.1.4-3.el8sat.src.rpmrubygem-locale-2.0.9-15.el8sat.src.rpmrubygem-logging-2.3.0-2.el8sat.src.rpmrubygem-logging-journald-2.0.0-3.el8sat.src.rpmrubygem-loofah-2.4.0-2.el8sat.src.rpmrubygem-mail-2.7.1-2.el8sat.src.rpmrubygem-marcel-1.0.1-1.el8sat.src.rpmrubygem-memoist-0.16.0-3.el8sat.src.rpmrubygem-method_source-0.9.2-3.el8sat.src.rpmrubygem-mime-types-3.3.1-2.el8sat.src.rpmrubygem-mime-types-data-3.2018.0812-5.el8sat.src.rpmrubygem-mini_mime-1.0.2-2.el8sat.src.rpmrubygem-mqtt-0.5.0-1.el8sat.src.rpmrubygem-ms_rest-0.7.6-1.el8sat.src.rpmrubygem-ms_rest_azure-0.12.0-1.el8sat.src.rpmrubygem-msgpack-1.3.3-2.1.el8sat.src.rpmrubygem-multi_json-1.14.1-3.el8sat.src.rpmrubygem-multipart-post-2.0.0-3.el8sat.src.rpmrubygem-mustermann-1.1.1-1.el8sat.src.rpmrubygem-net-ldap-0.17.0-2.el8sat.src.rpmrubygem-net-ping-2.0.1-5.el8sat.src.rpmrubygem-net-scp-1.2.1-5.el8sat.src.rpmrubygem-net-ssh-4.2.0-3.el8sat.src.rpmrubygem-net-ssh-krb-0.4.0-4.el8sat.src.rpmrubygem-net_http_unix-0.2.2-2.el8sat.src.rpmrubygem-netrc-0.11.0-6.el8sat.src.rpmrubygem-newt-0.9.7-3.1.el8sat.src.rpmrubygem-nio4r-2.5.4-2.1.el8sat.src.rpmrubygem-nokogiri-1.13.8-1.el8sat.src.rpmrubygem-oauth-0.5.4-5.el8sat.src.rpmrubygem-openscap-0.4.9-7.el8sat.src.rpmrubygem-openscap_parser-1.0.2-2.el8sat.src.rpmrubygem-optimist-3.0.0-3.el8sat.src.rpmrubygem-os-1.0.0-3.el8sat.src.rpmrubygem-ovirt-engine-sdk-4.4.0-2.1.el8sat.src.rpmrubygem-ovirt_provision_plugin-2.0.3-3.el8sat.src.rpmrubygem-parallel-1.19.1-2.el8sat.src.rpmrubygem-parse-cron-0.1.4-5.el8sat.src.rpmrubygem-polyglot-0.3.5-3.1.el8sat.src.rpmrubygem-powerbar-2.0.1-3.el8sat.src.rpmrubygem-prometheus-client-1.0.0-3.el8sat.src.rpmrubygem-promise.rb-0.7.4-3.el8sat.src.rpmrubygem-public_suffix-3.0.3-3.el8sat.src.rpmrubygem-pulp_ansible_client-0.13.1-1.el8sat.src.rpmrubygem-pulp_certguard_client-1.5.0-1.el8sat.src.rpmrubygem-pulp_container_client-2.10.3-1.el8sat.src.rpmrubygem-pulp_deb_client-2.18.0-1.el8sat.src.rpmrubygem-pulp_file_client-1.10.0-1.el8sat.src.rpmrubygem-pulp_ostree_client-2.0.0-0.1.a1.el8sat.src.rpmrubygem-pulp_python_client-3.6.0-1.el8sat.src.rpmrubygem-pulp_rpm_client-3.17.4-1.el8sat.src.rpmrubygem-pulpcore_client-3.18.5-1.el8sat.src.rpmrubygem-puma-5.6.2-1.el8sat.src.rpmrubygem-puma-status-1.3-1.el8sat.src.rpmrubygem-qpid_proton-0.33.0-5.el8sat.src.rpmrubygem-quantile-0.2.0-5.el8sat.src.rpmrubygem-rabl-0.14.3-2.el8sat.src.rpmrubygem-rack-2.2.4-1.el8sat.src.rpmrubygem-rack-cors-1.0.2-3.el8sat.src.rpmrubygem-rack-jsonp-1.3.1-10.el8sat.src.rpmrubygem-rack-protection-2.2.0-1.el8sat.src.rpmrubygem-rack-test-1.1.0-5.el8sat.src.rpmrubygem-rails-6.0.4.7-1.el8sat.src.rpmrubygem-rails-dom-testing-2.0.3-7.el8sat.src.rpmrubygem-rails-html-sanitizer-1.4.3-2.el8sat.src.rpmrubygem-rails-i18n-6.0.0-3.el8sat.src.rpmrubygem-railties-6.0.4.7-1.el8sat.src.rpmrubygem-rainbow-2.2.2-1.el8sat.src.rpmrubygem-rb-inotify-0.9.7-6.el8sat.src.rpmrubygem-rbnacl-4.0.2-2.el8sat.src.rpmrubygem-rbvmomi-2.2.0-4.el8sat.src.rpmrubygem-rchardet-1.8.0-1.el8sat.src.rpmrubygem-recursive-open-struct-1.1.0-2.el8sat.src.rpmrubygem-redfish_client-0.5.2-2.el8sat.src.rpmrubygem-redis-4.5.1-1.el8sat.src.rpmrubygem-representable-3.0.4-3.el8sat.src.rpmrubygem-responders-3.0.0-4.el8sat.src.rpmrubygem-rest-client-2.0.2-4.el8sat.src.rpmrubygem-retriable-3.1.2-3.el8sat.src.rpmrubygem-rkerberos-0.1.5-20.1.el8sat.src.rpmrubygem-roadie-3.4.0-4.el8sat.src.rpmrubygem-roadie-rails-2.1.1-3.el8sat.src.rpmrubygem-robotex-1.0.0-22.el8sat.src.rpmrubygem-rsec-0.4.3-5.el8sat.src.rpmrubygem-ruby-libvirt-0.7.1-2.1.el8sat.src.rpmrubygem-ruby2_keywords-0.0.4-1.el8sat.src.rpmrubygem-ruby2ruby-2.4.2-4.el8sat.src.rpmrubygem-ruby_parser-3.10.1-4.el8sat.src.rpmrubygem-rubyipmi-0.11.0-1.el8sat.src.rpmrubygem-runcible-2.13.1-2.el8sat.src.rpmrubygem-safemode-1.3.6-2.el8sat.src.rpmrubygem-scoped_search-4.1.10-1.el8sat.src.rpmrubygem-sd_notify-0.1.0-2.el8sat.src.rpmrubygem-secure_headers-6.3.0-3.el8sat.src.rpmrubygem-sequel-5.53.0-1.el8sat.src.rpmrubygem-server_sent_events-0.1.2-2.el8sat.src.rpmrubygem-sexp_processor-4.10.0-7.el8sat.src.rpmrubygem-sidekiq-5.2.10-1.el8sat.src.rpmrubygem-signet-0.14.0-2.el8sat.src.rpmrubygem-sinatra-2.2.0-1.el8sat.src.rpmrubygem-smart_proxy_ansible-3.4.1-2.el8sat.src.rpmrubygem-smart_proxy_container_gateway-1.0.6-1.el8sat.src.rpmrubygem-smart_proxy_dhcp_infoblox-0.0.16-7.el8sat.src.rpmrubygem-smart_proxy_dhcp_remote_isc-0.0.5-6.el8sat.src.rpmrubygem-smart_proxy_discovery-1.0.5-9.el8sat.src.rpmrubygem-smart_proxy_discovery_image-1.6.0-2.el8sat.src.rpmrubygem-smart_proxy_dns_infoblox-1.1.0-7.el8sat.src.rpmrubygem-smart_proxy_dynflow-0.8.2-1.el8sat.src.rpmrubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.src.rpmrubygem-smart_proxy_openscap-0.9.2-1.el8sat.src.rpmrubygem-smart_proxy_pulp-3.2.0-3.el8sat.src.rpmrubygem-smart_proxy_remote_execution_ssh-0.7.3-1.el8sat.src.rpmrubygem-smart_proxy_shellhooks-0.9.2-2.el8sat.src.rpmrubygem-sprockets-4.0.2-2.el8sat.src.rpmrubygem-sprockets-rails-3.2.1-7.el8sat.src.rpmrubygem-sqlite3-1.4.2-1.el8sat.src.rpmrubygem-sshkey-1.9.0-5.el8sat.src.rpmrubygem-statsd-instrument-2.1.4-4.el8sat.src.rpmrubygem-stomp-1.4.9-2.el8sat.src.rpmrubygem-thor-1.0.1-3.el8sat.src.rpmrubygem-thread_safe-0.3.6-6.el8sat.src.rpmrubygem-tilt-2.0.8-5.el8sat.src.rpmrubygem-timeliness-0.3.10-2.el8sat.src.rpmrubygem-tzinfo-1.2.6-2.el8sat.src.rpmrubygem-uber-0.1.0-3.el8sat.src.rpmrubygem-unf-0.1.3-9.el8sat.src.rpmrubygem-unf_ext-0.0.7.2-4.1.el8sat.src.rpmrubygem-unicode-0.4.4.4-4.1.el8sat.src.rpmrubygem-unicode-display_width-1.7.0-2.el8sat.src.rpmrubygem-validates_lengths_from_database-0.5.0-8.el8sat.src.rpmrubygem-webpack-rails-0.9.8-6.1.el8sat.src.rpmrubygem-websocket-driver-0.7.1-2.1.el8sat.src.rpmrubygem-websocket-extensions-0.1.5-2.el8sat.src.rpmrubygem-will_paginate-3.1.7-4.el8sat.src.rpmrubygem-zeitwerk-2.2.2-2.el8sat.src.rpmsaslwrapper-0.22-6.el8sat.src.rpmsatellite-6.12.0-4.el8sat.src.rpmsatellite-installer-6.12.0.5-1.el8sat.src.rpmsatellite-maintain-0.0.1-1.el8sat.src.rpmyggdrasil-worker-forwarder-0.0.1-1.el8sat.src.rpmnoarch:ansible-collection-redhat-satellite-3.7.0-2.el8sat.noarch.rpmansible-collection-redhat-satellite_operations-1.2.3-1.el8sat.noarch.rpmansible-lint-5.0.8-4.el8pc.noarch.rpmansible-runner-1.4.7-1.el8ar.noarch.rpmansiblerole-foreman_scap_client-0.2.0-2.el8sat.noarch.rpmansiblerole-insights-client-1.7.1-2.el8sat.noarch.rpmcandlepin-4.1.15-1.el8sat.noarch.rpmcandlepin-selinux-4.1.15-1.el8sat.noarch.rpmforeman-3.3.0.17-1.el8sat.noarch.rpmforeman-bootloaders-redhat-202102220000-1.el8sat.noarch.rpmforeman-bootloaders-redhat-tftpboot-202102220000-1.el8sat.noarch.rpmforeman-cli-3.3.0.17-1.el8sat.noarch.rpmforeman-debug-3.3.0.17-1.el8sat.noarch.rpmforeman-discovery-image-3.8.2-1.el8sat.noarch.rpmforeman-dynflow-sidekiq-3.3.0.17-1.el8sat.noarch.rpmforeman-ec2-3.3.0.17-1.el8sat.noarch.rpmforeman-gce-3.3.0.17-1.el8sat.noarch.rpmforeman-installer-3.3.0.8-1.el8sat.noarch.rpmforeman-installer-katello-3.3.0.8-1.el8sat.noarch.rpmforeman-journald-3.3.0.17-1.el8sat.noarch.rpmforeman-libvirt-3.3.0.17-1.el8sat.noarch.rpmforeman-openstack-3.3.0.17-1.el8sat.noarch.rpmforeman-ovirt-3.3.0.17-1.el8sat.noarch.rpmforeman-postgresql-3.3.0.17-1.el8sat.noarch.rpmforeman-proxy-3.3.0-1.el8sat.noarch.rpmforeman-proxy-journald-3.3.0-1.el8sat.noarch.rpmforeman-selinux-3.3.0-2.el8sat.noarch.rpmforeman-service-3.3.0.17-1.el8sat.noarch.rpmforeman-telemetry-3.3.0.17-1.el8sat.noarch.rpmforeman-vmware-3.3.0.17-1.el8sat.noarch.rpmkatello-4.5.0-1.el8sat.noarch.rpmkatello-certs-tools-2.9.0-1.el8sat.noarch.rpmkatello-client-bootstrap-1.7.9-1.el8sat.noarch.rpmkatello-common-4.5.0-1.el8sat.noarch.rpmkatello-debug-4.5.0-1.el8sat.noarch.rpmkatello-selinux-4.0.2-2.el8sat.noarch.rpmpuppet-agent-oauth-0.5.1-3.el8sat.noarch.rpmpuppet-foreman_scap_client-0.4.0-1.el8sat.noarch.rpmpuppetlabs-stdlib-5.2.0-1.el8sat.noarch.rpmpuppetserver-7.4.2-1.el8sat.noarch.rpmpython2-qpid-1.37.0-1.el8.noarch.rpmpython3-ansible-runner-1.4.7-1.el8ar.noarch.rpmpython3-daemon-2.1.2-9.el8ar.noarch.rpmpython3-lockfile-0.11.0-8.el8ar.noarch.rpmpython3-pexpect-4.6-2.el8ar.noarch.rpmpython39-aiodns-3.0.0-3.el8pc.noarch.rpmpython39-aiofiles-0.8.0-2.el8pc.noarch.rpmpython39-aiohttp-xmlrpc-1.5.0-2.el8pc.noarch.rpmpython39-aioredis-2.0.1-2.el8pc.noarch.rpmpython39-aiosignal-1.2.0-2.el8pc.noarch.rpmpython39-ansible-builder-1.0.1-4.el8pc.noarch.rpmpython39-asgiref-3.5.0-2.el8pc.noarch.rpmpython39-async-lru-1.0.2-3.el8pc.noarch.rpmpython39-async-timeout-4.0.2-2.el8pc.noarch.rpmpython39-asyncio-throttle-1.0.2-3.el8pc.noarch.rpmpython39-attrs-21.4.0-2.el8pc.noarch.rpmpython39-backoff-1.11.1-2.el8pc.noarch.rpmpython39-bindep-2.10.2-4.el8pc.noarch.rpmpython39-bleach-3.3.1-2.el8pc.noarch.rpmpython39-bleach-allowlist-1.0.3-3.el8pc.noarch.rpmpython39-bracex-2.2.1-2.el8pc.noarch.rpmpython39-certifi-2020.6.20-3.el8pc.noarch.rpmpython39-chardet-4.0.0-2.el8pc.noarch.rpmpython39-charset-normalizer-2.0.11-4.el8pc.noarch.rpmpython39-click-8.0.3-2.el8pc.noarch.rpmpython39-click-shell-2.1-3.el8pc.noarch.rpmpython39-colorama-0.4.4-3.el8pc.noarch.rpmpython39-commonmark-0.9.1-5.el8pc.noarch.rpmpython39-contextlib2-21.6.0-3.el8pc.noarch.rpmpython39-dataclasses-0.8-3.el8pc.noarch.rpmpython39-dateutil-2.8.2-2.el8pc.noarch.rpmpython39-debian-0.1.43-2.el8pc.noarch.rpmpython39-defusedxml-0.7.1-3.el8pc.noarch.rpmpython39-diff-match-patch-20200713-3.el8pc.noarch.rpmpython39-distro-1.6.0-3.el8pc.noarch.rpmpython39-django-3.2.14-2.el8pc.noarch.rpmpython39-django-currentuser-0.5.3-5.el8pc.noarch.rpmpython39-django-filter-21.1-3.el8pc.noarch.rpmpython39-django-guardian-2.4.0-5.el8pc.noarch.rpmpython39-django-guid-3.2.2-1.el8pc.noarch.rpmpython39-django-import-export-2.7.1-6.el8pc.noarch.rpmpython39-django-lifecycle-0.9.6-3.el8pc.noarch.rpmpython39-django-prometheus-2.1.0-3.el8pc.noarch.rpmpython39-django-readonly-field-1.1.1-3.el8pc.noarch.rpmpython39-djangorestframework-3.13.1-2.el8pc.noarch.rpmpython39-djangorestframework-queryfields-1.0.0-5.el8pc.noarch.rpmpython39-drf-access-policy-1.1.0-3.el8pc.noarch.rpmpython39-drf-nested-routers-0.93.4-3.el8pc.noarch.rpmpython39-drf-spectacular-0.21.2-2.el8pc.noarch.rpmpython39-dynaconf-3.1.7-4.el8pc.noarch.rpmpython39-ecdsa-0.14.1-2.el8pc.noarch.rpmpython39-enrich-1.2.6-5.el8pc.noarch.rpmpython39-et-xmlfile-1.1.0-2.el8pc.noarch.rpmpython39-flake8-3.9.2-5.el8pc.noarch.rpmpython39-future-0.18.2-5.el8pc.noarch.rpmpython39-galaxy-importer-0.4.5-1.el8pc.noarch.rpmpython39-gitdb-4.0.9-2.el8pc.noarch.rpmpython39-gitpython-3.1.26-3.el8pc.noarch.rpmpython39-gnupg-0.4.8-2.el8pc.noarch.rpmpython39-gunicorn-20.1.0-5.el8pc.noarch.rpmpython39-idna-3.3-2.el8pc.noarch.rpmpython39-idna-ssl-1.1.0-5.el8pc.noarch.rpmpython39-importlib-metadata-4.10.1-2.el8pc.noarch.rpmpython39-importlib-resources-5.4.0-4.el8pc.noarch.rpmpython39-inflection-0.5.1-3.el8pc.noarch.rpmpython39-iniparse-0.4-35.el8pc.noarch.rpmpython39-jinja2-3.0.3-2.el8pc.noarch.rpmpython39-jsonschema-4.6.0-4.el8pc.noarch.rpmpython39-markdown-3.3.6-3.el8pc.noarch.rpmpython39-markuppy-1.14-3.el8pc.noarch.rpmpython39-mccabe-0.6.1-3.el8pc.noarch.rpmpython39-naya-1.1.1-3.el8pc.noarch.rpmpython39-odfpy-1.4.1-6.el8pc.noarch.rpmpython39-openpyxl-3.0.9-2.el8pc.noarch.rpmpython39-packaging-21.3-1.el8pc.noarch.rpmpython39-parsley-1.3-2.el8pc.noarch.rpmpython39-pbr-5.8.0-4.el8pc.noarch.rpmpython39-productmd-1.33-3.el8pc.noarch.rpmpython39-prometheus-client-0.8.0-3.el8pc.noarch.rpmpython39-pulp-ansible-0.13.2-2.el8pc.noarch.rpmpython39-pulp-certguard-1.5.2-3.el8pc.noarch.rpmpython39-pulp-cli-0.14.0-4.el8pc.noarch.rpmpython39-pulp-container-2.10.9-1.el8pc.noarch.rpmpython39-pulp-deb-2.18.0-3.el8pc.noarch.rpmpython39-pulp-file-1.10.2-2.el8pc.noarch.rpmpython39-pulp-rpm-3.18.7-1.el8pc.noarch.rpmpython39-pulp_manifest-3.0.0-3.el8pc.noarch.rpmpython39-pulpcore-3.18.10-1.el8pc.noarch.rpmpython39-pyOpenSSL-19.1.0-3.el8pc.noarch.rpmpython39-pycodestyle-2.7.0-5.el8pc.noarch.rpmpython39-pycparser-2.21-2.el8pc.noarch.rpmpython39-pyflakes-2.3.1-5.el8pc.noarch.rpmpython39-pygments-2.11.2-2.el8pc.noarch.rpmpython39-pygtrie-2.4.2-3.el8pc.noarch.rpmpython39-pyjwkest-1.4.2-6.el8pc.noarch.rpmpython39-pyjwt-1.7.1-8.el8pc.noarch.rpmpython39-pyparsing-2.4.7-3.el8pc.noarch.rpmpython39-pytz-2021.3-2.el8pc.noarch.rpmpython39-redis-3.5.3-3.el8pc.noarch.rpmpython39-requests-2.27.1-2.el8pc.noarch.rpmpython39-requirements-parser-0.2.0-3.el8pc.noarch.rpmpython39-rich-10.12.0-3.el8pc.noarch.rpmpython39-ruamel-yaml-0.17.20-2.el8pc.noarch.rpmpython39-schema-0.7.5-2.el8pc.noarch.rpmpython39-semantic-version-2.10.0-1.el8pc.noarch.rpmpython39-six-1.16.0-2.el8pc.noarch.rpmpython39-smmap-5.0.0-2.el8pc.noarch.rpmpython39-sqlparse-0.4.2-3.el8pc.noarch.rpmpython39-tablib-3.2.0-3.el8pc.noarch.rpmpython39-tenacity-7.0.0-3.el8pc.noarch.rpmpython39-toml-0.10.2-3.el8pc.noarch.rpmpython39-typing-extensions-3.10.0.2-2.el8pc.noarch.rpmpython39-uritemplate-4.1.1-2.el8pc.noarch.rpmpython39-url-normalize-1.4.3-4.el8pc.noarch.rpmpython39-urllib3-1.26.8-2.el8pc.noarch.rpmpython39-urlman-1.4.0-3.el8pc.noarch.rpmpython39-wcmatch-8.3-2.el8pc.noarch.rpmpython39-webencodings-0.5.1-3.el8pc.noarch.rpmpython39-whitenoise-6.0.0-1.el8pc.noarch.rpmpython39-xlrd-2.0.1-5.el8pc.noarch.rpmpython39-xlwt-1.3.0-3.el8pc.noarch.rpmpython39-zipp-3.4.0-4.el8pc.noarch.rpmqpid-dispatch-tools-1.14.0-6.el8.noarch.rpmqpid-tools-1.39.0-7.el8amq.noarch.rpmredhat-access-insights-puppet-1.0.1-1.el8sat.noarch.rpmrubygem-actioncable-6.0.4.7-1.el8sat.noarch.rpmrubygem-actionmailbox-6.0.4.7-1.el8sat.noarch.rpmrubygem-actionmailer-6.0.4.7-1.el8sat.noarch.rpmrubygem-actionpack-6.0.4.7-1.el8sat.noarch.rpmrubygem-actiontext-6.0.4.7-1.el8sat.noarch.rpmrubygem-actionview-6.0.4.7-1.el8sat.noarch.rpmrubygem-activejob-6.0.4.7-1.el8sat.noarch.rpmrubygem-activemodel-6.0.4.7-1.el8sat.noarch.rpmrubygem-activerecord-6.0.4.7-1.el8sat.noarch.rpmrubygem-activerecord-import-1.1.0-1.el8sat.noarch.rpmrubygem-activerecord-session_store-2.0.0-1.el8sat.noarch.rpmrubygem-activestorage-6.0.4.7-1.el8sat.noarch.rpmrubygem-activesupport-6.0.4.7-1.el8sat.noarch.rpmrubygem-acts_as_list-1.0.3-2.el8sat.noarch.rpmrubygem-addressable-2.8.0-1.el8sat.noarch.rpmrubygem-algebrick-0.7.3-8.el8sat.noarch.rpmrubygem-amazing_print-1.1.0-2.el8sat.noarch.rpmrubygem-ancestry-3.0.7-2.el8sat.noarch.rpmrubygem-anemone-0.7.2-23.el8sat.noarch.rpmrubygem-angular-rails-templates-1.1.0-2.el8sat.noarch.rpmrubygem-ansi-1.5.0-3.el8sat.noarch.rpmrubygem-apipie-bindings-0.5.0-1.el8sat.noarch.rpmrubygem-apipie-dsl-2.4.0-1.el8sat.noarch.rpmrubygem-apipie-params-0.0.5-5.1.el8sat.noarch.rpmrubygem-apipie-rails-0.5.17-4.el8sat.noarch.rpmrubygem-audited-4.9.0-4.el8sat.noarch.rpmrubygem-azure_mgmt_compute-0.22.0-1.el8sat.noarch.rpmrubygem-azure_mgmt_network-0.26.1-2.el8sat.noarch.rpmrubygem-azure_mgmt_resources-0.18.2-1.el8sat.noarch.rpmrubygem-azure_mgmt_storage-0.23.0-1.el8sat.noarch.rpmrubygem-azure_mgmt_subscriptions-0.18.5-1.el8sat.noarch.rpmrubygem-builder-3.2.4-2.el8sat.noarch.rpmrubygem-bundler_ext-0.4.1-6.el8sat.noarch.rpmrubygem-clamp-1.1.2-7.el8sat.noarch.rpmrubygem-coffee-rails-5.0.0-2.el8sat.noarch.rpmrubygem-coffee-script-2.4.1-5.el8sat.noarch.rpmrubygem-coffee-script-source-1.12.2-5.el8sat.noarch.rpmrubygem-colorize-0.8.1-2.el8sat.noarch.rpmrubygem-concurrent-ruby-1.1.6-3.el8sat.noarch.rpmrubygem-concurrent-ruby-edge-0.6.0-3.el8sat.noarch.rpmrubygem-connection_pool-2.2.2-3.el8sat.noarch.rpmrubygem-crass-1.0.6-2.el8sat.noarch.rpmrubygem-css_parser-1.4.7-5.el8sat.noarch.rpmrubygem-daemons-1.2.3-7.1.el8sat.noarch.rpmrubygem-deacon-1.0.0-5.el8sat.noarch.rpmrubygem-declarative-0.0.10-3.el8sat.noarch.rpmrubygem-declarative-option-0.1.0-3.el8sat.noarch.rpmrubygem-deep_cloneable-3.0.0-4.el8sat.noarch.rpmrubygem-deface-1.5.3-3.el8sat.noarch.rpmrubygem-diffy-3.0.1-6.1.el8sat.noarch.rpmrubygem-domain_name-0.5.20160310-5.el8sat.noarch.rpmrubygem-dynflow-1.6.4-1.el8sat.noarch.rpmrubygem-erubi-1.9.0-2.el8sat.noarch.rpmrubygem-excon-0.76.0-2.el8sat.noarch.rpmrubygem-execjs-2.7.0-5.el8sat.noarch.rpmrubygem-faraday-0.17.3-2.el8sat.noarch.rpmrubygem-faraday-cookie_jar-0.0.6-2.el8sat.noarch.rpmrubygem-faraday_middleware-0.13.1-3.el8sat.noarch.rpmrubygem-fast_gettext-1.4.1-5.el8sat.noarch.rpmrubygem-fog-aws-3.6.5-2.el8sat.noarch.rpmrubygem-fog-core-2.1.0-4.el8sat.noarch.rpmrubygem-fog-google-1.11.0-2.el8sat.noarch.rpmrubygem-fog-json-1.2.0-4.el8sat.noarch.rpmrubygem-fog-kubevirt-1.3.3-2.el8sat.noarch.rpmrubygem-fog-libvirt-0.9.0-1.el8sat.noarch.rpmrubygem-fog-openstack-1.0.8-4.el8sat.noarch.rpmrubygem-fog-ovirt-2.0.2-1.el8sat.noarch.rpmrubygem-fog-vsphere-3.5.2-1.el8sat.noarch.rpmrubygem-fog-xml-0.1.2-9.el8sat.noarch.rpmrubygem-foreman-tasks-6.0.3-1.el8sat.noarch.rpmrubygem-foreman_ansible-7.1.4.1-1.el8sat.noarch.rpmrubygem-foreman_azure_rm-2.2.6-3.1.el8sat.noarch.rpmrubygem-foreman_bootdisk-19.0.7-1.el8sat.noarch.rpmrubygem-foreman_discovery-21.0.4-1.el8sat.noarch.rpmrubygem-foreman_hooks-0.3.17-3.el8sat.noarch.rpmrubygem-foreman_kubevirt-0.1.9-4.el8sat.noarch.rpmrubygem-foreman_leapp-0.1.10-2.1.el8sat.noarch.rpmrubygem-foreman_maintain-1.1.8-1.el8sat.noarch.rpmrubygem-foreman_openscap-5.2.2-2.el8sat.noarch.rpmrubygem-foreman_puppet-4.0.3-1.el8sat.noarch.rpmrubygem-foreman_remote_execution-7.2.2-1.el8sat.noarch.rpmrubygem-foreman_remote_execution-cockpit-7.2.2-1.el8sat.noarch.rpmrubygem-foreman_rh_cloud-6.0.42.2-1.el8sat.noarch.rpmrubygem-foreman_scap_client-0.5.0-1.el8sat.noarch.rpmrubygem-foreman_templates-9.3.0-1.1.el8sat.noarch.rpmrubygem-foreman_theme_satellite-10.0.0.4-1.el8sat.noarch.rpmrubygem-foreman_virt_who_configure-0.5.9-1.el8sat.noarch.rpmrubygem-foreman_webhooks-3.0.4-1.el8sat.noarch.rpmrubygem-formatador-0.2.1-13.el8sat.noarch.rpmrubygem-friendly_id-5.3.0-2.el8sat.noarch.rpmrubygem-fx-0.5.0-2.el8sat.noarch.rpmrubygem-get_process_mem-0.2.7-2.1.el8sat.noarch.rpmrubygem-gettext_i18n_rails-1.8.0-3.el8sat.noarch.rpmrubygem-git-1.11.0-1.el8sat.noarch.rpmrubygem-gitlab-sidekiq-fetcher-0.6.0-2.el8sat.noarch.rpmrubygem-globalid-0.4.2-2.el8sat.noarch.rpmrubygem-google-api-client-0.33.2-2.el8sat.noarch.rpmrubygem-google-cloud-env-1.3.3-2.el8sat.noarch.rpmrubygem-googleauth-0.13.1-2.el8sat.noarch.rpmrubygem-graphql-1.8.14-3.el8sat.noarch.rpmrubygem-graphql-batch-0.3.10-3.el8sat.noarch.rpmrubygem-gssapi-1.2.0-8.el8sat.noarch.rpmrubygem-hammer_cli-3.3.0-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman-3.3.0.1-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_ansible-0.3.4-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el8sat.noarch.rpmrubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_kubevirt-0.1.5-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_leapp-0.1.1-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_openscap-0.1.13-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_puppet-0.0.6-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_tasks-0.0.18-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_templates-0.2.0-2.el8sat.noarch.rpmrubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_webhooks-0.0.3-1.el8sat.noarch.rpmrubygem-hammer_cli_katello-1.6.0.1-1.el8sat.noarch.rpmrubygem-hashie-3.6.0-3.el8sat.noarch.rpmrubygem-highline-2.0.3-2.el8sat.noarch.rpmrubygem-hocon-1.3.1-2.el8sat.noarch.rpmrubygem-http-3.3.0-2.el8sat.noarch.rpmrubygem-http-cookie-1.0.2-5.1.el8sat.noarch.rpmrubygem-http-form_data-2.1.1-2.el8sat.noarch.rpmrubygem-httpclient-2.8.3-4.el8sat.noarch.rpmrubygem-i18n-1.8.2-2.el8sat.noarch.rpmrubygem-infoblox-3.0.0-4.el8sat.noarch.rpmrubygem-ipaddress-0.8.3-1.el8sat.noarch.rpmrubygem-jgrep-1.3.3-11.el8sat.noarch.rpmrubygem-journald-logger-2.0.4-3.el8sat.noarch.rpmrubygem-jwt-2.2.2-2.el8sat.noarch.rpmrubygem-kafo-6.4.0-1.el8sat.noarch.rpmrubygem-kafo_parsers-1.2.1-1.el8sat.noarch.rpmrubygem-kafo_wizards-0.0.2-2.el8sat.noarch.rpmrubygem-katello-4.5.0.20-1.el8sat.noarch.rpmrubygem-kubeclient-4.3.0-2.el8sat.noarch.rpmrubygem-ldap_fluff-0.6.0-1.el8sat.noarch.rpmrubygem-little-plugger-1.1.4-3.el8sat.noarch.rpmrubygem-locale-2.0.9-15.el8sat.noarch.rpmrubygem-logging-2.3.0-2.el8sat.noarch.rpmrubygem-logging-journald-2.0.0-3.el8sat.noarch.rpmrubygem-loofah-2.4.0-2.el8sat.noarch.rpmrubygem-mail-2.7.1-2.el8sat.noarch.rpmrubygem-marcel-1.0.1-1.el8sat.noarch.rpmrubygem-memoist-0.16.0-3.el8sat.noarch.rpmrubygem-method_source-0.9.2-3.el8sat.noarch.rpmrubygem-mime-types-3.3.1-2.el8sat.noarch.rpmrubygem-mime-types-data-3.2018.0812-5.el8sat.noarch.rpmrubygem-mini_mime-1.0.2-2.el8sat.noarch.rpmrubygem-mqtt-0.5.0-1.el8sat.noarch.rpmrubygem-ms_rest-0.7.6-1.el8sat.noarch.rpmrubygem-ms_rest_azure-0.12.0-1.el8sat.noarch.rpmrubygem-multi_json-1.14.1-3.el8sat.noarch.rpmrubygem-multipart-post-2.0.0-3.el8sat.noarch.rpmrubygem-mustermann-1.1.1-1.el8sat.noarch.rpmrubygem-net-ldap-0.17.0-2.el8sat.noarch.rpmrubygem-net-ping-2.0.1-5.el8sat.noarch.rpmrubygem-net-scp-1.2.1-5.el8sat.noarch.rpmrubygem-net-ssh-4.2.0-3.el8sat.noarch.rpmrubygem-net-ssh-krb-0.4.0-4.el8sat.noarch.rpmrubygem-net_http_unix-0.2.2-2.el8sat.noarch.rpmrubygem-netrc-0.11.0-6.el8sat.noarch.rpmrubygem-oauth-0.5.4-5.el8sat.noarch.rpmrubygem-openscap-0.4.9-7.el8sat.noarch.rpmrubygem-openscap_parser-1.0.2-2.el8sat.noarch.rpmrubygem-optimist-3.0.0-3.el8sat.noarch.rpmrubygem-os-1.0.0-3.el8sat.noarch.rpmrubygem-ovirt_provision_plugin-2.0.3-3.el8sat.noarch.rpmrubygem-parallel-1.19.1-2.el8sat.noarch.rpmrubygem-parse-cron-0.1.4-5.el8sat.noarch.rpmrubygem-polyglot-0.3.5-3.1.el8sat.noarch.rpmrubygem-powerbar-2.0.1-3.el8sat.noarch.rpmrubygem-prometheus-client-1.0.0-3.el8sat.noarch.rpmrubygem-promise.rb-0.7.4-3.el8sat.noarch.rpmrubygem-public_suffix-3.0.3-3.el8sat.noarch.rpmrubygem-pulp_ansible_client-0.13.1-1.el8sat.noarch.rpmrubygem-pulp_certguard_client-1.5.0-1.el8sat.noarch.rpmrubygem-pulp_container_client-2.10.3-1.el8sat.noarch.rpmrubygem-pulp_deb_client-2.18.0-1.el8sat.noarch.rpmrubygem-pulp_file_client-1.10.0-1.el8sat.noarch.rpmrubygem-pulp_ostree_client-2.0.0-0.1.a1.el8sat.noarch.rpmrubygem-pulp_python_client-3.6.0-1.el8sat.noarch.rpmrubygem-pulp_rpm_client-3.17.4-1.el8sat.noarch.rpmrubygem-pulpcore_client-3.18.5-1.el8sat.noarch.rpmrubygem-puma-status-1.3-1.el8sat.noarch.rpmrubygem-quantile-0.2.0-5.el8sat.noarch.rpmrubygem-rabl-0.14.3-2.el8sat.noarch.rpmrubygem-rack-2.2.4-1.el8sat.noarch.rpmrubygem-rack-cors-1.0.2-3.el8sat.noarch.rpmrubygem-rack-jsonp-1.3.1-10.el8sat.noarch.rpmrubygem-rack-protection-2.2.0-1.el8sat.noarch.rpmrubygem-rack-test-1.1.0-5.el8sat.noarch.rpmrubygem-rails-6.0.4.7-1.el8sat.noarch.rpmrubygem-rails-dom-testing-2.0.3-7.el8sat.noarch.rpmrubygem-rails-html-sanitizer-1.4.3-2.el8sat.noarch.rpmrubygem-rails-i18n-6.0.0-3.el8sat.noarch.rpmrubygem-railties-6.0.4.7-1.el8sat.noarch.rpmrubygem-rainbow-2.2.2-1.el8sat.noarch.rpmrubygem-rb-inotify-0.9.7-6.el8sat.noarch.rpmrubygem-rbnacl-4.0.2-2.el8sat.noarch.rpmrubygem-rbvmomi-2.2.0-4.el8sat.noarch.rpmrubygem-rchardet-1.8.0-1.el8sat.noarch.rpmrubygem-recursive-open-struct-1.1.0-2.el8sat.noarch.rpmrubygem-redfish_client-0.5.2-2.el8sat.noarch.rpmrubygem-redis-4.5.1-1.el8sat.noarch.rpmrubygem-representable-3.0.4-3.el8sat.noarch.rpmrubygem-responders-3.0.0-4.el8sat.noarch.rpmrubygem-rest-client-2.0.2-4.el8sat.noarch.rpmrubygem-retriable-3.1.2-3.el8sat.noarch.rpmrubygem-roadie-3.4.0-4.el8sat.noarch.rpmrubygem-roadie-rails-2.1.1-3.el8sat.noarch.rpmrubygem-robotex-1.0.0-22.el8sat.noarch.rpmrubygem-rsec-0.4.3-5.el8sat.noarch.rpmrubygem-ruby2_keywords-0.0.4-1.el8sat.noarch.rpmrubygem-ruby2ruby-2.4.2-4.el8sat.noarch.rpmrubygem-ruby_parser-3.10.1-4.el8sat.noarch.rpmrubygem-rubyipmi-0.11.0-1.el8sat.noarch.rpmrubygem-runcible-2.13.1-2.el8sat.noarch.rpmrubygem-safemode-1.3.6-2.el8sat.noarch.rpmrubygem-scoped_search-4.1.10-1.el8sat.noarch.rpmrubygem-sd_notify-0.1.0-2.el8sat.noarch.rpmrubygem-secure_headers-6.3.0-3.el8sat.noarch.rpmrubygem-sequel-5.53.0-1.el8sat.noarch.rpmrubygem-server_sent_events-0.1.2-2.el8sat.noarch.rpmrubygem-sexp_processor-4.10.0-7.el8sat.noarch.rpmrubygem-sidekiq-5.2.10-1.el8sat.noarch.rpmrubygem-signet-0.14.0-2.el8sat.noarch.rpmrubygem-sinatra-2.2.0-1.el8sat.noarch.rpmrubygem-smart_proxy_ansible-3.4.1-2.el8sat.noarch.rpmrubygem-smart_proxy_container_gateway-1.0.6-1.el8sat.noarch.rpmrubygem-smart_proxy_dhcp_infoblox-0.0.16-7.el8sat.noarch.rpmrubygem-smart_proxy_dhcp_remote_isc-0.0.5-6.el8sat.noarch.rpmrubygem-smart_proxy_discovery-1.0.5-9.el8sat.noarch.rpmrubygem-smart_proxy_discovery_image-1.6.0-2.el8sat.noarch.rpmrubygem-smart_proxy_dns_infoblox-1.1.0-7.el8sat.noarch.rpmrubygem-smart_proxy_dynflow-0.8.2-1.el8sat.noarch.rpmrubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.noarch.rpmrubygem-smart_proxy_openscap-0.9.2-1.el8sat.noarch.rpmrubygem-smart_proxy_pulp-3.2.0-3.el8sat.noarch.rpmrubygem-smart_proxy_remote_execution_ssh-0.7.3-1.el8sat.noarch.rpmrubygem-smart_proxy_shellhooks-0.9.2-2.el8sat.noarch.rpmrubygem-sprockets-4.0.2-2.el8sat.noarch.rpmrubygem-sprockets-rails-3.2.1-7.el8sat.noarch.rpmrubygem-sshkey-1.9.0-5.el8sat.noarch.rpmrubygem-statsd-instrument-2.1.4-4.el8sat.noarch.rpmrubygem-stomp-1.4.9-2.el8sat.noarch.rpmrubygem-thor-1.0.1-3.el8sat.noarch.rpmrubygem-thread_safe-0.3.6-6.el8sat.noarch.rpmrubygem-tilt-2.0.8-5.el8sat.noarch.rpmrubygem-timeliness-0.3.10-2.el8sat.noarch.rpmrubygem-tzinfo-1.2.6-2.el8sat.noarch.rpmrubygem-uber-0.1.0-3.el8sat.noarch.rpmrubygem-unf-0.1.3-9.el8sat.noarch.rpmrubygem-unicode-display_width-1.7.0-2.el8sat.noarch.rpmrubygem-validates_lengths_from_database-0.5.0-8.el8sat.noarch.rpmrubygem-webpack-rails-0.9.8-6.1.el8sat.noarch.rpmrubygem-websocket-extensions-0.1.5-2.el8sat.noarch.rpmrubygem-will_paginate-3.1.7-4.el8sat.noarch.rpmrubygem-zeitwerk-2.2.2-2.el8sat.noarch.rpmsatellite-6.12.0-4.el8sat.noarch.rpmsatellite-cli-6.12.0-4.el8sat.noarch.rpmsatellite-common-6.12.0-4.el8sat.noarch.rpmsatellite-installer-6.12.0.5-1.el8sat.noarch.rpmsatellite-maintain-0.0.1-1.el8sat.noarch.rpmx86_64:cjson-1.7.14-5.el8sat.x86_64.rpmcjson-debuginfo-1.7.14-5.el8sat.x86_64.rpmcjson-debugsource-1.7.14-5.el8sat.x86_64.rpmcreaterepo_c-0.20.1-1.el8pc.x86_64.rpmcreaterepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpmcreaterepo_c-debugsource-0.20.1-1.el8pc.x86_64.rpmcreaterepo_c-libs-0.20.1-1.el8pc.x86_64.rpmcreaterepo_c-libs-debuginfo-0.20.1-1.el8pc.x86_64.rpmdynflow-utils-1.6.3-1.el8sat.x86_64.rpmforeman-discovery-image-service-1.0.0-4.1.el8sat.x86_64.rpmforeman-discovery-image-service-tui-1.0.0-4.1.el8sat.x86_64.rpmlibcomps-0.1.18-4.el8pc.x86_64.rpmlibcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpmlibcomps-debugsource-0.1.18-4.el8pc.x86_64.rpmlibdb-cxx-5.3.28-42.el8_4.x86_64.rpmlibdb-cxx-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-debugsource-5.3.28-42.el8_4.x86_64.rpmlibdb-java-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-sql-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-sql-devel-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-tcl-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-utils-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibsodium-1.0.17-3.el8sat.x86_64.rpmlibsodium-debuginfo-1.0.17-3.el8sat.x86_64.rpmlibsodium-debugsource-1.0.17-3.el8sat.x86_64.rpmlibsolv-0.7.22-4.el8pc.x86_64.rpmlibsolv-debuginfo-0.7.22-4.el8pc.x86_64.rpmlibsolv-debugsource-0.7.22-4.el8pc.x86_64.rpmlibsolv-demo-debuginfo-0.7.22-4.el8pc.x86_64.rpmlibsolv-tools-debuginfo-0.7.22-4.el8pc.x86_64.rpmlibwebsockets-2.4.2-2.el8.x86_64.rpmlibwebsockets-debuginfo-2.4.2-2.el8.x86_64.rpmlibwebsockets-debugsource-2.4.2-2.el8.x86_64.rpmlibwebsockets-tests-debuginfo-2.4.2-2.el8.x86_64.rpmmosquitto-2.0.14-1.el8sat.x86_64.rpmmosquitto-debuginfo-2.0.14-1.el8sat.x86_64.rpmmosquitto-debugsource-2.0.14-1.el8sat.x86_64.rpmpostgresql-evr-0.0.2-1.el8sat.x86_64.rpmpulpcore-selinux-1.3.2-1.el8pc.x86_64.rpmpuppet-agent-7.12.1-1.el8sat.x86_64.rpmpython-aiohttp-debugsource-3.8.1-3.el8pc.x86_64.rpmpython-brotli-debugsource-1.0.9-2.el8pc.x86_64.rpmpython-cchardet-debugsource-2.1.7-4.el8pc.x86_64.rpmpython-cffi-debugsource-1.15.0-2.el8pc.x86_64.rpmpython-cryptography-debugsource-3.4.8-1.el8pc.x86_64.rpmpython-frozenlist-debugsource-1.3.0-2.el8pc.x86_64.rpmpython-lxml-debugsource-4.7.1-2.el8pc.x86_64.rpmpython-markupsafe-debugsource-2.0.1-3.el8pc.x86_64.rpmpython-multidict-debugsource-6.0.2-2.el8pc.x86_64.rpmpython-psutil-debugsource-5.7.2-2.el8sat.x86_64.rpmpython-psycopg2-debugsource-2.9.3-2.el8pc.x86_64.rpmpython-pycairo-debugsource-1.20.1-3.el8pc.x86_64.rpmpython-pycares-debugsource-4.1.2-2.el8pc.x86_64.rpmpython-pycryptodomex-debugsource-3.14.1-2.el8pc.x86_64.rpmpython-pygobject-debugsource-3.40.1-3.el8pc.x86_64.rpmpython-pyrsistent-debugsource-0.18.1-2.el8pc.x86_64.rpmpython-rhsm-debugsource-1.19.2-3.el8pc.x86_64.rpmpython-ruamel-yaml-clib-debugsource-0.2.6-2.el8pc.x86_64.rpmpython-yarl-debugsource-1.7.2-2.el8pc.x86_64.rpmpython2-qpid-qmf-1.39.0-7.el8amq.x86_64.rpmpython2-saslwrapper-0.22-6.el8sat.x86_64.rpmpython2-saslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpmpython3-createrepo_c-0.20.1-1.el8pc.x86_64.rpmpython3-createrepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpmpython3-libcomps-0.1.18-4.el8pc.x86_64.rpmpython3-libcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpmpython3-psutil-5.7.2-2.el8sat.x86_64.rpmpython3-psutil-debuginfo-5.7.2-2.el8sat.x86_64.rpmpython3-qpid-proton-0.33.0-4.el8.x86_64.rpmpython3-qpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpmpython3-solv-0.7.22-4.el8pc.x86_64.rpmpython3-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpmpython39-aiohttp-3.8.1-3.el8pc.x86_64.rpmpython39-aiohttp-debuginfo-3.8.1-3.el8pc.x86_64.rpmpython39-brotli-1.0.9-2.el8pc.x86_64.rpmpython39-brotli-debuginfo-1.0.9-2.el8pc.x86_64.rpmpython39-cchardet-2.1.7-4.el8pc.x86_64.rpmpython39-cchardet-debuginfo-2.1.7-4.el8pc.x86_64.rpmpython39-cffi-1.15.0-2.el8pc.x86_64.rpmpython39-cffi-debuginfo-1.15.0-2.el8pc.x86_64.rpmpython39-createrepo_c-0.20.1-1.el8pc.x86_64.rpmpython39-createrepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpmpython39-cryptography-3.4.8-1.el8pc.x86_64.rpmpython39-cryptography-debuginfo-3.4.8-1.el8pc.x86_64.rpmpython39-frozenlist-1.3.0-2.el8pc.x86_64.rpmpython39-frozenlist-debuginfo-1.3.0-2.el8pc.x86_64.rpmpython39-libcomps-0.1.18-4.el8pc.x86_64.rpmpython39-libcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpmpython39-lxml-4.7.1-2.el8pc.x86_64.rpmpython39-lxml-debuginfo-4.7.1-2.el8pc.x86_64.rpmpython39-markupsafe-2.0.1-3.el8pc.x86_64.rpmpython39-markupsafe-debuginfo-2.0.1-3.el8pc.x86_64.rpmpython39-multidict-6.0.2-2.el8pc.x86_64.rpmpython39-multidict-debuginfo-6.0.2-2.el8pc.x86_64.rpmpython39-psycopg2-2.9.3-2.el8pc.x86_64.rpmpython39-psycopg2-debuginfo-2.9.3-2.el8pc.x86_64.rpmpython39-pycairo-1.20.1-3.el8pc.x86_64.rpmpython39-pycairo-debuginfo-1.20.1-3.el8pc.x86_64.rpmpython39-pycares-4.1.2-2.el8pc.x86_64.rpmpython39-pycares-debuginfo-4.1.2-2.el8pc.x86_64.rpmpython39-pycryptodomex-3.14.1-2.el8pc.x86_64.rpmpython39-pycryptodomex-debuginfo-3.14.1-2.el8pc.x86_64.rpmpython39-pygobject-3.40.1-3.el8pc.x86_64.rpmpython39-pygobject-debuginfo-3.40.1-3.el8pc.x86_64.rpmpython39-pyrsistent-0.18.1-2.el8pc.x86_64.rpmpython39-pyrsistent-debuginfo-0.18.1-2.el8pc.x86_64.rpmpython39-pyyaml-5.4.1-4.el8pc.x86_64.rpmpython39-rhsm-1.19.2-3.el8pc.x86_64.rpmpython39-rhsm-debuginfo-1.19.2-3.el8pc.x86_64.rpmpython39-ruamel-yaml-clib-0.2.6-2.el8pc.x86_64.rpmpython39-ruamel-yaml-clib-debuginfo-0.2.6-2.el8pc.x86_64.rpmpython39-solv-0.7.22-4.el8pc.x86_64.rpmpython39-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpmpython39-yarl-1.7.2-2.el8pc.x86_64.rpmpython39-yarl-debuginfo-1.7.2-2.el8pc.x86_64.rpmqpid-cpp-client-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-client-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-client-devel-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-client-devel-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-client-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-debugsource-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-ha-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-linearstore-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-linearstore-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-dispatch-debugsource-1.14.0-6.el8.x86_64.rpmqpid-dispatch-router-1.14.0-6.el8.x86_64.rpmqpid-dispatch-router-debuginfo-1.14.0-6.el8.x86_64.rpmqpid-proton-c-0.33.0-4.el8.x86_64.rpmqpid-proton-c-debuginfo-0.33.0-4.el8.x86_64.rpmqpid-proton-cpp-debuginfo-0.33.0-4.el8.x86_64.rpmqpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpmqpid-proton-debugsource-0.33.0-4.el8.x86_64.rpmqpid-qmf-1.39.0-7.el8amq.x86_64.rpmqpid-qmf-debuginfo-1.39.0-7.el8amq.x86_64.rpmruby-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpmrubygem-bcrypt-3.1.12-4.1.el8sat.x86_64.rpmrubygem-bcrypt-debuginfo-3.1.12-4.1.el8sat.x86_64.rpmrubygem-bcrypt-debugsource-3.1.12-4.1.el8sat.x86_64.rpmrubygem-facter-4.0.51-2.el8sat.x86_64.rpmrubygem-ffi-1.12.2-2.1.el8sat.x86_64.rpmrubygem-ffi-debuginfo-1.12.2-2.1.el8sat.x86_64.rpmrubygem-ffi-debugsource-1.12.2-2.1.el8sat.x86_64.rpmrubygem-http_parser.rb-0.6.0-3.1.el8sat.x86_64.rpmrubygem-http_parser.rb-debuginfo-0.6.0-3.1.el8sat.x86_64.rpmrubygem-http_parser.rb-debugsource-0.6.0-3.1.el8sat.x86_64.rpmrubygem-journald-native-1.0.11-4.1.el8sat.x86_64.rpmrubygem-journald-native-debuginfo-1.0.11-4.1.el8sat.x86_64.rpmrubygem-journald-native-debugsource-1.0.11-4.1.el8sat.x86_64.rpmrubygem-msgpack-1.3.3-2.1.el8sat.x86_64.rpmrubygem-msgpack-debuginfo-1.3.3-2.1.el8sat.x86_64.rpmrubygem-msgpack-debugsource-1.3.3-2.1.el8sat.x86_64.rpmrubygem-newt-0.9.7-3.1.el8sat.x86_64.rpmrubygem-newt-debuginfo-0.9.7-3.1.el8sat.x86_64.rpmrubygem-newt-debugsource-0.9.7-3.1.el8sat.x86_64.rpmrubygem-nio4r-2.5.4-2.1.el8sat.x86_64.rpmrubygem-nio4r-debuginfo-2.5.4-2.1.el8sat.x86_64.rpmrubygem-nio4r-debugsource-2.5.4-2.1.el8sat.x86_64.rpmrubygem-nokogiri-1.13.8-1.el8sat.x86_64.rpmrubygem-nokogiri-debuginfo-1.13.8-1.el8sat.x86_64.rpmrubygem-nokogiri-debugsource-1.13.8-1.el8sat.x86_64.rpmrubygem-ovirt-engine-sdk-4.4.0-2.1.el8sat.x86_64.rpmrubygem-ovirt-engine-sdk-debuginfo-4.4.0-2.1.el8sat.x86_64.rpmrubygem-ovirt-engine-sdk-debugsource-4.4.0-2.1.el8sat.x86_64.rpmrubygem-puma-5.6.2-1.el8sat.x86_64.rpmrubygem-puma-debuginfo-5.6.2-1.el8sat.x86_64.rpmrubygem-puma-debugsource-5.6.2-1.el8sat.x86_64.rpmrubygem-qpid_proton-0.33.0-4.el8.x86_64.rpmrubygem-qpid_proton-0.33.0-5.el8sat.x86_64.rpmrubygem-qpid_proton-debuginfo-0.33.0-4.el8.x86_64.rpmrubygem-qpid_proton-debuginfo-0.33.0-5.el8sat.x86_64.rpmrubygem-qpid_proton-debugsource-0.33.0-5.el8sat.x86_64.rpmrubygem-rkerberos-0.1.5-20.1.el8sat.x86_64.rpmrubygem-rkerberos-debuginfo-0.1.5-20.1.el8sat.x86_64.rpmrubygem-rkerberos-debugsource-0.1.5-20.1.el8sat.x86_64.rpmrubygem-ruby-libvirt-0.7.1-2.1.el8sat.x86_64.rpmrubygem-ruby-libvirt-debuginfo-0.7.1-2.1.el8sat.x86_64.rpmrubygem-ruby-libvirt-debugsource-0.7.1-2.1.el8sat.x86_64.rpmrubygem-sqlite3-1.4.2-1.el8sat.x86_64.rpmrubygem-sqlite3-debuginfo-1.4.2-1.el8sat.x86_64.rpmrubygem-sqlite3-debugsource-1.4.2-1.el8sat.x86_64.rpmrubygem-unf_ext-0.0.7.2-4.1.el8sat.x86_64.rpmrubygem-unf_ext-debuginfo-0.0.7.2-4.1.el8sat.x86_64.rpmrubygem-unf_ext-debugsource-0.0.7.2-4.1.el8sat.x86_64.rpmrubygem-unicode-0.4.4.4-4.1.el8sat.x86_64.rpmrubygem-unicode-debuginfo-0.4.4.4-4.1.el8sat.x86_64.rpmrubygem-unicode-debugsource-0.4.4.4-4.1.el8sat.x86_64.rpmrubygem-websocket-driver-0.7.1-2.1.el8sat.x86_64.rpmrubygem-websocket-driver-debuginfo-0.7.1-2.1.el8sat.x86_64.rpmrubygem-websocket-driver-debugsource-0.7.1-2.1.el8sat.x86_64.rpmsaslwrapper-0.22-6.el8sat.x86_64.rpmsaslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpmsaslwrapper-debugsource-0.22-6.el8sat.x86_64.rpmyggdrasil-worker-forwarder-0.0.1-1.el8sat.x86_64.rpmRed Hat Satellite 6.12 for RHEL 8:Source:ansible-collection-redhat-satellite-3.7.0-2.el8sat.src.rpmansible-collection-redhat-satellite_operations-1.2.3-1.el8sat.src.rpmansible-lint-5.0.8-4.el8pc.src.rpmansible-runner-1.4.7-1.el8ar.src.rpmansiblerole-foreman_scap_client-0.2.0-2.el8sat.src.rpmansiblerole-insights-client-1.7.1-2.el8sat.src.rpmcjson-1.7.14-5.el8sat.src.rpmcreaterepo_c-0.20.1-1.el8pc.src.rpmdynflow-utils-1.6.3-1.el8sat.src.rpmforeman-3.3.0.17-1.el8sat.src.rpmforeman-bootloaders-redhat-202102220000-1.el8sat.src.rpmforeman-discovery-image-3.8.2-1.el8sat.src.rpmforeman-discovery-image-service-1.0.0-4.1.el8sat.src.rpmforeman-installer-3.3.0.8-1.el8sat.src.rpmforeman-proxy-3.3.0-1.el8sat.src.rpmkatello-4.5.0-1.el8sat.src.rpmkatello-certs-tools-2.9.0-1.el8sat.src.rpmkatello-client-bootstrap-1.7.9-1.el8sat.src.rpmlibcomps-0.1.18-4.el8pc.src.rpmlibdb-5.3.28-42.el8_4.src.rpmlibsodium-1.0.17-3.el8sat.src.rpmlibsolv-0.7.22-4.el8pc.src.rpmlibwebsockets-2.4.2-2.el8.src.rpmmosquitto-2.0.14-1.el8sat.src.rpmpulpcore-selinux-1.3.2-1.el8pc.src.rpmpuppet-agent-7.12.1-1.el8sat.src.rpmpuppet-agent-oauth-0.5.1-3.el8sat.src.rpmpuppet-foreman_scap_client-0.4.0-1.el8sat.src.rpmpuppetlabs-stdlib-5.2.0-1.el8sat.src.rpmpuppetserver-7.4.2-1.el8sat.src.rpmpython-aiodns-3.0.0-3.el8pc.src.rpmpython-aiofiles-0.8.0-2.el8pc.src.rpmpython-aiohttp-3.8.1-3.el8pc.src.rpmpython-aiohttp-xmlrpc-1.5.0-2.el8pc.src.rpmpython-aioredis-2.0.1-2.el8pc.src.rpmpython-aiosignal-1.2.0-2.el8pc.src.rpmpython-ansible-builder-1.0.1-4.el8pc.src.rpmpython-asgiref-3.5.0-2.el8pc.src.rpmpython-async-lru-1.0.2-3.el8pc.src.rpmpython-async-timeout-4.0.2-2.el8pc.src.rpmpython-asyncio-throttle-1.0.2-3.el8pc.src.rpmpython-attrs-21.4.0-2.el8pc.src.rpmpython-backoff-1.11.1-2.el8pc.src.rpmpython-bindep-2.10.2-4.el8pc.src.rpmpython-bleach-3.3.1-2.el8pc.src.rpmpython-bleach-allowlist-1.0.3-3.el8pc.src.rpmpython-bracex-2.2.1-2.el8pc.src.rpmpython-brotli-1.0.9-2.el8pc.src.rpmpython-cchardet-2.1.7-4.el8pc.src.rpmpython-certifi-2020.6.20-3.el8pc.src.rpmpython-cffi-1.15.0-2.el8pc.src.rpmpython-chardet-4.0.0-2.el8pc.src.rpmpython-charset-normalizer-2.0.11-4.el8pc.src.rpmpython-click-8.0.3-2.el8pc.src.rpmpython-click-shell-2.1-3.el8pc.src.rpmpython-colorama-0.4.4-3.el8pc.src.rpmpython-commonmark-0.9.1-5.el8pc.src.rpmpython-contextlib2-21.6.0-3.el8pc.src.rpmpython-cryptography-3.4.8-1.el8pc.src.rpmpython-daemon-2.1.2-9.el8ar.src.rpmpython-dataclasses-0.8-3.el8pc.src.rpmpython-dateutil-2.8.2-2.el8pc.src.rpmpython-debian-0.1.43-2.el8pc.src.rpmpython-defusedxml-0.7.1-3.el8pc.src.rpmpython-diff-match-patch-20200713-3.el8pc.src.rpmpython-distro-1.6.0-3.el8pc.src.rpmpython-django-3.2.14-2.el8pc.src.rpmpython-django-currentuser-0.5.3-5.el8pc.src.rpmpython-django-filter-21.1-3.el8pc.src.rpmpython-django-guardian-2.4.0-5.el8pc.src.rpmpython-django-guid-3.2.2-1.el8pc.src.rpmpython-django-import-export-2.7.1-6.el8pc.src.rpmpython-django-lifecycle-0.9.6-3.el8pc.src.rpmpython-django-prometheus-2.1.0-3.el8pc.src.rpmpython-django-readonly-field-1.1.1-3.el8pc.src.rpmpython-djangorestframework-3.13.1-2.el8pc.src.rpmpython-djangorestframework-queryfields-1.0.0-5.el8pc.src.rpmpython-drf-access-policy-1.1.0-3.el8pc.src.rpmpython-drf-nested-routers-0.93.4-3.el8pc.src.rpmpython-drf-spectacular-0.21.2-2.el8pc.src.rpmpython-dynaconf-3.1.7-4.el8pc.src.rpmpython-ecdsa-0.14.1-2.el8pc.src.rpmpython-enrich-1.2.6-5.el8pc.src.rpmpython-et-xmlfile-1.1.0-2.el8pc.src.rpmpython-flake8-3.9.2-5.el8pc.src.rpmpython-frozenlist-1.3.0-2.el8pc.src.rpmpython-future-0.18.2-5.el8pc.src.rpmpython-galaxy-importer-0.4.5-1.el8pc.src.rpmpython-gitdb-4.0.9-2.el8pc.src.rpmpython-gitpython-3.1.26-3.el8pc.src.rpmpython-gnupg-0.4.8-2.el8pc.src.rpmpython-gunicorn-20.1.0-5.el8pc.src.rpmpython-idna-3.3-2.el8pc.src.rpmpython-idna-ssl-1.1.0-5.el8pc.src.rpmpython-importlib-metadata-4.10.1-2.el8pc.src.rpmpython-importlib-resources-5.4.0-4.el8pc.src.rpmpython-inflection-0.5.1-3.el8pc.src.rpmpython-iniparse-0.4-35.el8pc.src.rpmpython-jinja2-3.0.3-2.el8pc.src.rpmpython-jsonschema-4.6.0-4.el8pc.src.rpmpython-lockfile-0.11.0-8.el8ar.src.rpmpython-lxml-4.7.1-2.el8pc.src.rpmpython-markdown-3.3.6-3.el8pc.src.rpmpython-markuppy-1.14-3.el8pc.src.rpmpython-markupsafe-2.0.1-3.el8pc.src.rpmpython-mccabe-0.6.1-3.el8pc.src.rpmpython-multidict-6.0.2-2.el8pc.src.rpmpython-naya-1.1.1-3.el8pc.src.rpmpython-odfpy-1.4.1-6.el8pc.src.rpmpython-openpyxl-3.0.9-2.el8pc.src.rpmpython-packaging-21.3-1.el8pc.src.rpmpython-parsley-1.3-2.el8pc.src.rpmpython-pbr-5.8.0-4.el8pc.src.rpmpython-pexpect-4.6-2.el8ar.src.rpmpython-productmd-1.33-3.el8pc.src.rpmpython-prometheus-client-0.8.0-3.el8pc.src.rpmpython-psutil-5.7.2-2.el8sat.src.rpmpython-psycopg2-2.9.3-2.el8pc.src.rpmpython-pulp-ansible-0.13.2-2.el8pc.src.rpmpython-pulp-certguard-1.5.2-3.el8pc.src.rpmpython-pulp-cli-0.14.0-4.el8pc.src.rpmpython-pulp-container-2.10.9-1.el8pc.src.rpmpython-pulp-deb-2.18.0-3.el8pc.src.rpmpython-pulp-file-1.10.2-2.el8pc.src.rpmpython-pulp-rpm-3.18.7-1.el8pc.src.rpmpython-pulpcore-3.18.10-1.el8pc.src.rpmpython-pyOpenSSL-19.1.0-3.el8pc.src.rpmpython-pycairo-1.20.1-3.el8pc.src.rpmpython-pycares-4.1.2-2.el8pc.src.rpmpython-pycodestyle-2.7.0-5.el8pc.src.rpmpython-pycparser-2.21-2.el8pc.src.rpmpython-pycryptodomex-3.14.1-2.el8pc.src.rpmpython-pyflakes-2.3.1-5.el8pc.src.rpmpython-pygments-2.11.2-2.el8pc.src.rpmpython-pygobject-3.40.1-3.el8pc.src.rpmpython-pygtrie-2.4.2-3.el8pc.src.rpmpython-pyjwkest-1.4.2-6.el8pc.src.rpmpython-pyjwt-1.7.1-8.el8pc.src.rpmpython-pyparsing-2.4.7-3.el8pc.src.rpmpython-pyrsistent-0.18.1-2.el8pc.src.rpmpython-pytz-2021.3-2.el8pc.src.rpmpython-pyyaml-5.4.1-4.el8pc.src.rpmpython-qpid-1.37.0-1.el8.src.rpmpython-redis-3.5.3-3.el8pc.src.rpmpython-requests-2.27.1-2.el8pc.src.rpmpython-requirements-parser-0.2.0-3.el8pc.src.rpmpython-rhsm-1.19.2-3.el8pc.src.rpmpython-rich-10.12.0-3.el8pc.src.rpmpython-ruamel-yaml-0.17.20-2.el8pc.src.rpmpython-ruamel-yaml-clib-0.2.6-2.el8pc.src.rpmpython-schema-0.7.5-2.el8pc.src.rpmpython-semantic-version-2.10.0-1.el8pc.src.rpmpython-six-1.16.0-2.el8pc.src.rpmpython-smmap-5.0.0-2.el8pc.src.rpmpython-sqlparse-0.4.2-3.el8pc.src.rpmpython-tablib-3.2.0-3.el8pc.src.rpmpython-tenacity-7.0.0-3.el8pc.src.rpmpython-toml-0.10.2-3.el8pc.src.rpmpython-typing-extensions-3.10.0.2-2.el8pc.src.rpmpython-uritemplate-4.1.1-2.el8pc.src.rpmpython-url-normalize-1.4.3-4.el8pc.src.rpmpython-urllib3-1.26.8-2.el8pc.src.rpmpython-urlman-1.4.0-3.el8pc.src.rpmpython-wcmatch-8.3-2.el8pc.src.rpmpython-webencodings-0.5.1-3.el8pc.src.rpmpython-whitenoise-6.0.0-1.el8pc.src.rpmpython-xlrd-2.0.1-5.el8pc.src.rpmpython-xlwt-1.3.0-3.el8pc.src.rpmpython-yarl-1.7.2-2.el8pc.src.rpmpython-zipp-3.4.0-4.el8pc.src.rpmqpid-cpp-1.39.0-7.el8amq.src.rpmqpid-dispatch-1.14.0-6.el8.src.rpmqpid-proton-0.33.0-4.el8.src.rpmredhat-access-insights-puppet-1.0.1-1.el8sat.src.rpmrubygem-algebrick-0.7.3-8.el8sat.src.rpmrubygem-ansi-1.5.0-3.el8sat.src.rpmrubygem-apipie-params-0.0.5-5.1.el8sat.src.rpmrubygem-bundler_ext-0.4.1-6.el8sat.src.rpmrubygem-clamp-1.1.2-7.el8sat.src.rpmrubygem-concurrent-ruby-1.1.6-3.el8sat.src.rpmrubygem-concurrent-ruby-edge-0.6.0-3.el8sat.src.rpmrubygem-domain_name-0.5.20160310-5.el8sat.src.rpmrubygem-dynflow-1.6.4-1.el8sat.src.rpmrubygem-excon-0.76.0-2.el8sat.src.rpmrubygem-faraday-0.17.3-2.el8sat.src.rpmrubygem-faraday_middleware-0.13.1-3.el8sat.src.rpmrubygem-fast_gettext-1.4.1-5.el8sat.src.rpmrubygem-ffi-1.12.2-2.1.el8sat.src.rpmrubygem-foreman_maintain-1.1.8-1.el8sat.src.rpmrubygem-gssapi-1.2.0-8.el8sat.src.rpmrubygem-hashie-3.6.0-3.el8sat.src.rpmrubygem-highline-2.0.3-2.el8sat.src.rpmrubygem-http-cookie-1.0.2-5.1.el8sat.src.rpmrubygem-infoblox-3.0.0-4.el8sat.src.rpmrubygem-journald-logger-2.0.4-3.el8sat.src.rpmrubygem-journald-native-1.0.11-4.1.el8sat.src.rpmrubygem-jwt-2.2.2-2.el8sat.src.rpmrubygem-kafo-6.4.0-1.el8sat.src.rpmrubygem-kafo_parsers-1.2.1-1.el8sat.src.rpmrubygem-kafo_wizards-0.0.2-2.el8sat.src.rpmrubygem-little-plugger-1.1.4-3.el8sat.src.rpmrubygem-logging-2.3.0-2.el8sat.src.rpmrubygem-logging-journald-2.0.0-3.el8sat.src.rpmrubygem-mime-types-3.3.1-2.el8sat.src.rpmrubygem-mime-types-data-3.2018.0812-5.el8sat.src.rpmrubygem-mqtt-0.5.0-1.el8sat.src.rpmrubygem-msgpack-1.3.3-2.1.el8sat.src.rpmrubygem-multi_json-1.14.1-3.el8sat.src.rpmrubygem-multipart-post-2.0.0-3.el8sat.src.rpmrubygem-mustermann-1.1.1-1.el8sat.src.rpmrubygem-net-ssh-4.2.0-3.el8sat.src.rpmrubygem-net-ssh-krb-0.4.0-4.el8sat.src.rpmrubygem-netrc-0.11.0-6.el8sat.src.rpmrubygem-newt-0.9.7-3.1.el8sat.src.rpmrubygem-nokogiri-1.13.8-1.el8sat.src.rpmrubygem-oauth-0.5.4-5.el8sat.src.rpmrubygem-openscap-0.4.9-7.el8sat.src.rpmrubygem-openscap_parser-1.0.2-2.el8sat.src.rpmrubygem-powerbar-2.0.1-3.el8sat.src.rpmrubygem-rack-2.2.4-1.el8sat.src.rpmrubygem-rack-protection-2.2.0-1.el8sat.src.rpmrubygem-rb-inotify-0.9.7-6.el8sat.src.rpmrubygem-rbnacl-4.0.2-2.el8sat.src.rpmrubygem-redfish_client-0.5.2-2.el8sat.src.rpmrubygem-rest-client-2.0.2-4.el8sat.src.rpmrubygem-rkerberos-0.1.5-20.1.el8sat.src.rpmrubygem-rsec-0.4.3-5.el8sat.src.rpmrubygem-ruby-libvirt-0.7.1-2.1.el8sat.src.rpmrubygem-ruby2_keywords-0.0.4-1.el8sat.src.rpmrubygem-rubyipmi-0.11.0-1.el8sat.src.rpmrubygem-sd_notify-0.1.0-2.el8sat.src.rpmrubygem-sequel-5.53.0-1.el8sat.src.rpmrubygem-server_sent_events-0.1.2-2.el8sat.src.rpmrubygem-sinatra-2.2.0-1.el8sat.src.rpmrubygem-smart_proxy_ansible-3.4.1-2.el8sat.src.rpmrubygem-smart_proxy_container_gateway-1.0.6-1.el8sat.src.rpmrubygem-smart_proxy_dhcp_infoblox-0.0.16-7.el8sat.src.rpmrubygem-smart_proxy_dhcp_remote_isc-0.0.5-6.el8sat.src.rpmrubygem-smart_proxy_discovery-1.0.5-9.el8sat.src.rpmrubygem-smart_proxy_discovery_image-1.6.0-2.el8sat.src.rpmrubygem-smart_proxy_dns_infoblox-1.1.0-7.el8sat.src.rpmrubygem-smart_proxy_dynflow-0.8.2-1.el8sat.src.rpmrubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.src.rpmrubygem-smart_proxy_openscap-0.9.2-1.el8sat.src.rpmrubygem-smart_proxy_pulp-3.2.0-3.el8sat.src.rpmrubygem-smart_proxy_remote_execution_ssh-0.7.3-1.el8sat.src.rpmrubygem-smart_proxy_shellhooks-0.9.2-2.el8sat.src.rpmrubygem-sqlite3-1.4.2-1.el8sat.src.rpmrubygem-statsd-instrument-2.1.4-4.el8sat.src.rpmrubygem-tilt-2.0.8-5.el8sat.src.rpmrubygem-unf-0.1.3-9.el8sat.src.rpmrubygem-unf_ext-0.0.7.2-4.1.el8sat.src.rpmsaslwrapper-0.22-6.el8sat.src.rpmsatellite-6.12.0-4.el8sat.src.rpmsatellite-installer-6.12.0.5-1.el8sat.src.rpmsatellite-maintain-0.0.1-1.el8sat.src.rpmnoarch:ansible-collection-redhat-satellite-3.7.0-2.el8sat.noarch.rpmansible-collection-redhat-satellite_operations-1.2.3-1.el8sat.noarch.rpmansible-lint-5.0.8-4.el8pc.noarch.rpmansible-runner-1.4.7-1.el8ar.noarch.rpmansiblerole-foreman_scap_client-0.2.0-2.el8sat.noarch.rpmansiblerole-insights-client-1.7.1-2.el8sat.noarch.rpmforeman-bootloaders-redhat-202102220000-1.el8sat.noarch.rpmforeman-bootloaders-redhat-tftpboot-202102220000-1.el8sat.noarch.rpmforeman-debug-3.3.0.17-1.el8sat.noarch.rpmforeman-discovery-image-3.8.2-1.el8sat.noarch.rpmforeman-installer-3.3.0.8-1.el8sat.noarch.rpmforeman-installer-katello-3.3.0.8-1.el8sat.noarch.rpmforeman-proxy-3.3.0-1.el8sat.noarch.rpmforeman-proxy-content-4.5.0-1.el8sat.noarch.rpmforeman-proxy-journald-3.3.0-1.el8sat.noarch.rpmkatello-certs-tools-2.9.0-1.el8sat.noarch.rpmkatello-client-bootstrap-1.7.9-1.el8sat.noarch.rpmkatello-common-4.5.0-1.el8sat.noarch.rpmkatello-debug-4.5.0-1.el8sat.noarch.rpmpuppet-agent-oauth-0.5.1-3.el8sat.noarch.rpmpuppet-foreman_scap_client-0.4.0-1.el8sat.noarch.rpmpuppetlabs-stdlib-5.2.0-1.el8sat.noarch.rpmpuppetserver-7.4.2-1.el8sat.noarch.rpmpython2-qpid-1.37.0-1.el8.noarch.rpmpython3-ansible-runner-1.4.7-1.el8ar.noarch.rpmpython3-daemon-2.1.2-9.el8ar.noarch.rpmpython3-lockfile-0.11.0-8.el8ar.noarch.rpmpython3-pexpect-4.6-2.el8ar.noarch.rpmpython39-aiodns-3.0.0-3.el8pc.noarch.rpmpython39-aiofiles-0.8.0-2.el8pc.noarch.rpmpython39-aiohttp-xmlrpc-1.5.0-2.el8pc.noarch.rpmpython39-aioredis-2.0.1-2.el8pc.noarch.rpmpython39-aiosignal-1.2.0-2.el8pc.noarch.rpmpython39-ansible-builder-1.0.1-4.el8pc.noarch.rpmpython39-asgiref-3.5.0-2.el8pc.noarch.rpmpython39-async-lru-1.0.2-3.el8pc.noarch.rpmpython39-async-timeout-4.0.2-2.el8pc.noarch.rpmpython39-asyncio-throttle-1.0.2-3.el8pc.noarch.rpmpython39-attrs-21.4.0-2.el8pc.noarch.rpmpython39-backoff-1.11.1-2.el8pc.noarch.rpmpython39-bindep-2.10.2-4.el8pc.noarch.rpmpython39-bleach-3.3.1-2.el8pc.noarch.rpmpython39-bleach-allowlist-1.0.3-3.el8pc.noarch.rpmpython39-bracex-2.2.1-2.el8pc.noarch.rpmpython39-certifi-2020.6.20-3.el8pc.noarch.rpmpython39-chardet-4.0.0-2.el8pc.noarch.rpmpython39-charset-normalizer-2.0.11-4.el8pc.noarch.rpmpython39-click-8.0.3-2.el8pc.noarch.rpmpython39-click-shell-2.1-3.el8pc.noarch.rpmpython39-colorama-0.4.4-3.el8pc.noarch.rpmpython39-commonmark-0.9.1-5.el8pc.noarch.rpmpython39-contextlib2-21.6.0-3.el8pc.noarch.rpmpython39-dataclasses-0.8-3.el8pc.noarch.rpmpython39-dateutil-2.8.2-2.el8pc.noarch.rpmpython39-debian-0.1.43-2.el8pc.noarch.rpmpython39-defusedxml-0.7.1-3.el8pc.noarch.rpmpython39-diff-match-patch-20200713-3.el8pc.noarch.rpmpython39-distro-1.6.0-3.el8pc.noarch.rpmpython39-django-3.2.14-2.el8pc.noarch.rpmpython39-django-currentuser-0.5.3-5.el8pc.noarch.rpmpython39-django-filter-21.1-3.el8pc.noarch.rpmpython39-django-guardian-2.4.0-5.el8pc.noarch.rpmpython39-django-guid-3.2.2-1.el8pc.noarch.rpmpython39-django-import-export-2.7.1-6.el8pc.noarch.rpmpython39-django-lifecycle-0.9.6-3.el8pc.noarch.rpmpython39-django-prometheus-2.1.0-3.el8pc.noarch.rpmpython39-django-readonly-field-1.1.1-3.el8pc.noarch.rpmpython39-djangorestframework-3.13.1-2.el8pc.noarch.rpmpython39-djangorestframework-queryfields-1.0.0-5.el8pc.noarch.rpmpython39-drf-access-policy-1.1.0-3.el8pc.noarch.rpmpython39-drf-nested-routers-0.93.4-3.el8pc.noarch.rpmpython39-drf-spectacular-0.21.2-2.el8pc.noarch.rpmpython39-dynaconf-3.1.7-4.el8pc.noarch.rpmpython39-ecdsa-0.14.1-2.el8pc.noarch.rpmpython39-enrich-1.2.6-5.el8pc.noarch.rpmpython39-et-xmlfile-1.1.0-2.el8pc.noarch.rpmpython39-flake8-3.9.2-5.el8pc.noarch.rpmpython39-future-0.18.2-5.el8pc.noarch.rpmpython39-galaxy-importer-0.4.5-1.el8pc.noarch.rpmpython39-gitdb-4.0.9-2.el8pc.noarch.rpmpython39-gitpython-3.1.26-3.el8pc.noarch.rpmpython39-gnupg-0.4.8-2.el8pc.noarch.rpmpython39-gunicorn-20.1.0-5.el8pc.noarch.rpmpython39-idna-3.3-2.el8pc.noarch.rpmpython39-idna-ssl-1.1.0-5.el8pc.noarch.rpmpython39-importlib-metadata-4.10.1-2.el8pc.noarch.rpmpython39-importlib-resources-5.4.0-4.el8pc.noarch.rpmpython39-inflection-0.5.1-3.el8pc.noarch.rpmpython39-iniparse-0.4-35.el8pc.noarch.rpmpython39-jinja2-3.0.3-2.el8pc.noarch.rpmpython39-jsonschema-4.6.0-4.el8pc.noarch.rpmpython39-markdown-3.3.6-3.el8pc.noarch.rpmpython39-markuppy-1.14-3.el8pc.noarch.rpmpython39-mccabe-0.6.1-3.el8pc.noarch.rpmpython39-naya-1.1.1-3.el8pc.noarch.rpmpython39-odfpy-1.4.1-6.el8pc.noarch.rpmpython39-openpyxl-3.0.9-2.el8pc.noarch.rpmpython39-packaging-21.3-1.el8pc.noarch.rpmpython39-parsley-1.3-2.el8pc.noarch.rpmpython39-pbr-5.8.0-4.el8pc.noarch.rpmpython39-productmd-1.33-3.el8pc.noarch.rpmpython39-prometheus-client-0.8.0-3.el8pc.noarch.rpmpython39-pulp-ansible-0.13.2-2.el8pc.noarch.rpmpython39-pulp-certguard-1.5.2-3.el8pc.noarch.rpmpython39-pulp-cli-0.14.0-4.el8pc.noarch.rpmpython39-pulp-container-2.10.9-1.el8pc.noarch.rpmpython39-pulp-deb-2.18.0-3.el8pc.noarch.rpmpython39-pulp-file-1.10.2-2.el8pc.noarch.rpmpython39-pulp-rpm-3.18.7-1.el8pc.noarch.rpmpython39-pulpcore-3.18.10-1.el8pc.noarch.rpmpython39-pyOpenSSL-19.1.0-3.el8pc.noarch.rpmpython39-pycodestyle-2.7.0-5.el8pc.noarch.rpmpython39-pycparser-2.21-2.el8pc.noarch.rpmpython39-pyflakes-2.3.1-5.el8pc.noarch.rpmpython39-pygments-2.11.2-2.el8pc.noarch.rpmpython39-pygtrie-2.4.2-3.el8pc.noarch.rpmpython39-pyjwkest-1.4.2-6.el8pc.noarch.rpmpython39-pyjwt-1.7.1-8.el8pc.noarch.rpmpython39-pyparsing-2.4.7-3.el8pc.noarch.rpmpython39-pytz-2021.3-2.el8pc.noarch.rpmpython39-redis-3.5.3-3.el8pc.noarch.rpmpython39-requests-2.27.1-2.el8pc.noarch.rpmpython39-requirements-parser-0.2.0-3.el8pc.noarch.rpmpython39-rich-10.12.0-3.el8pc.noarch.rpmpython39-ruamel-yaml-0.17.20-2.el8pc.noarch.rpmpython39-schema-0.7.5-2.el8pc.noarch.rpmpython39-semantic-version-2.10.0-1.el8pc.noarch.rpmpython39-six-1.16.0-2.el8pc.noarch.rpmpython39-smmap-5.0.0-2.el8pc.noarch.rpmpython39-sqlparse-0.4.2-3.el8pc.noarch.rpmpython39-tablib-3.2.0-3.el8pc.noarch.rpmpython39-tenacity-7.0.0-3.el8pc.noarch.rpmpython39-toml-0.10.2-3.el8pc.noarch.rpmpython39-typing-extensions-3.10.0.2-2.el8pc.noarch.rpmpython39-uritemplate-4.1.1-2.el8pc.noarch.rpmpython39-url-normalize-1.4.3-4.el8pc.noarch.rpmpython39-urllib3-1.26.8-2.el8pc.noarch.rpmpython39-urlman-1.4.0-3.el8pc.noarch.rpmpython39-wcmatch-8.3-2.el8pc.noarch.rpmpython39-webencodings-0.5.1-3.el8pc.noarch.rpmpython39-whitenoise-6.0.0-1.el8pc.noarch.rpmpython39-xlrd-2.0.1-5.el8pc.noarch.rpmpython39-xlwt-1.3.0-3.el8pc.noarch.rpmpython39-zipp-3.4.0-4.el8pc.noarch.rpmqpid-tools-1.39.0-7.el8amq.noarch.rpmredhat-access-insights-puppet-1.0.1-1.el8sat.noarch.rpmrubygem-algebrick-0.7.3-8.el8sat.noarch.rpmrubygem-ansi-1.5.0-3.el8sat.noarch.rpmrubygem-apipie-params-0.0.5-5.1.el8sat.noarch.rpmrubygem-bundler_ext-0.4.1-6.el8sat.noarch.rpmrubygem-clamp-1.1.2-7.el8sat.noarch.rpmrubygem-concurrent-ruby-1.1.6-3.el8sat.noarch.rpmrubygem-concurrent-ruby-edge-0.6.0-3.el8sat.noarch.rpmrubygem-domain_name-0.5.20160310-5.el8sat.noarch.rpmrubygem-dynflow-1.6.4-1.el8sat.noarch.rpmrubygem-excon-0.76.0-2.el8sat.noarch.rpmrubygem-faraday-0.17.3-2.el8sat.noarch.rpmrubygem-faraday_middleware-0.13.1-3.el8sat.noarch.rpmrubygem-fast_gettext-1.4.1-5.el8sat.noarch.rpmrubygem-foreman_maintain-1.1.8-1.el8sat.noarch.rpmrubygem-gssapi-1.2.0-8.el8sat.noarch.rpmrubygem-hashie-3.6.0-3.el8sat.noarch.rpmrubygem-highline-2.0.3-2.el8sat.noarch.rpmrubygem-http-cookie-1.0.2-5.1.el8sat.noarch.rpmrubygem-infoblox-3.0.0-4.el8sat.noarch.rpmrubygem-journald-logger-2.0.4-3.el8sat.noarch.rpmrubygem-jwt-2.2.2-2.el8sat.noarch.rpmrubygem-kafo-6.4.0-1.el8sat.noarch.rpmrubygem-kafo_parsers-1.2.1-1.el8sat.noarch.rpmrubygem-kafo_wizards-0.0.2-2.el8sat.noarch.rpmrubygem-little-plugger-1.1.4-3.el8sat.noarch.rpmrubygem-logging-2.3.0-2.el8sat.noarch.rpmrubygem-logging-journald-2.0.0-3.el8sat.noarch.rpmrubygem-mime-types-3.3.1-2.el8sat.noarch.rpmrubygem-mime-types-data-3.2018.0812-5.el8sat.noarch.rpmrubygem-mqtt-0.5.0-1.el8sat.noarch.rpmrubygem-multi_json-1.14.1-3.el8sat.noarch.rpmrubygem-multipart-post-2.0.0-3.el8sat.noarch.rpmrubygem-mustermann-1.1.1-1.el8sat.noarch.rpmrubygem-net-ssh-4.2.0-3.el8sat.noarch.rpmrubygem-net-ssh-krb-0.4.0-4.el8sat.noarch.rpmrubygem-netrc-0.11.0-6.el8sat.noarch.rpmrubygem-oauth-0.5.4-5.el8sat.noarch.rpmrubygem-openscap-0.4.9-7.el8sat.noarch.rpmrubygem-openscap_parser-1.0.2-2.el8sat.noarch.rpmrubygem-powerbar-2.0.1-3.el8sat.noarch.rpmrubygem-rack-2.2.4-1.el8sat.noarch.rpmrubygem-rack-protection-2.2.0-1.el8sat.noarch.rpmrubygem-rb-inotify-0.9.7-6.el8sat.noarch.rpmrubygem-rbnacl-4.0.2-2.el8sat.noarch.rpmrubygem-redfish_client-0.5.2-2.el8sat.noarch.rpmrubygem-rest-client-2.0.2-4.el8sat.noarch.rpmrubygem-rsec-0.4.3-5.el8sat.noarch.rpmrubygem-ruby2_keywords-0.0.4-1.el8sat.noarch.rpmrubygem-rubyipmi-0.11.0-1.el8sat.noarch.rpmrubygem-sd_notify-0.1.0-2.el8sat.noarch.rpmrubygem-sequel-5.53.0-1.el8sat.noarch.rpmrubygem-server_sent_events-0.1.2-2.el8sat.noarch.rpmrubygem-sinatra-2.2.0-1.el8sat.noarch.rpmrubygem-smart_proxy_ansible-3.4.1-2.el8sat.noarch.rpmrubygem-smart_proxy_container_gateway-1.0.6-1.el8sat.noarch.rpmrubygem-smart_proxy_dhcp_infoblox-0.0.16-7.el8sat.noarch.rpmrubygem-smart_proxy_dhcp_remote_isc-0.0.5-6.el8sat.noarch.rpmrubygem-smart_proxy_discovery-1.0.5-9.el8sat.noarch.rpmrubygem-smart_proxy_discovery_image-1.6.0-2.el8sat.noarch.rpmrubygem-smart_proxy_dns_infoblox-1.1.0-7.el8sat.noarch.rpmrubygem-smart_proxy_dynflow-0.8.2-1.el8sat.noarch.rpmrubygem-smart_proxy_dynflow_core-0.4.1-1.el8sat.noarch.rpmrubygem-smart_proxy_openscap-0.9.2-1.el8sat.noarch.rpmrubygem-smart_proxy_pulp-3.2.0-3.el8sat.noarch.rpmrubygem-smart_proxy_remote_execution_ssh-0.7.3-1.el8sat.noarch.rpmrubygem-smart_proxy_shellhooks-0.9.2-2.el8sat.noarch.rpmrubygem-statsd-instrument-2.1.4-4.el8sat.noarch.rpmrubygem-tilt-2.0.8-5.el8sat.noarch.rpmrubygem-unf-0.1.3-9.el8sat.noarch.rpmsatellite-capsule-6.12.0-4.el8sat.noarch.rpmsatellite-common-6.12.0-4.el8sat.noarch.rpmsatellite-installer-6.12.0.5-1.el8sat.noarch.rpmsatellite-maintain-0.0.1-1.el8sat.noarch.rpmx86_64:cjson-1.7.14-5.el8sat.x86_64.rpmcjson-debuginfo-1.7.14-5.el8sat.x86_64.rpmcjson-debugsource-1.7.14-5.el8sat.x86_64.rpmcreaterepo_c-0.20.1-1.el8pc.x86_64.rpmcreaterepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpmcreaterepo_c-debugsource-0.20.1-1.el8pc.x86_64.rpmcreaterepo_c-libs-0.20.1-1.el8pc.x86_64.rpmcreaterepo_c-libs-debuginfo-0.20.1-1.el8pc.x86_64.rpmdynflow-utils-1.6.3-1.el8sat.x86_64.rpmforeman-discovery-image-service-1.0.0-4.1.el8sat.x86_64.rpmforeman-discovery-image-service-tui-1.0.0-4.1.el8sat.x86_64.rpmlibcomps-0.1.18-4.el8pc.x86_64.rpmlibcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpmlibcomps-debugsource-0.1.18-4.el8pc.x86_64.rpmlibdb-cxx-5.3.28-42.el8_4.x86_64.rpmlibdb-cxx-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-debugsource-5.3.28-42.el8_4.x86_64.rpmlibdb-java-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-sql-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-sql-devel-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-tcl-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibdb-utils-debuginfo-5.3.28-42.el8_4.x86_64.rpmlibsodium-1.0.17-3.el8sat.x86_64.rpmlibsodium-debuginfo-1.0.17-3.el8sat.x86_64.rpmlibsodium-debugsource-1.0.17-3.el8sat.x86_64.rpmlibsolv-0.7.22-4.el8pc.x86_64.rpmlibsolv-debuginfo-0.7.22-4.el8pc.x86_64.rpmlibsolv-debugsource-0.7.22-4.el8pc.x86_64.rpmlibsolv-demo-debuginfo-0.7.22-4.el8pc.x86_64.rpmlibsolv-tools-debuginfo-0.7.22-4.el8pc.x86_64.rpmlibwebsockets-2.4.2-2.el8.x86_64.rpmlibwebsockets-debuginfo-2.4.2-2.el8.x86_64.rpmlibwebsockets-debugsource-2.4.2-2.el8.x86_64.rpmlibwebsockets-tests-debuginfo-2.4.2-2.el8.x86_64.rpmmosquitto-2.0.14-1.el8sat.x86_64.rpmmosquitto-debuginfo-2.0.14-1.el8sat.x86_64.rpmmosquitto-debugsource-2.0.14-1.el8sat.x86_64.rpmpulpcore-selinux-1.3.2-1.el8pc.x86_64.rpmpuppet-agent-7.12.1-1.el8sat.x86_64.rpmpython-aiohttp-debugsource-3.8.1-3.el8pc.x86_64.rpmpython-brotli-debugsource-1.0.9-2.el8pc.x86_64.rpmpython-cchardet-debugsource-2.1.7-4.el8pc.x86_64.rpmpython-cffi-debugsource-1.15.0-2.el8pc.x86_64.rpmpython-cryptography-debugsource-3.4.8-1.el8pc.x86_64.rpmpython-frozenlist-debugsource-1.3.0-2.el8pc.x86_64.rpmpython-lxml-debugsource-4.7.1-2.el8pc.x86_64.rpmpython-markupsafe-debugsource-2.0.1-3.el8pc.x86_64.rpmpython-multidict-debugsource-6.0.2-2.el8pc.x86_64.rpmpython-psutil-debugsource-5.7.2-2.el8sat.x86_64.rpmpython-psycopg2-debugsource-2.9.3-2.el8pc.x86_64.rpmpython-pycairo-debugsource-1.20.1-3.el8pc.x86_64.rpmpython-pycares-debugsource-4.1.2-2.el8pc.x86_64.rpmpython-pycryptodomex-debugsource-3.14.1-2.el8pc.x86_64.rpmpython-pygobject-debugsource-3.40.1-3.el8pc.x86_64.rpmpython-pyrsistent-debugsource-0.18.1-2.el8pc.x86_64.rpmpython-rhsm-debugsource-1.19.2-3.el8pc.x86_64.rpmpython-ruamel-yaml-clib-debugsource-0.2.6-2.el8pc.x86_64.rpmpython-yarl-debugsource-1.7.2-2.el8pc.x86_64.rpmpython2-qpid-qmf-1.39.0-7.el8amq.x86_64.rpmpython2-saslwrapper-0.22-6.el8sat.x86_64.rpmpython2-saslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpmpython3-createrepo_c-0.20.1-1.el8pc.x86_64.rpmpython3-createrepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpmpython3-libcomps-0.1.18-4.el8pc.x86_64.rpmpython3-libcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpmpython3-psutil-5.7.2-2.el8sat.x86_64.rpmpython3-psutil-debuginfo-5.7.2-2.el8sat.x86_64.rpmpython3-qpid-proton-0.33.0-4.el8.x86_64.rpmpython3-qpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpmpython3-solv-0.7.22-4.el8pc.x86_64.rpmpython3-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpmpython39-aiohttp-3.8.1-3.el8pc.x86_64.rpmpython39-aiohttp-debuginfo-3.8.1-3.el8pc.x86_64.rpmpython39-brotli-1.0.9-2.el8pc.x86_64.rpmpython39-brotli-debuginfo-1.0.9-2.el8pc.x86_64.rpmpython39-cchardet-2.1.7-4.el8pc.x86_64.rpmpython39-cchardet-debuginfo-2.1.7-4.el8pc.x86_64.rpmpython39-cffi-1.15.0-2.el8pc.x86_64.rpmpython39-cffi-debuginfo-1.15.0-2.el8pc.x86_64.rpmpython39-createrepo_c-0.20.1-1.el8pc.x86_64.rpmpython39-createrepo_c-debuginfo-0.20.1-1.el8pc.x86_64.rpmpython39-cryptography-3.4.8-1.el8pc.x86_64.rpmpython39-cryptography-debuginfo-3.4.8-1.el8pc.x86_64.rpmpython39-frozenlist-1.3.0-2.el8pc.x86_64.rpmpython39-frozenlist-debuginfo-1.3.0-2.el8pc.x86_64.rpmpython39-libcomps-0.1.18-4.el8pc.x86_64.rpmpython39-libcomps-debuginfo-0.1.18-4.el8pc.x86_64.rpmpython39-lxml-4.7.1-2.el8pc.x86_64.rpmpython39-lxml-debuginfo-4.7.1-2.el8pc.x86_64.rpmpython39-markupsafe-2.0.1-3.el8pc.x86_64.rpmpython39-markupsafe-debuginfo-2.0.1-3.el8pc.x86_64.rpmpython39-multidict-6.0.2-2.el8pc.x86_64.rpmpython39-multidict-debuginfo-6.0.2-2.el8pc.x86_64.rpmpython39-psycopg2-2.9.3-2.el8pc.x86_64.rpmpython39-psycopg2-debuginfo-2.9.3-2.el8pc.x86_64.rpmpython39-pycairo-1.20.1-3.el8pc.x86_64.rpmpython39-pycairo-debuginfo-1.20.1-3.el8pc.x86_64.rpmpython39-pycares-4.1.2-2.el8pc.x86_64.rpmpython39-pycares-debuginfo-4.1.2-2.el8pc.x86_64.rpmpython39-pycryptodomex-3.14.1-2.el8pc.x86_64.rpmpython39-pycryptodomex-debuginfo-3.14.1-2.el8pc.x86_64.rpmpython39-pygobject-3.40.1-3.el8pc.x86_64.rpmpython39-pygobject-debuginfo-3.40.1-3.el8pc.x86_64.rpmpython39-pyrsistent-0.18.1-2.el8pc.x86_64.rpmpython39-pyrsistent-debuginfo-0.18.1-2.el8pc.x86_64.rpmpython39-pyyaml-5.4.1-4.el8pc.x86_64.rpmpython39-rhsm-1.19.2-3.el8pc.x86_64.rpmpython39-rhsm-debuginfo-1.19.2-3.el8pc.x86_64.rpmpython39-ruamel-yaml-clib-0.2.6-2.el8pc.x86_64.rpmpython39-ruamel-yaml-clib-debuginfo-0.2.6-2.el8pc.x86_64.rpmpython39-solv-0.7.22-4.el8pc.x86_64.rpmpython39-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpmpython39-yarl-1.7.2-2.el8pc.x86_64.rpmpython39-yarl-debuginfo-1.7.2-2.el8pc.x86_64.rpmqpid-cpp-client-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-client-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-client-devel-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-client-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-debugsource-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-ha-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-linearstore-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-linearstore-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-cpp-server-rdma-debuginfo-1.39.0-7.el8amq.x86_64.rpmqpid-dispatch-debugsource-1.14.0-6.el8.x86_64.rpmqpid-dispatch-router-1.14.0-6.el8.x86_64.rpmqpid-dispatch-router-debuginfo-1.14.0-6.el8.x86_64.rpmqpid-proton-c-0.33.0-4.el8.x86_64.rpmqpid-proton-c-debuginfo-0.33.0-4.el8.x86_64.rpmqpid-proton-cpp-debuginfo-0.33.0-4.el8.x86_64.rpmqpid-proton-debuginfo-0.33.0-4.el8.x86_64.rpmqpid-proton-debugsource-0.33.0-4.el8.x86_64.rpmqpid-qmf-1.39.0-7.el8amq.x86_64.rpmqpid-qmf-debuginfo-1.39.0-7.el8amq.x86_64.rpmruby-solv-debuginfo-0.7.22-4.el8pc.x86_64.rpmrubygem-ffi-1.12.2-2.1.el8sat.x86_64.rpmrubygem-ffi-debuginfo-1.12.2-2.1.el8sat.x86_64.rpmrubygem-ffi-debugsource-1.12.2-2.1.el8sat.x86_64.rpmrubygem-journald-native-1.0.11-4.1.el8sat.x86_64.rpmrubygem-journald-native-debuginfo-1.0.11-4.1.el8sat.x86_64.rpmrubygem-journald-native-debugsource-1.0.11-4.1.el8sat.x86_64.rpmrubygem-msgpack-1.3.3-2.1.el8sat.x86_64.rpmrubygem-msgpack-debuginfo-1.3.3-2.1.el8sat.x86_64.rpmrubygem-msgpack-debugsource-1.3.3-2.1.el8sat.x86_64.rpmrubygem-newt-0.9.7-3.1.el8sat.x86_64.rpmrubygem-newt-debuginfo-0.9.7-3.1.el8sat.x86_64.rpmrubygem-newt-debugsource-0.9.7-3.1.el8sat.x86_64.rpmrubygem-nokogiri-1.13.8-1.el8sat.x86_64.rpmrubygem-nokogiri-debuginfo-1.13.8-1.el8sat.x86_64.rpmrubygem-nokogiri-debugsource-1.13.8-1.el8sat.x86_64.rpmrubygem-qpid_proton-debuginfo-0.33.0-4.el8.x86_64.rpmrubygem-rkerberos-0.1.5-20.1.el8sat.x86_64.rpmrubygem-rkerberos-debuginfo-0.1.5-20.1.el8sat.x86_64.rpmrubygem-rkerberos-debugsource-0.1.5-20.1.el8sat.x86_64.rpmrubygem-ruby-libvirt-0.7.1-2.1.el8sat.x86_64.rpmrubygem-ruby-libvirt-debuginfo-0.7.1-2.1.el8sat.x86_64.rpmrubygem-ruby-libvirt-debugsource-0.7.1-2.1.el8sat.x86_64.rpmrubygem-sqlite3-1.4.2-1.el8sat.x86_64.rpmrubygem-sqlite3-debuginfo-1.4.2-1.el8sat.x86_64.rpmrubygem-sqlite3-debugsource-1.4.2-1.el8sat.x86_64.rpmrubygem-unf_ext-0.0.7.2-4.1.el8sat.x86_64.rpmrubygem-unf_ext-debuginfo-0.0.7.2-4.1.el8sat.x86_64.rpmrubygem-unf_ext-debugsource-0.0.7.2-4.1.el8sat.x86_64.rpmsaslwrapper-0.22-6.el8sat.x86_64.rpmsaslwrapper-debuginfo-0.22-6.el8sat.x86_64.rpmsaslwrapper-debugsource-0.22-6.el8sat.x86_64.rpmRed Hat Satellite 6.12 for RHEL 8:Source:rubygem-clamp-1.1.2-7.el8sat.src.rpmrubygem-foreman_maintain-1.1.8-1.el8sat.src.rpmrubygem-highline-2.0.3-2.el8sat.src.rpmsatellite-clone-3.2.0-1.el8sat.src.rpmsatellite-maintain-0.0.1-1.el8sat.src.rpmnoarch:rubygem-clamp-1.1.2-7.el8sat.noarch.rpmrubygem-foreman_maintain-1.1.8-1.el8sat.noarch.rpmrubygem-highline-2.0.3-2.el8sat.noarch.rpmsatellite-clone-3.2.0-1.el8sat.noarch.rpmsatellite-maintain-0.0.1-1.el8sat.noarch.rpmRed Hat Satellite 6.12 for RHEL 8:Source:foreman-3.3.0.17-1.el8sat.src.rpmpython-pulp_manifest-3.0.0-3.el8pc.src.rpmrubygem-amazing_print-1.1.0-2.el8sat.src.rpmrubygem-apipie-bindings-0.5.0-1.el8sat.src.rpmrubygem-clamp-1.1.2-7.el8sat.src.rpmrubygem-domain_name-0.5.20160310-5.el8sat.src.rpmrubygem-fast_gettext-1.4.1-5.el8sat.src.rpmrubygem-ffi-1.12.2-2.1.el8sat.src.rpmrubygem-gssapi-1.2.0-8.el8sat.src.rpmrubygem-hammer_cli-3.3.0-1.el8sat.src.rpmrubygem-hammer_cli_foreman-3.3.0.1-1.el8sat.src.rpmrubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.src.rpmrubygem-hammer_cli_foreman_ansible-0.3.4-1.el8sat.src.rpmrubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.src.rpmrubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el8sat.src.rpmrubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.src.rpmrubygem-hammer_cli_foreman_openscap-0.1.13-1.el8sat.src.rpmrubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.src.rpmrubygem-hammer_cli_foreman_tasks-0.0.18-1.el8sat.src.rpmrubygem-hammer_cli_foreman_templates-0.2.0-2.el8sat.src.rpmrubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el8sat.src.rpmrubygem-hammer_cli_foreman_webhooks-0.0.3-1.el8sat.src.rpmrubygem-hammer_cli_katello-1.6.0.1-1.el8sat.src.rpmrubygem-hashie-3.6.0-3.el8sat.src.rpmrubygem-highline-2.0.3-2.el8sat.src.rpmrubygem-http-cookie-1.0.2-5.1.el8sat.src.rpmrubygem-jwt-2.2.2-2.el8sat.src.rpmrubygem-little-plugger-1.1.4-3.el8sat.src.rpmrubygem-locale-2.0.9-15.el8sat.src.rpmrubygem-logging-2.3.0-2.el8sat.src.rpmrubygem-mime-types-3.3.1-2.el8sat.src.rpmrubygem-mime-types-data-3.2018.0812-5.el8sat.src.rpmrubygem-multi_json-1.14.1-3.el8sat.src.rpmrubygem-netrc-0.11.0-6.el8sat.src.rpmrubygem-oauth-0.5.4-5.el8sat.src.rpmrubygem-powerbar-2.0.1-3.el8sat.src.rpmrubygem-rest-client-2.0.2-4.el8sat.src.rpmrubygem-unf-0.1.3-9.el8sat.src.rpmrubygem-unf_ext-0.0.7.2-4.1.el8sat.src.rpmrubygem-unicode-0.4.4.4-4.1.el8sat.src.rpmrubygem-unicode-display_width-1.7.0-2.el8sat.src.rpmsatellite-6.12.0-4.el8sat.src.rpmnoarch:foreman-cli-3.3.0.17-1.el8sat.noarch.rpmpython39-pulp_manifest-3.0.0-3.el8pc.noarch.rpmrubygem-amazing_print-1.1.0-2.el8sat.noarch.rpmrubygem-apipie-bindings-0.5.0-1.el8sat.noarch.rpmrubygem-clamp-1.1.2-7.el8sat.noarch.rpmrubygem-domain_name-0.5.20160310-5.el8sat.noarch.rpmrubygem-fast_gettext-1.4.1-5.el8sat.noarch.rpmrubygem-gssapi-1.2.0-8.el8sat.noarch.rpmrubygem-hammer_cli-3.3.0-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman-3.3.0.1-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_admin-1.1.0-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_ansible-0.3.4-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_azure_rm-0.2.2-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_bootdisk-0.3.0-2.el8sat.noarch.rpmrubygem-hammer_cli_foreman_discovery-1.1.0-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_openscap-0.1.13-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_remote_execution-0.2.2-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_tasks-0.0.18-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_templates-0.2.0-2.el8sat.noarch.rpmrubygem-hammer_cli_foreman_virt_who_configure-0.0.9-1.el8sat.noarch.rpmrubygem-hammer_cli_foreman_webhooks-0.0.3-1.el8sat.noarch.rpmrubygem-hammer_cli_katello-1.6.0.1-1.el8sat.noarch.rpmrubygem-hashie-3.6.0-3.el8sat.noarch.rpmrubygem-highline-2.0.3-2.el8sat.noarch.rpmrubygem-http-cookie-1.0.2-5.1.el8sat.noarch.rpmrubygem-jwt-2.2.2-2.el8sat.noarch.rpmrubygem-little-plugger-1.1.4-3.el8sat.noarch.rpmrubygem-locale-2.0.9-15.el8sat.noarch.rpmrubygem-logging-2.3.0-2.el8sat.noarch.rpmrubygem-mime-types-3.3.1-2.el8sat.noarch.rpmrubygem-mime-types-data-3.2018.0812-5.el8sat.noarch.rpmrubygem-multi_json-1.14.1-3.el8sat.noarch.rpmrubygem-netrc-0.11.0-6.el8sat.noarch.rpmrubygem-oauth-0.5.4-5.el8sat.noarch.rpmrubygem-powerbar-2.0.1-3.el8sat.noarch.rpmrubygem-rest-client-2.0.2-4.el8sat.noarch.rpmrubygem-unf-0.1.3-9.el8sat.noarch.rpmrubygem-unicode-display_width-1.7.0-2.el8sat.noarch.rpmsatellite-cli-6.12.0-4.el8sat.noarch.rpmx86_64:rubygem-ffi-1.12.2-2.1.el8sat.x86_64.rpmrubygem-ffi-debuginfo-1.12.2-2.1.el8sat.x86_64.rpmrubygem-ffi-debugsource-1.12.2-2.1.el8sat.x86_64.rpmrubygem-unf_ext-0.0.7.2-4.1.el8sat.x86_64.rpmrubygem-unf_ext-debuginfo-0.0.7.2-4.1.el8sat.x86_64.rpmrubygem-unf_ext-debugsource-0.0.7.2-4.1.el8sat.x86_64.rpmrubygem-unicode-0.4.4.4-4.1.el8sat.x86_64.rpmrubygem-unicode-debuginfo-0.4.4.4-4.1.el8sat.x86_64.rpmrubygem-unicode-debugsource-0.4.4.4-4.1.el8sat.x86_64.rpmThese packages are GPG signed by Red Hat for security.  Our key anddetails on how to verify the signature are available fromhttps://access.redhat.com/security/team/key/7. References:https://access.redhat.com/security/cve/CVE-2021-37136https://access.redhat.com/security/cve/CVE-2021-37137https://access.redhat.com/security/cve/CVE-2022-22818https://access.redhat.com/security/cve/CVE-2022-24836https://access.redhat.com/security/cve/CVE-2022-25648https://access.redhat.com/security/cve/CVE-2022-29970https://access.redhat.com/security/cve/CVE-2022-32209https://access.redhat.com/security/cve/CVE-2022-34265https://access.redhat.com/security/updates/classification/#important8. Contact:The Red Hat security contact is <[email protected]>. More contactdetails at https://access.redhat.com/security/team/contact/Copyright 2022 Red Hat, Inc.-----BEGIN PGP SIGNATURE-----Version: GnuPG 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vlQq-----END PGP SIGNATURE-------RHSA-announce mailing [email protected]://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

RHSA-2023:5165: Red Hat Security Advisory: Red Hat AMQ Streams 2.5.0 release and security update

Red Hat AMQ Streams 2.5.0 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: A flaw was found in Netty's netty-codec due to size restrictions for decompressed data in the Bzip2Decoder. By sending a specially-crafted input, a remote attacker could cause a denial of service. * CVE-2021-37137: A flaw was found in the Netty's netty-codec due to unrestricted chunk lengths in the SnappyFrameDecoder. By sending a speciall...

RHSA-2023:3223: Red Hat Security Advisory: Red Hat AMQ Streams 2.4.0 release and security update

Red Hat AMQ Streams 2.4.0 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: A flaw was found in the Jackson Databind package. This cause of the issue is due to a Java StackOverflow exception and a denial of service via a significant depth of nested objects. * CVE-2021-0341: In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used cryp...

CVE-2023-21954: Oracle Critical Patch Update Advisory - April 2023

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...

CVE-2023-28069: DSA-2022-258: Dell Streaming Data Platform Security Update for Multiple Third-Party Component Vulnerabilities

Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.

Debian Security Advisory 5316-1

Debian Linux Security Advisory 5316-1 - Several out-of-memory, stack overflow or HTTP request smuggling vulnerabilities have been discovered in Netty, a Java NIO client/server socket framework, which may allow attackers to cause a denial of service or bypass restrictions when used as a proxy.

Apple Security Advisory 2022-12-13-4

Apple Security Advisory 2022-12-13-4 - macOS Ventura 13.1 addresses bypass, code execution, out of bounds access, out of bounds write, spoofing, and use-after-free vulnerabilities.

CVE-2022-46701: About the security content of macOS Ventura 13.1

The issue was addressed with improved bounds checks. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, tvOS 16.2. Connecting to a malicious NFS server may lead to arbitrary code execution with kernel privileges.

CVE-2022-23520: Possible XSS vulnerability with certain configurations of rails-html-sanitizer

rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both "select" and "style" elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version 1.4.4. All users overriding the allowed tags to include both "select" and "style" should either upgrade or use this workaround: Remove either "select" or "style" from the overridden allowed tags. NOTE: Code is _not_ impacted if allowed tags are overridden using either the :tags option to the Action View helper method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize.

Red Hat Security Advisory 2022-8853-01

Red Hat Security Advisory 2022-8853-01 - An update for python-django20 is now available for Red Hat OpenStack Platform 16.2.4 (Train) for Red Hat Enterprise Linux (RHEL) 8.4. Issues addressed include cross site scripting and denial of service vulnerabilities.

Red Hat Security Advisory 2022-8872-01

Red Hat Security Advisory 2022-8872-01 - An update for python-django20 is now available for Red Hat OpenStack Platform 16.1.9 (Train) for Red Hat Enterprise Linux (RHEL) 8.2. Issues addressed include cross site scripting, denial of service, remote shell upload, and remote SQL injection vulnerabilities.

RHSA-2022:8872: Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-django20) security update

An update for python-django20 is now available for Red Hat OpenStack Platform 16.1.9 (Train) for Red Hat Enterprise Linux (RHEL) 8.2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-22818: django: Possible XSS via '{% debug %}' template tag * CVE-2022-23833: django: Denial-of-service possibility in file uploads * CVE-2022-28346: Django: SQL injection in QuerySet.annotate(),aggregate() and extra()

RHSA-2022:8853: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-django20) security update

An update for python-django20 is now available for Red Hat OpenStack Platform 16.2.4 (Train) for Red Hat Enterprise Linux (RHEL) 8.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-22818: django: Possible XSS via '{% debug %}' template tag * CVE-2022-23833: django: Denial-of-service possibility in file uploads

RHSA-2022:8506: Red Hat Security Advisory: Satellite 6.12 Release

An update is now available for Red Hat Satellite 6.12. The release contains a new version of Satellite and important security fixes for various components.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2022-22818: django: Possible XSS via '{% debug %}' template tag * CVE-2022-24836: nokogiri: ReDoS in HTML encoding detection * CVE-2022-25648: ruby-git: package vulnerable to Command Injection via git argument injection * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when servin...

RHSA-2022:8506: Red Hat Security Advisory: Satellite 6.12 Release

An update is now available for Red Hat Satellite 6.12. The release contains a new version of Satellite and important security fixes for various components.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2022-22818: django: Possible XSS via '{% debug %}' template tag * CVE-2022-24836: nokogiri: ReDoS in HTML encoding detection * CVE-2022-25648: ruby-git: package vulnerable to Command Injection via git argument injection * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when servin...

RHSA-2022:8506: Red Hat Security Advisory: Satellite 6.12 Release

An update is now available for Red Hat Satellite 6.12. The release contains a new version of Satellite and important security fixes for various components.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2022-22818: django: Possible XSS via '{% debug %}' template tag * CVE-2022-24836: nokogiri: ReDoS in HTML encoding detection * CVE-2022-25648: ruby-git: package vulnerable to Command Injection via git argument injection * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when servin...

RHSA-2022:8506: Red Hat Security Advisory: Satellite 6.12 Release

An update is now available for Red Hat Satellite 6.12. The release contains a new version of Satellite and important security fixes for various components.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2022-22818: django: Possible XSS via '{% debug %}' template tag * CVE-2022-24836: nokogiri: ReDoS in HTML encoding detection * CVE-2022-25648: ruby-git: package vulnerable to Command Injection via git argument injection * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when servin...

RHSA-2022:8506: Red Hat Security Advisory: Satellite 6.12 Release

An update is now available for Red Hat Satellite 6.12. The release contains a new version of Satellite and important security fixes for various components.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2022-22818: django: Possible XSS via '{% debug %}' template tag * CVE-2022-24836: nokogiri: ReDoS in HTML encoding detection * CVE-2022-25648: ruby-git: package vulnerable to Command Injection via git argument injection * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when servin...

RHSA-2022:8506: Red Hat Security Advisory: Satellite 6.12 Release

An update is now available for Red Hat Satellite 6.12. The release contains a new version of Satellite and important security fixes for various components.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2022-22818: django: Possible XSS via '{% debug %}' template tag * CVE-2022-24836: nokogiri: ReDoS in HTML encoding detection * CVE-2022-25648: ruby-git: package vulnerable to Command Injection via git argument injection * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when servin...

RHSA-2022:8506: Red Hat Security Advisory: Satellite 6.12 Release

An update is now available for Red Hat Satellite 6.12. The release contains a new version of Satellite and important security fixes for various components.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2022-22818: django: Possible XSS via '{% debug %}' template tag * CVE-2022-24836: nokogiri: ReDoS in HTML encoding detection * CVE-2022-25648: ruby-git: package vulnerable to Command Injection via git argument injection * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when servin...

RHSA-2022:8506: Red Hat Security Advisory: Satellite 6.12 Release

An update is now available for Red Hat Satellite 6.12. The release contains a new version of Satellite and important security fixes for various components.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2022-22818: django: Possible XSS via '{% debug %}' template tag * CVE-2022-24836: nokogiri: ReDoS in HTML encoding detection * CVE-2022-25648: ruby-git: package vulnerable to Command Injection via git argument injection * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when servin...

Red Hat Security Advisory 2022-6835-01

Red Hat Security Advisory 2022-6835-01 - This release of Red Hat Integration - Service registry 2.3.0.GA serves as a replacement for 2.0.3.GA, and includes the below security fixes. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and privilege escalation vulnerabilities.

Red Hat Security Advisory 2022-6835-01

Red Hat Security Advisory 2022-6835-01 - This release of Red Hat Integration - Service registry 2.3.0.GA serves as a replacement for 2.0.3.GA, and includes the below security fixes. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and privilege escalation vulnerabilities.

RHSA-2022:6835: Red Hat Security Advisory: Service Registry (container images) release and security update [2.3.0.GA]

An update to the images for Red Hat Integration Service Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-22569: protobuf-java: potential DoS in the parsing procedure for binary data * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: net...

RHSA-2022:6835: Red Hat Security Advisory: Service Registry (container images) release and security update [2.3.0.GA]

An update to the images for Red Hat Integration Service Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-22569: protobuf-java: potential DoS in the parsing procedure for binary data * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: net...

Gentoo Linux Security Advisory 202208-29

Gentoo Linux Security Advisory 202208-29 - Multiple vulnerabilities have been discovered in Nokogiri, the worst of which could result in denial of service. Versions less than 1.13.6 are affected.

Red Hat Security Advisory 2022-5903-01

Red Hat Security Advisory 2022-5903-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This asynchronous security patch is an update to Red Hat Process Automation Manager 7. Issues addressed include HTTP request smuggling, denial of service, and deserialization vulnerabilities.

Red Hat Security Advisory 2022-5903-01

Red Hat Security Advisory 2022-5903-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This asynchronous security patch is an update to Red Hat Process Automation Manager 7. Issues addressed include HTTP request smuggling, denial of service, and deserialization vulnerabilities.

RHSA-2022:5903: Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.0 security update

An update is now available for Red Hat Process Automation Manager. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-2471: mysql-connector-java: unauthorized access to critical * CVE-2021-3642: wildfly-elytron: possible timing attack in ScramServer * CVE-2021-3644: wildfly-core: Invalid Sensitivity Classification of Vault Expression * CVE-2021-3717: wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users * CVE-2021-22569: protobu...

RHSA-2022:5903: Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.0 security update

An update is now available for Red Hat Process Automation Manager. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-2471: mysql-connector-java: unauthorized access to critical * CVE-2021-3642: wildfly-elytron: possible timing attack in ScramServer * CVE-2021-3644: wildfly-core: Invalid Sensitivity Classification of Vault Expression * CVE-2021-3717: wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users * CVE-2021-22569: protobu...

RHSA-2022:5738: Red Hat Security Advisory: Django 3.2.14 Security Update

A security fix for a CVE in the Django library is now available.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-34265: python-django: Potential SQL injection via Trunc(kind) and Extract(lookup_name) arguments

CVE-2022-21586: Oracle Critical Patch Update Advisory - July 2022

Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).

CVE-2022-21586: Oracle Critical Patch Update Advisory - July 2022

Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).

Red Hat Security Advisory 2022-5498-01

Red Hat Security Advisory 2022-5498-01 - Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool. Issues addressed include HTTP request smuggling, buffer overflow, bypass, code execution, cross site scripting, denial of service, heap overflow, information leakage, privilege escalation, remote shell upload, remote SQL injection, and traversal vulnerabilities.

RHSA-2022:5498: Red Hat Security Advisory: Satellite 6.11 Release

An update is now available for Red Hat Satellite 6.11This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3200: libsolv: heap-based buffer overflow in testcase_read() in src/testcase.c * CVE-2021-3584: foreman: Authenticate remote code execution through Sendmail configuration * CVE-2021-4142: Satellite: Allow unintended SCA certificate to authenticate Candlepin * CVE-2021-21290: netty: Information disclosure via the local system temporary directory * CVE-2021-21295: netty: possible request smuggling in HTTP/2 due missing validation * CVE-2021-21409: netty: Request smuggling via content-length header * CVE-2021-30151: sidekiq: XSS via the queue name of the live-poll feature * CVE-2021-32839: python-sqlparse: ReDoS via regular expression i...

GHSA-p64x-8rxx-wf6q: SQL Injection in Django

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

CVE-2022-34265: Django security releases issued: 4.0.6 and 3.2.14 | Weblog

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.

Ubuntu Security Notice USN-5501-1

Ubuntu Security Notice 5501-1 - It was discovered that Django incorrectly handled certain SQL. An attacker could possibly use this issue to expose sensitive information.

GHSA-pg8v-g4xq-hww9: Rails::Html::Sanitizer vulnerable to Cross-site Scripting

Versions of Rails::Html::Sanitizer prior to version 1.4.3 are vulnerable to XSS with certain configurations of Rails::Html::Sanitizer which allows an attacker to inject content when the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements. Code is only impacted if allowed tags are being overridden. This may be done via application configuration: ```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]``` see https://guides.rubyonrails.org/configuring.html#configuring-action-view Or it may be done with a `:tags` option to the Action View helper `sanitize`: ```<%= sanitize @comment.body, tags: ["select", "style"] %>``` see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize It may also be done with Rails::Html::SafeListSanitizer directly: ```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]``` or with ...

CVE-2022-32209

# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```<%= sanitize @comment.body, tags: ["select", "style"] %>```see https://api.rubyonrails.org/classes/ActionView/H...

Red Hat Security Advisory 2022-4587-01

Red Hat Security Advisory 2022-4587-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a traversal vulnerability.

Red Hat Security Advisory 2022-4661-01

Red Hat Security Advisory 2022-4661-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a traversal vulnerability.

RHSA-2022:4661: Red Hat Security Advisory: pcs security update

An update for pcs is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when serving static files

Red Hat Security Advisory 2022-2253-01

Red Hat Security Advisory 2022-2253-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a traversal vulnerability.

Red Hat Security Advisory 2022-2255-01

Red Hat Security Advisory 2022-2255-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a traversal vulnerability.

RHSA-2022:2256: Red Hat Security Advisory: pcs security update

An update for pcs is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when serving static files

RHSA-2022:2255: Red Hat Security Advisory: pcs security update

An update for pcs is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-29970: sinatra: path traversal possible outside of public_dir when serving static files

Red Hat Security Advisory 2022-2216-01

Red Hat Security Advisory 2022-2216-01 - Logging Subsystem 5.4.1 - Red Hat OpenShift. Issues addressed include HTTP request smuggling and denial of service vulnerabilities.

Red Hat Security Advisory 2022-2216-01

Red Hat Security Advisory 2022-2216-01 - Logging Subsystem 5.4.1 - Red Hat OpenShift. Issues addressed include HTTP request smuggling and denial of service vulnerabilities.

RHSA-2022:2216: Red Hat Security Advisory: Red Hat OpenShift Logging Security and Bug update Release 5.4.1

Logging Subsystem 5.4.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-21698: prometheus/client_golang: Denial of service u...

RHSA-2022:2216: Red Hat Security Advisory: Red Hat OpenShift Logging Security and Bug update Release 5.4.1

Logging Subsystem 5.4.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-21698: prometheus/client_golang: Denial of service u...

GHSA-qp49-3pvw-x4m5: sinatra does not validate expanded path matches

Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files.

CVE-2022-29970: Validate expanded path matches public_dir when serving static files by cji-stripe · Pull Request #1683 · sinatra/sinatra

Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files.

CVE-2022-21496: Oracle Critical Patch Update Advisory - April 2022

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...

CVE-2022-21496: Oracle Critical Patch Update Advisory - April 2022

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...

CVE-2022-25648: Snyk Vulnerability Database | Snyk

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

CVE-2022-24836: Inefficient Regular Expression Complexity in Nokogiri

Nokogiri is an open source XML and HTML library for Ruby. Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. Users are advised to upgrade to Nokogiri `>= 1.13.4`. There are no known workarounds for this issue.

CVE-2022-21363: Oracle Critical Patch Update Advisory - January 2022

Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).

CVE-2022-21363: Oracle Critical Patch Update Advisory - January 2022

Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).

Packet Storm: Latest News

Microsoft Windows TOCTOU Local Privilege Escalation