Vulnerabilities > CVE-2016-6346 - Denial of Service vulnerability in RedHat RESTEasy

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
redhat
nessus

Summary

RESTEasy enables GZIPInterceptor, which allows remote attackers to cause a denial of service via unspecified vectors.

Vulnerable Configurations

Part Description Count
Application
Redhat
1

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-0004.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 7.0 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.0.9 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.8, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was found that Apache Lucene would accept an object from an unauthenticated user that could be manipulated through subsequent post requests. An attacker could use this flaw to assemble an object that could permit execution of arbitrary code if the server enabled Apache Solr
    last seen2020-06-01
    modified2020-06-02
    plugin id105560
    published2018-01-04
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/105560
    titleRHEL 7 : JBoss EAP (RHSA-2018:0004)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2018:0004. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(105560);
      script_version("3.14");
      script_cvs_date("Date: 2019/10/24 15:35:44");
    
      script_cve_id("CVE-2016-6346", "CVE-2017-12165", "CVE-2017-12167", "CVE-2017-12189", "CVE-2017-12629", "CVE-2017-7559", "CVE-2017-7561");
      script_xref(name:"RHSA", value:"2018:0004");
      script_xref(name:"IAVA", value:"2017-A-0319");
    
      script_name(english:"RHEL 7 : JBoss EAP (RHSA-2018:0004)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update is now available for Red Hat JBoss Enterprise Application
    Platform 7.0 for Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Important. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Red Hat JBoss Enterprise Application Platform is a platform for Java
    applications based on the JBoss Application Server.
    
    This release of Red Hat JBoss Enterprise Application Platform 7.0.9
    serves as a replacement for Red Hat JBoss Enterprise Application
    Platform 7.0.8, and includes bug fixes and enhancements, which are
    documented in the Release Notes document linked to in the References.
    
    Security Fix(es) :
    
    * It was found that Apache Lucene would accept an object from an
    unauthenticated user that could be manipulated through subsequent post
    requests. An attacker could use this flaw to assemble an object that
    could permit execution of arbitrary code if the server enabled Apache
    Solr's Config API. (CVE-2017-12629)
    
    * It was discovered that the jboss init script performed unsafe file
    handling which could result in local privilege escalation.
    (CVE-2017-12189)
    
    * It was found that GZIPInterceptor is enabled when not necessarily
    required in RESTEasy. An attacker could use this flaw to launch a
    Denial of Service attack. (CVE-2016-6346)
    
    * It was found that the fix for CVE-2017-2666 was incomplete and
    invalid characters are still allowed in the query string and path
    parameters. This could be exploited, in conjunction with a proxy that
    also permitted the invalid characters but with a different
    interpretation, to inject data into the HTTP response. By manipulating
    the HTTP response the attacker could poison a web-cache, perform an
    XSS attack, or obtain sensitive information from requests other than
    their own. (CVE-2017-7559)
    
    * It was discovered that the CORS Filter did not add an HTTP Vary
    header indicating that the response varies depending on Origin. This
    permitted client and server side cache poisoning in some
    circumstances. (CVE-2017-7561)
    
    * It was found that properties based files of the management and the
    application realm configuration that contain user to role mapping are
    world readable allowing access to users and roles information to all
    the users logged in to the system. (CVE-2017-12167)
    
    * It was discovered that Undertow processes http request headers with
    unusual whitespaces which can cause possible http request smuggling.
    (CVE-2017-12165)
    
    Red Hat would like to thank Mikhail Egorov (Odin) for reporting
    CVE-2016-6346. The CVE-2017-7559 and CVE-2017-12165 issues were
    discovered by Stuart Douglas (Red Hat); the CVE-2017-7561 issue was
    discovered by Jason Shepherd (Red Hat Product Security); and the
    CVE-2017-12167 issue was discovered by Brian Stansberry (Red Hat) and
    Jeremy Choi (Red Hat)."
      );
      # https://access.redhat.com/documentation/en/
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/documentation/en-us/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2018:0004"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2016-6346"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-7559"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-7561"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-12165"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-12167"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-12189"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-12629"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-cli");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-commons");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-core-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-dto");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-hornetq-protocol");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-hqclient-protocol");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-jms-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-jms-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-journal");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-native");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-ra");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-selector");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-activemq-artemis-service-extensions");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-hibernate");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-core");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-entitymanager");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-envers");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-infinispan");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-java8");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-common-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-common-impl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-common-spi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-core-api");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-core-impl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-deployers-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-jdbc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-validator");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-remoting");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jboss-xnio-base");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-jgroups");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-async-http-servlet-3.0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-atom-provider");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-cdi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-crypto");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-jackson-provider");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-jackson2-provider");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-jaxb-provider");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-jaxrs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-jettison-provider");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-jose-jwt");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-jsapi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-json-p-provider");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-multipart-provider");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-spring");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-validator-provider-11");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-resteasy-yaml-provider");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-undertow");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-wildfly");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-javadocs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-modules");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2016/09/07");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/01/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/01/04");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2018:0004";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL7", rpm:"jbossas-welcome-content-eap"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "JBoss EAP");
    
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-cli-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-commons-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-core-client-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-dto-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-hornetq-protocol-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-hqclient-protocol-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-jms-client-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-jms-server-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-journal-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-native-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-ra-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-selector-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-server-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-activemq-artemis-service-extensions-1.1.0-19.SP24_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-hibernate-5.0.16-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-hibernate-core-5.0.16-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-hibernate-entitymanager-5.0.16-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-hibernate-envers-5.0.16-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-hibernate-infinispan-5.0.16-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-hibernate-java8-5.0.16-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-ironjacamar-1.3.8-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-ironjacamar-common-api-1.3.8-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-ironjacamar-common-impl-1.3.8-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-ironjacamar-common-spi-1.3.8-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-ironjacamar-core-api-1.3.8-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-ironjacamar-core-impl-1.3.8-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-ironjacamar-deployers-common-1.3.8-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-ironjacamar-jdbc-1.3.8-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-ironjacamar-validator-1.3.8-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-remoting-4.0.25-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jboss-xnio-base-3.4.7-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-jgroups-3.6.12-1.Final_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-async-http-servlet-3.0-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-atom-provider-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-cdi-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-client-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-crypto-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-jackson-provider-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-jackson2-provider-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-jaxb-provider-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-jaxrs-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-jettison-provider-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-jose-jwt-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-jsapi-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-json-p-provider-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-multipart-provider-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-spring-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-validator-provider-11-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-resteasy-yaml-provider-3.0.19-7.SP5_redhat_1.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-undertow-1.3.31-3.Final_redhat_3.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-wildfly-7.0.9-4.GA_redhat_3.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-wildfly-javadocs-7.0.9-2.GA_redhat_3.1.ep7.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"eap7-wildfly-modules-7.0.9-4.GA_redhat_3.1.ep7.el7")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "eap7-activemq-artemis / eap7-activemq-artemis-cli / etc");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-0828.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release of Red Hat JBoss Enterprise Application Platform 6.4.14 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.13, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted. (CVE-2016-8657) * It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. (CVE-2017-6056) * It was found that GZIPInterceptor is enabled when not necessarily required in RESTEasy. An attacker could use this flaw to launch a Denial of Service attack. (CVE-2016-6346) Red Hat would like to thank Mikhail Egorov (Odin) for reporting the CVE-2016-6346 issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id112253
    published2018-09-04
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/112253
    titleRHEL 7 : JBoss EAP (RHSA-2017:0828)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2017:0828. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(112253);
      script_version("1.7");
      script_cvs_date("Date: 2019/10/24 15:35:42");
    
      script_cve_id("CVE-2016-6346", "CVE-2016-8657", "CVE-2017-6056");
      script_xref(name:"RHSA", value:"2017:0828");
    
      script_name(english:"RHEL 7 : JBoss EAP (RHSA-2017:0828)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update is now available for Red Hat JBoss Enterprise Application
    Platform 6.4 for RHEL 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Important. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
    applications based on JBoss Application Server 7.
    
    This release of Red Hat JBoss Enterprise Application Platform 6.4.14
    serves as a replacement for Red Hat JBoss Enterprise Application
    Platform 6.4.13, and includes bug fixes and enhancements, which are
    documented in the Release Notes document linked to in the References.
    
    Security Fix(es) :
    
    * It was discovered that EAP packages in certain versions of Red Hat
    Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas
    configuration files. The file is writable to jboss group (root:jboss,
    664). On systems using classic /etc/init.d init scripts (i.e. on Red
    Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss
    init script and its content executed with root privileges when jboss
    service is started, stopped, or restarted. (CVE-2016-8657)
    
    * It was discovered that a programming error in the processing of
    HTTPS requests in the Apache Tomcat servlet and JSP engine may result
    in denial of service via an infinite loop. (CVE-2017-6056)
    
    * It was found that GZIPInterceptor is enabled when not necessarily
    required in RESTEasy. An attacker could use this flaw to launch a
    Denial of Service attack. (CVE-2016-6346)
    
    Red Hat would like to thank Mikhail Egorov (Odin) for reporting the
    CVE-2016-6346 issue."
      );
      # https://access.redhat.com/documentation/en/
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/documentation/en-us/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2017:0828"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2016-6346"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2016-8657"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-6056"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:apache-cxf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:hornetq");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-cachestore-jdbc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-cachestore-remote");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-client-hotrod");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-core");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-appclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-cli");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-client-all");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-clustering");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-cmp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-configadmin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-connector");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-controller-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-core-security");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-deployment-repository");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-deployment-scanner");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-domain-http");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-domain-management");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ee");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ee-deployment");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ejb3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-embedded");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-host-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jacorb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jaxr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jaxrs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jdr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jmx");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jpa");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jsf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jsr77");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-logging");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-mail");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-management-client-content");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-messaging");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-modcluster");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-naming");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-network");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi-configadmin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi-service");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-picketlink");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-platform-mbean");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-pojo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-process-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-protocol");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-remoting");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-sar");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-security");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-system-jmx");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-threads");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-transactions");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-version");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-web");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-webservices");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-weld");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-xts");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-modules");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-msc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-remoting3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-appclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-bundles");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-core");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-domain");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-javadocs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-modules-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-product-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-standalone");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-welcome-content-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossts");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossweb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:picketbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:resteasy");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:weld-core");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2016/09/07");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/03/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/09/04");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2017:0828";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL7", rpm:"jbossas-welcome-content-eap"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "JBoss EAP");
    
      if (rpm_check(release:"RHEL7", reference:"apache-cxf-2.7.18-6.SP5_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"hornetq-2.3.25-19.SP17_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"infinispan-5.2.21-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"infinispan-cachestore-jdbc-5.2.21-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"infinispan-cachestore-remote-5.2.21-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"infinispan-client-hotrod-5.2.21-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"infinispan-core-5.2.21-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-appclient-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-cli-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-client-all-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-clustering-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-cmp-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-configadmin-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-connector-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-controller-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-controller-client-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-core-security-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-deployment-repository-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-deployment-scanner-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-domain-http-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-domain-management-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-ee-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-ee-deployment-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-ejb3-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-embedded-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-host-controller-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jacorb-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jaxr-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jaxrs-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jdr-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jmx-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jpa-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jsf-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-jsr77-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-logging-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-mail-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-management-client-content-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-messaging-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-modcluster-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-naming-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-network-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-osgi-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-osgi-configadmin-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-osgi-service-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-picketlink-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-platform-mbean-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-pojo-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-process-controller-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-protocol-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-remoting-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-sar-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-security-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-server-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-system-jmx-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-threads-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-transactions-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-version-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-web-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-webservices-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-weld-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-as-xts-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-modules-1.3.8-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-msc-1.1.7-1.SP1_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jboss-remoting3-3.3.9-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-appclient-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-bundles-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-core-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-domain-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-javadocs-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-modules-eap-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-product-eap-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-standalone-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossas-welcome-content-eap-7.5.14-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossts-4.17.39-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"jbossweb-7.5.21-2.Final_redhat_2.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"picketbox-4.1.4-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"resteasy-2.3.17-1.Final_redhat_1.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"weld-core-1.1.34-1.Final_redhat_1.1.ep6.el7")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "apache-cxf / hornetq / infinispan / infinispan-cachestore-jdbc / etc");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-0827.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release of Red Hat JBoss Enterprise Application Platform 6.4.14 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.13, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted. (CVE-2016-8657) * It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. (CVE-2017-6056) * It was found that GZIPInterceptor is enabled when not necessarily required in RESTEasy. An attacker could use this flaw to launch a Denial of Service attack. (CVE-2016-6346) Red Hat would like to thank Mikhail Egorov (Odin) for reporting the CVE-2016-6346 issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id97933
    published2017-03-24
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97933
    titleRHEL 6 : JBoss EAP (RHSA-2017:0827)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2017:0827. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(97933);
      script_version("3.10");
      script_cvs_date("Date: 2019/10/24 15:35:42");
    
      script_cve_id("CVE-2016-6346", "CVE-2016-8657", "CVE-2017-6056");
      script_xref(name:"RHSA", value:"2017:0827");
    
      script_name(english:"RHEL 6 : JBoss EAP (RHSA-2017:0827)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update is now available for Red Hat JBoss Enterprise Application
    Platform 6.4 for RHEL 6.
    
    Red Hat Product Security has rated this update as having a security
    impact of Important. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
    applications based on JBoss Application Server 7.
    
    This release of Red Hat JBoss Enterprise Application Platform 6.4.14
    serves as a replacement for Red Hat JBoss Enterprise Application
    Platform 6.4.13, and includes bug fixes and enhancements, which are
    documented in the Release Notes document linked to in the References.
    
    Security Fix(es) :
    
    * It was discovered that EAP packages in certain versions of Red Hat
    Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas
    configuration files. The file is writable to jboss group (root:jboss,
    664). On systems using classic /etc/init.d init scripts (i.e. on Red
    Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss
    init script and its content executed with root privileges when jboss
    service is started, stopped, or restarted. (CVE-2016-8657)
    
    * It was discovered that a programming error in the processing of
    HTTPS requests in the Apache Tomcat servlet and JSP engine may result
    in denial of service via an infinite loop. (CVE-2017-6056)
    
    * It was found that GZIPInterceptor is enabled when not necessarily
    required in RESTEasy. An attacker could use this flaw to launch a
    Denial of Service attack. (CVE-2016-6346)
    
    Red Hat would like to thank Mikhail Egorov (Odin) for reporting the
    CVE-2016-6346 issue."
      );
      # https://access.redhat.com/documentation/en/
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/documentation/en-us/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2017:0827"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2016-6346"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2016-8657"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2017-6056"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:apache-cxf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:hornetq");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-cachestore-jdbc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-cachestore-remote");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-client-hotrod");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:infinispan-core");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-appclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-cli");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-client-all");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-clustering");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-cmp");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-configadmin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-connector");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-controller-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-core-security");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-deployment-repository");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-deployment-scanner");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-domain-http");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-domain-management");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ee");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ee-deployment");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-ejb3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-embedded");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-host-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jacorb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jaxr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jaxrs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jdr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jmx");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jpa");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jsf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-jsr77");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-logging");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-mail");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-management-client-content");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-messaging");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-modcluster");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-naming");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-network");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi-configadmin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-osgi-service");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-picketlink");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-platform-mbean");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-pojo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-process-controller");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-protocol");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-remoting");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-sar");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-security");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-system-jmx");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-threads");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-transactions");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-version");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-web");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-webservices");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-weld");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-as-xts");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-modules");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-msc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-remoting3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-appclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-bundles");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-core");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-domain");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-javadocs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-modules-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-product-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-standalone");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossas-welcome-content-eap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossts");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jbossweb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:picketbox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:resteasy");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:weld-core");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2016/09/07");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/03/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/03/24");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2017:0827";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL6", rpm:"jbossas-welcome-content-eap"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "JBoss EAP");
    
      if (rpm_check(release:"RHEL6", reference:"apache-cxf-2.7.18-6.SP5_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"hornetq-2.3.25-19.SP17_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"infinispan-5.2.21-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"infinispan-cachestore-jdbc-5.2.21-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"infinispan-cachestore-remote-5.2.21-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"infinispan-client-hotrod-5.2.21-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"infinispan-core-5.2.21-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-appclient-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-cli-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-client-all-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-clustering-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-cmp-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-configadmin-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-connector-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-controller-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-controller-client-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-core-security-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-deployment-repository-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-deployment-scanner-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-domain-http-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-domain-management-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-ee-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-ee-deployment-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-ejb3-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-embedded-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-host-controller-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jacorb-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jaxr-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jaxrs-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jdr-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jmx-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jpa-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jsf-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-jsr77-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-logging-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-mail-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-management-client-content-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-messaging-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-modcluster-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-naming-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-network-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-osgi-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-osgi-configadmin-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-osgi-service-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-picketlink-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-platform-mbean-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-pojo-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-process-controller-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-protocol-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-remoting-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-sar-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-security-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-server-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-system-jmx-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-threads-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-transactions-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-version-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-web-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-webservices-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-weld-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-as-xts-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-modules-1.3.8-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-msc-1.1.7-1.SP1_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-remoting3-3.3.9-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-appclient-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-bundles-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-core-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-domain-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-javadocs-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-modules-eap-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-product-eap-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-standalone-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossas-welcome-content-eap-7.5.14-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossts-4.17.39-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jbossweb-7.5.21-2.Final_redhat_2.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"picketbox-4.1.4-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"resteasy-2.3.17-1.Final_redhat_1.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"weld-core-1.1.34-1.Final_redhat_1.1.ep6.el6")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "apache-cxf / hornetq / infinispan / infinispan-cachestore-jdbc / etc");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-0826.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release of Red Hat JBoss Enterprise Application Platform 6.4.14 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.13, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted. (CVE-2016-8657) * It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. (CVE-2017-6056) * It was found that GZIPInterceptor is enabled when not necessarily required in RESTEasy. An attacker could use this flaw to launch a Denial of Service attack. (CVE-2016-6346) Red Hat would like to thank Mikhail Egorov (Odin) for reporting the CVE-2016-6346 issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id97932
    published2017-03-24
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97932
    titleRHEL 5 : JBoss EAP (RHSA-2017:0826)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2017-0829.NASL
    descriptionAn update for jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). With this update, the jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.14. Security Fix(es) : * It was discovered that EAP packages in certain versions of Red Hat Enterprise Linux use incorrect permissions for /etc/sysconfig/jbossas configuration files. The file is writable to jboss group (root:jboss, 664). On systems using classic /etc/init.d init scripts (i.e. on Red Hat Enterprise Linux 6 and earlier), the file is sourced by the jboss init script and its content executed with root privileges when jboss service is started, stopped, or restarted. (CVE-2016-8657) * It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. (CVE-2017-6056) * It was found that GZIPInterceptor is enabled when not necessarily required in RESTEasy. An attacker could use this flaw to launch a Denial of Service attack. (CVE-2016-6346) Red Hat would like to thank Mikhail Egorov (Odin) for reporting the CVE-2016-6346 issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id97909
    published2017-03-23
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/97909
    titleRHEL 6 : jboss-ec2-eap (RHSA-2017:0829)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-0005.NASL
    descriptionAn update for eap7-jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 7.0 for Red Hat Enterprise Linux 6 and Red Hat JBoss Enterprise Application Platform 7.0 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The eap7-jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). With this update, the eap7-jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 7.0.9. Refer to the JBoss Enterprise Application Platform 7.0.9 Release Notes, linked to in the References section, for information on the most significant bug fixes and enhancements included in this release. Security Fix(es) : * It was found that Apache Lucene would accept an object from an unauthenticated user that could be manipulated through subsequent post requests. An attacker could use this flaw to assemble an object that could permit execution of arbitrary code if the server enabled Apache Solr
    last seen2020-06-01
    modified2020-06-02
    plugin id105522
    published2018-01-04
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/105522
    titleRHEL 6 / 7 : eap7-jboss-ec2-eap (RHSA-2018:0005)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-0002.NASL
    descriptionAn update is now available for Red Hat JBoss Enterprise Application Platform 7.0 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.0.9 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.0.8, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es) : * It was found that Apache Lucene would accept an object from an unauthenticated user that could be manipulated through subsequent post requests. An attacker could use this flaw to assemble an object that could permit execution of arbitrary code if the server enabled Apache Solr
    last seen2020-06-01
    modified2020-06-02
    plugin id105559
    published2018-01-04
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/105559
    titleRHEL 6 : JBoss EAP (RHSA-2018:0002)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1222.NASL
    descriptionRed Hat Satellite 6.5 for RHEL 7 is now available containing security fixes, bug fixes, and enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool. Security Fix(es) : * RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack (CVE-2016-6346) * pulp: Improper path parsing leads to overwriting of iso repositories (CVE-2018-10917) * foreman: Persisted XSS on all pages that use breadcrumbs (CVE-2018-14664) * foreman: stored XSS in success notification after entity creation (CVE-2018-16861) * katello: stored XSS in subscriptions and repositories pages (CVE-2018-16887) * candlepin: credentials exposure through log files (CVE-2019-3891) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id125052
    published2019-05-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125052
    titleRHEL 7 : Satellite Server (RHSA-2019:1222)

Redhat

advisories
  • rhsa
    idRHSA-2017:0517
  • rhsa
    idRHSA-2017:0826
  • rhsa
    idRHSA-2017:0827
  • rhsa
    idRHSA-2017:0828
  • rhsa
    idRHSA-2017:0829
  • rhsa
    idRHSA-2017:1675
  • rhsa
    idRHSA-2017:1676
  • rhsa
    idRHSA-2018:0002
  • rhsa
    idRHSA-2018:0003
  • rhsa
    idRHSA-2018:0004
  • rhsa
    idRHSA-2018:0005
  • rhsa
    idRHSA-2018:2143
  • rhsa
    idRHSA-2019:1222
rpms
  • apache-cxf-0:2.7.18-6.SP5_redhat_1.1.ep6.el5
  • hornetq-0:2.3.25-19.SP17_redhat_1.1.ep6.el5
  • infinispan-0:5.2.21-1.Final_redhat_1.1.ep6.el5
  • infinispan-cachestore-jdbc-0:5.2.21-1.Final_redhat_1.1.ep6.el5
  • infinispan-cachestore-remote-0:5.2.21-1.Final_redhat_1.1.ep6.el5
  • infinispan-client-hotrod-0:5.2.21-1.Final_redhat_1.1.ep6.el5
  • infinispan-core-0:5.2.21-1.Final_redhat_1.1.ep6.el5
  • jboss-as-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-cli-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-client-all-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-clustering-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-cmp-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-connector-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-controller-client-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-core-security-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-deployment-repository-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-deployment-scanner-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-domain-http-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-domain-management-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-ee-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-ee-deployment-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-ejb3-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-embedded-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-host-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jacorb-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jaxr-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jaxrs-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jdr-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jpa-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jsf-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-jsr77-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-logging-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-mail-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-management-client-content-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-messaging-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-modcluster-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-naming-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-network-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-osgi-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-osgi-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-osgi-service-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-picketlink-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-platform-mbean-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-pojo-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-process-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-protocol-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-remoting-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-sar-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-security-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-server-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-system-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-threads-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-transactions-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-version-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-web-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-webservices-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-weld-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-as-xts-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jboss-modules-0:1.3.8-1.Final_redhat_1.1.ep6.el5
  • jboss-msc-0:1.1.7-1.SP1_redhat_1.1.ep6.el5
  • jboss-remoting3-0:3.3.9-1.Final_redhat_1.1.ep6.el5
  • jbossas-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-bundles-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-core-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-domain-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-javadocs-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-modules-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-product-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-standalone-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossas-welcome-content-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el5
  • jbossts-1:4.17.39-1.Final_redhat_1.1.ep6.el5
  • jbossweb-0:7.5.21-2.Final_redhat_2.1.ep6.el5
  • picketbox-0:4.1.4-1.Final_redhat_1.1.ep6.el5
  • resteasy-0:2.3.17-1.Final_redhat_1.1.ep6.el5
  • weld-core-0:1.1.34-1.Final_redhat_1.1.ep6.el5
  • apache-cxf-0:2.7.18-6.SP5_redhat_1.1.ep6.el6
  • hornetq-0:2.3.25-19.SP17_redhat_1.1.ep6.el6
  • infinispan-0:5.2.21-1.Final_redhat_1.1.ep6.el6
  • infinispan-cachestore-jdbc-0:5.2.21-1.Final_redhat_1.1.ep6.el6
  • infinispan-cachestore-remote-0:5.2.21-1.Final_redhat_1.1.ep6.el6
  • infinispan-client-hotrod-0:5.2.21-1.Final_redhat_1.1.ep6.el6
  • infinispan-core-0:5.2.21-1.Final_redhat_1.1.ep6.el6
  • jboss-as-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-cli-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-client-all-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-clustering-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-cmp-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-connector-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-controller-client-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-core-security-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-deployment-repository-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-deployment-scanner-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-domain-http-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-domain-management-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-ee-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-ee-deployment-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-ejb3-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-embedded-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-host-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jacorb-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jaxr-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jaxrs-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jdr-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jpa-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jsf-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-jsr77-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-logging-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-mail-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-management-client-content-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-messaging-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-modcluster-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-naming-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-network-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-osgi-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-osgi-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-osgi-service-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-picketlink-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-platform-mbean-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-pojo-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-process-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-protocol-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-remoting-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-sar-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-security-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-server-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-system-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-threads-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-transactions-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-version-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-web-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-webservices-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-weld-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-as-xts-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jboss-modules-0:1.3.8-1.Final_redhat_1.1.ep6.el6
  • jboss-msc-0:1.1.7-1.SP1_redhat_1.1.ep6.el6
  • jboss-remoting3-0:3.3.9-1.Final_redhat_1.1.ep6.el6
  • jbossas-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-bundles-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-core-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-domain-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-javadocs-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-modules-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-product-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-standalone-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossas-welcome-content-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el6
  • jbossts-1:4.17.39-1.Final_redhat_1.1.ep6.el6
  • jbossweb-0:7.5.21-2.Final_redhat_2.1.ep6.el6
  • picketbox-0:4.1.4-1.Final_redhat_1.1.ep6.el6
  • resteasy-0:2.3.17-1.Final_redhat_1.1.ep6.el6
  • weld-core-0:1.1.34-1.Final_redhat_1.1.ep6.el6
  • apache-cxf-0:2.7.18-6.SP5_redhat_1.1.ep6.el7
  • hornetq-0:2.3.25-19.SP17_redhat_1.1.ep6.el7
  • infinispan-0:5.2.21-1.Final_redhat_1.1.ep6.el7
  • infinispan-cachestore-jdbc-0:5.2.21-1.Final_redhat_1.1.ep6.el7
  • infinispan-cachestore-remote-0:5.2.21-1.Final_redhat_1.1.ep6.el7
  • infinispan-client-hotrod-0:5.2.21-1.Final_redhat_1.1.ep6.el7
  • infinispan-core-0:5.2.21-1.Final_redhat_1.1.ep6.el7
  • jboss-as-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-cli-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-client-all-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-clustering-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-cmp-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-connector-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-controller-client-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-core-security-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-deployment-repository-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-deployment-scanner-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-domain-http-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-domain-management-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-ee-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-ee-deployment-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-ejb3-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-embedded-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-host-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jacorb-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jaxr-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jaxrs-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jdr-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jpa-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jsf-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-jsr77-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-logging-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-mail-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-management-client-content-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-messaging-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-modcluster-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-naming-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-network-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-osgi-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-osgi-configadmin-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-osgi-service-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-picketlink-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-platform-mbean-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-pojo-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-process-controller-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-protocol-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-remoting-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-sar-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-security-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-server-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-system-jmx-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-threads-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-transactions-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-version-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-web-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-webservices-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-weld-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-as-xts-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jboss-modules-0:1.3.8-1.Final_redhat_1.1.ep6.el7
  • jboss-msc-0:1.1.7-1.SP1_redhat_1.1.ep6.el7
  • jboss-remoting3-0:3.3.9-1.Final_redhat_1.1.ep6.el7
  • jbossas-appclient-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-bundles-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-core-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-domain-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-javadocs-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-modules-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-product-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-standalone-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossas-welcome-content-eap-0:7.5.14-2.Final_redhat_2.1.ep6.el7
  • jbossts-1:4.17.39-1.Final_redhat_1.1.ep6.el7
  • jbossweb-0:7.5.21-2.Final_redhat_2.1.ep6.el7
  • picketbox-0:4.1.4-1.Final_redhat_1.1.ep6.el7
  • resteasy-0:2.3.17-1.Final_redhat_1.1.ep6.el7
  • weld-core-0:1.1.34-1.Final_redhat_1.1.ep6.el7
  • jboss-ec2-eap-0:7.5.14-2.Final_redhat_2.ep6.el6
  • jboss-ec2-eap-samples-0:7.5.14-2.Final_redhat_2.ep6.el6
  • eap7-activemq-artemis-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-cli-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-commons-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-core-client-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-dto-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-hornetq-protocol-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-hqclient-protocol-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-jms-client-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-jms-server-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-journal-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-native-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-ra-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-selector-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-server-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-activemq-artemis-service-extensions-0:1.1.0-19.SP24_redhat_1.1.ep7.el6
  • eap7-hibernate-0:5.0.16-1.Final_redhat_1.1.ep7.el6
  • eap7-hibernate-core-0:5.0.16-1.Final_redhat_1.1.ep7.el6
  • eap7-hibernate-entitymanager-0:5.0.16-1.Final_redhat_1.1.ep7.el6
  • eap7-hibernate-envers-0:5.0.16-1.Final_redhat_1.1.ep7.el6
  • eap7-hibernate-infinispan-0:5.0.16-1.Final_redhat_1.1.ep7.el6
  • eap7-hibernate-java8-0:5.0.16-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-0:1.3.8-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-common-api-0:1.3.8-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-common-impl-0:1.3.8-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-common-spi-0:1.3.8-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-core-api-0:1.3.8-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-core-impl-0:1.3.8-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-deployers-common-0:1.3.8-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-jdbc-0:1.3.8-1.Final_redhat_1.1.ep7.el6
  • eap7-ironjacamar-validator-0:1.3.8-1.Final_redhat_1.1.ep7.el6
  • eap7-jboss-remoting-0:4.0.25-1.Final_redhat_1.1.ep7.el6
  • eap7-jboss-xnio-base-0:3.4.7-1.Final_redhat_1.1.ep7.el6
  • eap7-jgroups-0:3.6.12-1.Final_redhat_1.1.ep7.el6
  • eap7-resteasy-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-async-http-servlet-3.0-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-atom-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-cdi-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-client-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-crypto-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-jackson-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-jackson2-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-jaxb-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-jaxrs-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-jettison-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-jose-jwt-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-jsapi-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-json-p-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-multipart-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-spring-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-validator-provider-11-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-resteasy-yaml-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el6
  • eap7-undertow-0:1.3.31-3.Final_redhat_3.1.ep7.el6
  • eap7-wildfly-0:7.0.9-4.GA_redhat_3.1.ep7.el6
  • eap7-wildfly-javadocs-0:7.0.9-2.GA_redhat_3.1.ep7.el6
  • eap7-wildfly-modules-0:7.0.9-4.GA_redhat_3.1.ep7.el6
  • eap7-activemq-artemis-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-cli-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-commons-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-core-client-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-dto-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-hornetq-protocol-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-hqclient-protocol-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-jms-client-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-jms-server-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-journal-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-native-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-ra-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-selector-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-server-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-activemq-artemis-service-extensions-0:1.1.0-19.SP24_redhat_1.1.ep7.el7
  • eap7-hibernate-0:5.0.16-1.Final_redhat_1.1.ep7.el7
  • eap7-hibernate-core-0:5.0.16-1.Final_redhat_1.1.ep7.el7
  • eap7-hibernate-entitymanager-0:5.0.16-1.Final_redhat_1.1.ep7.el7
  • eap7-hibernate-envers-0:5.0.16-1.Final_redhat_1.1.ep7.el7
  • eap7-hibernate-infinispan-0:5.0.16-1.Final_redhat_1.1.ep7.el7
  • eap7-hibernate-java8-0:5.0.16-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-0:1.3.8-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-common-api-0:1.3.8-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-common-impl-0:1.3.8-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-common-spi-0:1.3.8-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-core-api-0:1.3.8-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-core-impl-0:1.3.8-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-deployers-common-0:1.3.8-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-jdbc-0:1.3.8-1.Final_redhat_1.1.ep7.el7
  • eap7-ironjacamar-validator-0:1.3.8-1.Final_redhat_1.1.ep7.el7
  • eap7-jboss-remoting-0:4.0.25-1.Final_redhat_1.1.ep7.el7
  • eap7-jboss-xnio-base-0:3.4.7-1.Final_redhat_1.1.ep7.el7
  • eap7-jgroups-0:3.6.12-1.Final_redhat_1.1.ep7.el7
  • eap7-resteasy-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-async-http-servlet-3.0-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-atom-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-cdi-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-client-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-crypto-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-jackson-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-jackson2-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-jaxb-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-jaxrs-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-jettison-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-jose-jwt-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-jsapi-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-json-p-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-multipart-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-spring-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-validator-provider-11-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-resteasy-yaml-provider-0:3.0.19-7.SP5_redhat_1.1.ep7.el7
  • eap7-undertow-0:1.3.31-3.Final_redhat_3.1.ep7.el7
  • eap7-wildfly-0:7.0.9-4.GA_redhat_3.1.ep7.el7
  • eap7-wildfly-javadocs-0:7.0.9-2.GA_redhat_3.1.ep7.el7
  • eap7-wildfly-modules-0:7.0.9-4.GA_redhat_3.1.ep7.el7
  • eap7-jboss-ec2-eap-0:7.0.9-2.GA_redhat_2.ep7.el6
  • eap7-jboss-ec2-eap-0:7.0.9-2.GA_redhat_2.ep7.el7
  • eap7-jboss-ec2-eap-samples-0:7.0.9-2.GA_redhat_2.ep7.el6
  • eap7-jboss-ec2-eap-samples-0:7.0.9-2.GA_redhat_2.ep7.el7
  • SOAPpy-0:0.11.6-17.el7
  • ansiblerole-insights-client-0:1.6-1.el7sat
  • candlepin-0:2.5.15-1.el7sat
  • candlepin-selinux-0:2.5.15-1.el7sat
  • createrepo_c-0:0.7.4-1.el7sat
  • createrepo_c-debuginfo-0:0.7.4-1.el7sat
  • createrepo_c-libs-0:0.7.4-1.el7sat
  • foreman-0:1.20.1.34-1.el7sat
  • foreman-bootloaders-redhat-0:201801241201-4.el7sat
  • foreman-bootloaders-redhat-tftpboot-0:201801241201-4.el7sat
  • foreman-cli-0:1.20.1.34-1.el7sat
  • foreman-compute-0:1.20.1.34-1.el7sat
  • foreman-debug-0:1.20.1.34-1.el7sat
  • foreman-discovery-image-1:3.5.4-2.el7sat
  • foreman-ec2-0:1.20.1.34-1.el7sat
  • foreman-gce-0:1.20.1.34-1.el7sat
  • foreman-installer-1:1.20.0-2.el7sat
  • foreman-installer-katello-0:3.10.0.7-1.el7sat
  • foreman-journald-0:1.20.1.34-1.el7sat
  • foreman-libvirt-0:1.20.1.34-1.el7sat
  • foreman-openstack-0:1.20.1.34-1.el7sat
  • foreman-ovirt-0:1.20.1.34-1.el7sat
  • foreman-postgresql-0:1.20.1.34-1.el7sat
  • foreman-proxy-0:1.20.0-1.el7sat
  • foreman-proxy-content-0:3.10.0-0.6.rc1.el7sat
  • foreman-rackspace-0:1.20.1.34-1.el7sat
  • foreman-selinux-0:1.20.0-1.el7sat
  • foreman-telemetry-0:1.20.1.34-1.el7sat
  • foreman-vmware-0:1.20.1.34-1.el7sat
  • hfsplus-tools-0:332.14-12.el7
  • hfsplus-tools-debuginfo-0:332.14-12.el7
  • katello-0:3.10.0-0.6.rc1.el7sat
  • katello-certs-tools-0:2.4.0-2.el7sat
  • katello-client-bootstrap-0:1.7.2-1.el7sat
  • katello-common-0:3.10.0-0.6.rc1.el7sat
  • katello-debug-0:3.10.0-0.6.rc1.el7sat
  • katello-installer-base-0:3.10.0.7-1.el7sat
  • katello-selinux-0:3.0.3-2.el7sat
  • katello-service-0:3.10.0-0.6.rc1.el7sat
  • kobo-0:0.5.1-1.el7sat
  • libmodulemd-0:1.6.3-1.el7sat
  • libmodulemd-debuginfo-0:1.6.3-1.el7sat
  • libsolv-0:0.6.34-2.pulp.el7sat
  • libsolv-debuginfo-0:0.6.34-2.pulp.el7sat
  • libstemmer-0:0-2.585svn.el7sat
  • libstemmer-debuginfo-0:0-2.585svn.el7sat
  • libwebsockets-0:2.4.2-2.el7
  • libwebsockets-debuginfo-0:2.4.2-2.el7
  • liquibase-0:3.1.0-1.el7
  • livecd-tools-1:20.4-1.6.el7sat
  • mod_passenger-0:4.0.18-24.el7sat
  • mod_xsendfile-0:0.12-10.el7sat
  • mod_xsendfile-debuginfo-0:0.12-10.el7sat
  • mongodb-0:2.6.11-2.el7sat
  • mongodb-debuginfo-0:2.6.11-2.el7sat
  • mongodb-server-0:2.6.11-2.el7sat
  • ostree-0:2017.1-2.atomic.el7
  • ostree-debuginfo-0:2017.1-2.atomic.el7
  • pcp-mmvstatsd-0:0.4-2.el7sat
  • pulp-admin-client-0:2.18.1.1-1.el7sat
  • pulp-docker-admin-extensions-0:3.2.2-1.el7sat
  • pulp-docker-plugins-0:3.2.2-1.el7sat
  • pulp-katello-0:1.0.2-5.el7sat
  • pulp-maintenance-0:2.18.1.1-1.el7sat
  • pulp-nodes-child-0:2.18.1.1-1.el7sat
  • pulp-nodes-common-0:2.18.1.1-1.el7sat
  • pulp-nodes-parent-0:2.18.1.1-1.el7sat
  • pulp-ostree-admin-extensions-0:1.3.1-1.el7sat
  • pulp-ostree-plugins-0:1.3.1-1.el7sat
  • pulp-puppet-admin-extensions-0:2.18.1-2.el7sat
  • pulp-puppet-plugins-0:2.18.1-2.el7sat
  • pulp-puppet-tools-0:2.18.1-2.el7sat
  • pulp-rpm-admin-extensions-0:2.18.1.5-1.el7sat
  • pulp-rpm-plugins-0:2.18.1.5-1.el7sat
  • pulp-selinux-0:2.18.1.1-1.el7sat
  • pulp-server-0:2.18.1.1-1.el7sat
  • puppet-agent-0:5.5.12-1.el7sat
  • puppet-agent-oauth-0:0.5.1-3.el7sat
  • puppet-foreman_scap_client-0:0.3.19-1.el7sat
  • puppetlabs-stdlib-0:4.25.1-1.el7sat
  • puppetserver-0:5.3.6-3.el7sat
  • python-anyjson-0:0.3.3-5.el7sat
  • python-billiard-debuginfo-1:3.5.0.3-3.el7sat
  • python-blinker-0:1.3-2.el7sat
  • python-bson-0:3.2-2.el7sat
  • python-crane-0:3.3.0-0.1.rc.el7sat
  • python-flask-1:0.10.1-4.el7sat
  • python-fpconst-0:0.7.3-12.el7
  • python-gnupg-0:0.3.7-1.el7ui
  • python-gofer-0:2.12.5-3.el7sat
  • python-gofer-qpid-0:2.12.5-3.el7sat
  • python-imgcreate-1:20.4-1.6.el7sat
  • python-isodate-0:0.5.0-5.pulp.el7sat
  • python-itsdangerous-0:0.23-1.el7sat
  • python-kid-0:0.9.6-11.el7sat
  • python-mongoengine-0:0.10.5-2.el7sat
  • python-nectar-0:1.5.6-1.el7sat
  • python-oauth2-0:1.5.211-8.el7sat
  • python-okaara-0:1.0.32-1.el7sat
  • python-pulp-agent-lib-0:2.18.1.1-1.el7sat
  • python-pulp-bindings-0:2.18.1.1-1.el7sat
  • python-pulp-client-lib-0:2.18.1.1-1.el7sat
  • python-pulp-common-0:2.18.1.1-1.el7sat
  • python-pulp-docker-common-0:3.2.2-1.el7sat
  • python-pulp-integrity-0:2.18.1.5-1.el7sat
  • python-pulp-oid_validation-0:2.18.1.1-1.el7sat
  • python-pulp-ostree-common-0:1.3.1-1.el7sat
  • python-pulp-puppet-common-0:2.18.1-2.el7sat
  • python-pulp-repoauth-0:2.18.1.1-1.el7sat
  • python-pulp-rpm-common-0:2.18.1.5-1.el7sat
  • python-pulp-streamer-0:2.18.1.1-1.el7sat
  • python-pymongo-0:3.2-2.el7sat
  • python-pymongo-debuginfo-0:3.2-2.el7sat
  • python-pymongo-gridfs-0:3.2-2.el7sat
  • python-qpid-0:1.35.0-5.el7
  • python-qpid-proton-0:0.26.0-3.el7
  • python-qpid-qmf-0:1.36.0-24.el7amq
  • python-saslwrapper-0:0.22-5.el7sat
  • python-semantic_version-0:2.2.0-6.el7sat
  • python-simplejson-0:3.2.0-1.el7sat
  • python-simplejson-debuginfo-0:3.2.0-1.el7sat
  • python-twisted-core-0:12.2.0-4.el7
  • python-twisted-core-debuginfo-0:12.2.0-4.el7
  • python-twisted-web-0:12.1.0-5.el7_2
  • python-werkzeug-0:0.9.1-1.el7sat
  • python-zope-interface-0:4.0.5-4.el7
  • python-zope-interface-debuginfo-0:4.0.5-4.el7
  • python2-amqp-0:2.2.2-3.el7sat
  • python2-billiard-1:3.5.0.3-3.el7sat
  • python2-celery-0:4.0.2-5.el7sat
  • python2-django-0:1.11.13-1.el7sat
  • python2-kombu-10:4.0.2-12.el7sat
  • python2-solv-0:0.6.34-2.pulp.el7sat
  • python2-vine-0:1.1.3-4.el7sat
  • qpid-cpp-client-0:1.36.0-24.el7amq
  • qpid-cpp-client-devel-0:1.36.0-24.el7amq
  • qpid-cpp-debuginfo-0:1.36.0-24.el7amq
  • qpid-cpp-server-0:1.36.0-24.el7amq
  • qpid-cpp-server-linearstore-0:1.36.0-24.el7amq
  • qpid-dispatch-debuginfo-0:1.5.0-4.el7
  • qpid-dispatch-router-0:1.5.0-4.el7
  • qpid-dispatch-tools-0:1.5.0-4.el7
  • qpid-proton-c-0:0.26.0-3.el7
  • qpid-proton-debuginfo-0:0.26.0-3.el7
  • qpid-qmf-0:1.36.0-24.el7amq
  • qpid-tools-0:1.36.0-24.el7amq
  • redhat-access-insights-puppet-0:0.0.9-3.el7sat
  • repoview-0:0.6.6-4.el7sat
  • rhel8-kickstart-setup-0:0.0.2-1.el7sat
  • rubygem-ansi-0:1.4.3-3.el7sat
  • rubygem-bundler_ext-0:0.4.1-3.el7sat
  • rubygem-clamp-0:1.1.2-2.el7sat
  • rubygem-concurrent-ruby-1:1.0.3-6.el7sat
  • rubygem-facter-0:2.4.1-2.el7sat
  • rubygem-faraday-0:0.9.1-6.el7sat
  • rubygem-faraday_middleware-0:0.10.0-4.el7sat
  • rubygem-fast_gettext-0:1.1.0-4.el7sat
  • rubygem-ffi-0:1.4.0-3.el7sat
  • rubygem-ffi-debuginfo-0:1.4.0-3.el7sat
  • rubygem-foreman_scap_client-0:0.4.5-1.el7sat
  • rubygem-gssapi-0:1.1.2-4.el7sat
  • rubygem-hashie-0:2.0.5-5.el7sat
  • rubygem-highline-0:1.7.8-3.el7sat
  • rubygem-infoblox-0:2.0.4-1.el7sat
  • rubygem-jwt-0:1.2.1-1.el7sat
  • rubygem-kafo-0:2.1.0-1.el7sat
  • rubygem-kafo_parsers-0:0.1.6-1.el7sat
  • rubygem-kafo_wizards-0:0.0.1-2.el7sat
  • rubygem-little-plugger-0:1.1.3-22.el7sat
  • rubygem-logging-0:2.2.2-1.el7sat
  • rubygem-mime-types-0:1.19-7.el7sat
  • rubygem-multi_json-0:1.12.2-2.el7sat
  • rubygem-multipart-post-0:1.2.0-6.el7sat
  • rubygem-netrc-0:0.7.7-9.el7sat
  • rubygem-newt-0:0.9.6-3.el7sat
  • rubygem-newt-debuginfo-0:0.9.6-3.el7sat
  • rubygem-oauth-0:0.5.4-2.el7sat
  • rubygem-openscap-0:0.4.7-3.el7sat
  • rubygem-passenger-0:4.0.18-24.el7sat
  • rubygem-passenger-debuginfo-0:4.0.18-24.el7sat
  • rubygem-passenger-native-0:4.0.18-24.el7sat
  • rubygem-passenger-native-libs-0:4.0.18-24.el7sat
  • rubygem-powerbar-0:1.0.17-2.el7sat
  • rubygem-rack-1:1.6.4-3.el7sat
  • rubygem-rack-protection-0:1.5.3-4.el7sat
  • rubygem-rake-0:0.9.2.2-41.el7sat
  • rubygem-rb-inotify-0:0.9.7-4.el7sat
  • rubygem-rest-client-0:1.6.7-7.el7sat
  • rubygem-rkerberos-0:0.1.3-5.el7sat
  • rubygem-rkerberos-debuginfo-0:0.1.3-5.el7sat
  • rubygem-rsec-0:0.4.2-2.el7sat
  • rubygem-rubyipmi-0:0.10.0-2.el7sat
  • rubygem-sinatra-1:1.4.7-3.el7sat
  • rubygem-smart_proxy_ansible-0:2.0.3-2.el7sat
  • rubygem-smart_proxy_dhcp_infoblox-0:0.0.14-1.el7sat
  • rubygem-smart_proxy_dhcp_remote_isc-0:0.0.4-1.el7sat
  • rubygem-smart_proxy_discovery-0:1.0.4-5.el7sat
  • rubygem-smart_proxy_discovery_image-0:1.0.9-2.el7sat
  • rubygem-smart_proxy_dns_infoblox-0:0.0.7-1.el7sat
  • rubygem-smart_proxy_dynflow-0:0.2.1-2.el7sat
  • rubygem-smart_proxy_openscap-0:0.7.1-1.el7sat
  • rubygem-smart_proxy_pulp-0:1.3.0-3.el7sat
  • rubygem-smart_proxy_remote_execution_ssh-0:0.2.0-3.el7sat
  • rubygem-tilt-0:1.3.7-2.git.0.3b416c9.el7sat
  • saslwrapper-0:0.22-5.el7sat
  • saslwrapper-debuginfo-0:0.22-5.el7sat
  • satellite-0:6.5.0-11.el7sat
  • satellite-capsule-0:6.5.0-11.el7sat
  • satellite-cli-0:6.5.0-11.el7sat
  • satellite-common-0:6.5.0-11.el7sat
  • satellite-debug-tools-0:6.5.0-11.el7sat
  • satellite-installer-0:6.5.0.4-1.el7sat
  • tfm-ror52-rubygem-actioncable-0:5.2.1-1.el7sat
  • tfm-ror52-rubygem-actionmailer-0:5.2.1-1.el7sat
  • tfm-ror52-rubygem-actionpack-0:5.2.1-1.el7sat
  • tfm-ror52-rubygem-actionview-0:5.2.1-1.el7sat
  • tfm-ror52-rubygem-activejob-0:5.2.1-1.el7sat
  • tfm-ror52-rubygem-activemodel-0:5.2.1-1.el7sat
  • tfm-ror52-rubygem-activerecord-0:5.2.1-1.el7sat
  • tfm-ror52-rubygem-activestorage-0:5.2.1-1.el7sat
  • tfm-ror52-rubygem-activesupport-0:5.2.1-1.el7sat
  • tfm-ror52-rubygem-arel-0:9.0.0-1.el7sat
  • tfm-ror52-rubygem-builder-0:3.2.3-1.el7sat
  • tfm-ror52-rubygem-coffee-rails-0:4.2.2-1.el7sat
  • tfm-ror52-rubygem-coffee-script-0:2.4.1-1.el7sat
  • tfm-ror52-rubygem-coffee-script-source-0:1.12.2-1.el7sat
  • tfm-ror52-rubygem-concurrent-ruby-0:1.0.5-1.el7sat
  • tfm-ror52-rubygem-crass-0:1.0.4-1.el7sat
  • tfm-ror52-rubygem-erubi-0:1.7.1-1.el7sat
  • tfm-ror52-rubygem-execjs-0:2.7.0-1.el7sat
  • tfm-ror52-rubygem-globalid-0:0.4.1-3.el7sat
  • tfm-ror52-rubygem-i18n-0:1.0.1-1.el7sat
  • tfm-ror52-rubygem-loofah-0:2.2.2-2.el7sat
  • tfm-ror52-rubygem-mail-0:2.7.0-1.el7sat
  • tfm-ror52-rubygem-marcel-0:0.3.2-1.el7sat
  • tfm-ror52-rubygem-method_source-0:0.9.0-1.el7sat
  • tfm-ror52-rubygem-mime-types-0:3.2.2-1.el7sat
  • tfm-ror52-rubygem-mime-types-data-0:3.2018.0812-1.el7sat
  • tfm-ror52-rubygem-mimemagic-0:0.3.2-1.el7sat
  • tfm-ror52-rubygem-mini_mime-0:1.0.0-1.el7sat
  • tfm-ror52-rubygem-mini_portile2-0:2.3.0-1.el7sat
  • tfm-ror52-rubygem-multi_json-0:1.13.1-1.el7sat
  • tfm-ror52-rubygem-mustermann-0:1.0.2-1.el7sat
  • tfm-ror52-rubygem-nio4r-0:2.3.1-1.el7sat
  • tfm-ror52-rubygem-nio4r-debuginfo-0:2.3.1-1.el7sat
  • tfm-ror52-rubygem-nokogiri-0:1.8.4-2.el7sat
  • tfm-ror52-rubygem-nokogiri-debuginfo-0:1.8.4-2.el7sat
  • tfm-ror52-rubygem-rack-0:2.0.5-2.el7sat
  • tfm-ror52-rubygem-rack-protection-0:2.0.3-1.el7sat
  • tfm-ror52-rubygem-rack-test-0:1.1.0-1.el7sat
  • tfm-ror52-rubygem-rails-0:5.2.1-1.el7sat
  • tfm-ror52-rubygem-rails-dom-testing-0:2.0.3-3.el7sat
  • tfm-ror52-rubygem-rails-html-sanitizer-0:1.0.4-2.el7sat
  • tfm-ror52-rubygem-railties-0:5.2.1-1.el7sat
  • tfm-ror52-rubygem-sinatra-0:2.0.3-1.el7sat
  • tfm-ror52-rubygem-sprockets-0:3.7.2-3.el7sat
  • tfm-ror52-rubygem-sprockets-rails-0:3.2.1-1.el7sat
  • tfm-ror52-rubygem-sqlite3-0:1.3.13-1.el7sat
  • tfm-ror52-rubygem-sqlite3-debuginfo-0:1.3.13-1.el7sat
  • tfm-ror52-rubygem-thor-0:0.20.0-3.el7sat
  • tfm-ror52-rubygem-thread_safe-0:0.3.6-1.el7sat
  • tfm-ror52-rubygem-tilt-0:2.0.8-1.el7sat
  • tfm-ror52-rubygem-turbolinks-0:2.5.4-1.el7sat
  • tfm-ror52-rubygem-tzinfo-0:1.2.5-1.el7sat
  • tfm-ror52-rubygem-websocket-driver-0:0.7.0-1.el7sat
  • tfm-ror52-rubygem-websocket-driver-debuginfo-0:0.7.0-1.el7sat
  • tfm-ror52-rubygem-websocket-extensions-0:0.1.3-1.el7sat
  • tfm-ror52-runtime-0:1.0-4.el7sat
  • tfm-rubygem-activerecord-import-0:1.0.0-3.el7sat
  • tfm-rubygem-activerecord-session_store-0:1.1.1-2.el7sat
  • tfm-rubygem-addressable-0:2.3.6-6.el7sat
  • tfm-rubygem-algebrick-0:0.7.3-6.el7sat
  • tfm-rubygem-ancestry-0:3.0.0-3.el7sat
  • tfm-rubygem-anemone-0:0.7.2-20.el7sat
  • tfm-rubygem-angular-rails-templates-1:1.0.2-4.el7sat
  • tfm-rubygem-apipie-bindings-0:0.2.2-2.el7sat
  • tfm-rubygem-apipie-params-0:0.0.5-5.el7sat
  • tfm-rubygem-apipie-rails-0:0.5.14-1.el7sat
  • tfm-rubygem-audited-0:4.7.1-2.el7sat
  • tfm-rubygem-autoparse-0:0.3.3-10.el7sat
  • tfm-rubygem-awesome_print-0:1.8.0-3.el7sat
  • tfm-rubygem-bastion-0:6.1.23-1.el7sat
  • tfm-rubygem-bundler_ext-0:0.4.1-4.el7sat
  • tfm-rubygem-clamp-0:1.1.2-4.el7sat
  • tfm-rubygem-concurrent-ruby-edge-1:0.2.4-2.el7sat
  • tfm-rubygem-css_parser-0:1.4.7-3.el7sat
  • tfm-rubygem-daemons-0:1.2.3-7.el7sat
  • tfm-rubygem-deacon-0:1.0.0-4.el7sat
  • tfm-rubygem-deep_cloneable-0:2.3.2-2.el7sat
  • tfm-rubygem-deface-0:1.3.2-1.el7sat
  • tfm-rubygem-diffy-0:3.0.1-6.el7sat
  • tfm-rubygem-docker-api-0:1.28.0-4.el7sat
  • tfm-rubygem-domain_name-0:0.5.20160310-4.el7sat
  • tfm-rubygem-dynflow-0:1.1.6-1.el7sat
  • tfm-rubygem-excon-0:0.58.0-3.el7sat
  • tfm-rubygem-extlib-0:0.9.16-6.el7sat
  • tfm-rubygem-facter-0:2.4.0-6.el7sat
  • tfm-rubygem-faraday-0:0.9.1-6.el7sat
  • tfm-rubygem-fast_gettext-0:1.4.1-3.el7sat
  • tfm-rubygem-ffi-0:1.4.0-12.el7sat
  • tfm-rubygem-ffi-debuginfo-0:1.4.0-12.el7sat
  • tfm-rubygem-fog-0:1.42.1-2.el7sat
  • tfm-rubygem-fog-aws-0:1.3.0-3.el7sat
  • tfm-rubygem-fog-core-0:1.45.0-3.el7sat
  • tfm-rubygem-fog-digitalocean-0:0.3.0-3.el7sat
  • tfm-rubygem-fog-google-0:0.1.0-5.el7sat
  • tfm-rubygem-fog-json-0:1.0.2-10.el7sat
  • tfm-rubygem-fog-libvirt-0:0.4.1-3.el7sat
  • tfm-rubygem-fog-openstack-0:0.1.25-3.el7sat
  • tfm-rubygem-fog-ovirt-0:1.1.2-2.el7sat
  • tfm-rubygem-fog-rackspace-0:0.1.4-3.el7sat
  • tfm-rubygem-fog-vsphere-0:2.4.0-1.el7sat
  • tfm-rubygem-fog-xenserver-0:0.2.3-4.el7sat
  • tfm-rubygem-fog-xml-0:0.1.2-7.el7sat
  • tfm-rubygem-foreman-tasks-0:0.14.4.6-1.el7sat
  • tfm-rubygem-foreman-tasks-core-0:0.2.5-2.el7sat
  • tfm-rubygem-foreman_ansible-0:2.2.14-2.el7sat
  • tfm-rubygem-foreman_ansible_core-0:2.1.2-2.el7sat
  • tfm-rubygem-foreman_bootdisk-0:14.0.0.2-1.el7sat
  • tfm-rubygem-foreman_discovery-0:14.0.1-1.el7sat
  • tfm-rubygem-foreman_docker-0:4.1.0-2.el7sat
  • tfm-rubygem-foreman_hooks-0:0.3.15-1.el7sat
  • tfm-rubygem-foreman_openscap-0:0.11.5.1-1.el7sat
  • tfm-rubygem-foreman_remote_execution-0:1.6.7-19.el7sat
  • tfm-rubygem-foreman_remote_execution_core-0:1.1.4-1.el7sat
  • tfm-rubygem-foreman_templates-0:6.0.3-2.el7sat
  • tfm-rubygem-foreman_theme_satellite-0:3.0.1.13-1.el7sat
  • tfm-rubygem-foreman_virt_who_configure-0:0.3.2-1.el7sat
  • tfm-rubygem-formatador-0:0.2.1-11.el7sat
  • tfm-rubygem-friendly_id-0:5.2.4-2.el7sat
  • tfm-rubygem-get_process_mem-0:0.2.1-3.el7sat
  • tfm-rubygem-gettext_i18n_rails-0:1.2.1-5.el7sat
  • tfm-rubygem-git-0:1.2.5-9.el7sat
  • tfm-rubygem-google-api-client-0:0.8.2-11.el7sat
  • tfm-rubygem-gssapi-0:1.2.0-5.el7sat
  • tfm-rubygem-hammer_cli-0:0.15.1.2-1.el7sat
  • tfm-rubygem-hammer_cli_csv-0:2.3.1-3.el7sat
  • tfm-rubygem-hammer_cli_foreman-0:0.15.1.1-1.el7sat
  • tfm-rubygem-hammer_cli_foreman_admin-0:0.0.8-3.el7sat
  • tfm-rubygem-hammer_cli_foreman_ansible-0:0.1.1-3.el7sat
  • tfm-rubygem-hammer_cli_foreman_bootdisk-0:0.1.3.3-5.el7sat
  • tfm-rubygem-hammer_cli_foreman_discovery-0:1.0.0-3.el7sat
  • tfm-rubygem-hammer_cli_foreman_docker-0:0.0.6.1-1.el7sat
  • tfm-rubygem-hammer_cli_foreman_openscap-0:0.1.6-2.el7sat
  • tfm-rubygem-hammer_cli_foreman_remote_execution-0:0.1.0-2.el7sat
  • tfm-rubygem-hammer_cli_foreman_tasks-0:0.0.13-1.el7sat
  • tfm-rubygem-hammer_cli_foreman_templates-0:0.1.2-1.el7sat
  • tfm-rubygem-hammer_cli_foreman_virt_who_configure-0:0.0.3-3.el7sat
  • tfm-rubygem-hammer_cli_katello-0:0.16.0.11-1.el7sat
  • tfm-rubygem-hashie-0:3.6.0-1.el7sat
  • tfm-rubygem-highline-0:1.7.8-4.el7sat
  • tfm-rubygem-http-cookie-0:1.0.2-5.el7sat
  • tfm-rubygem-ipaddress-0:0.8.0-11.el7sat
  • tfm-rubygem-jgrep-0:1.3.3-12.el7sat
  • tfm-rubygem-journald-logger-0:2.0.4-1.el7sat
  • tfm-rubygem-journald-native-0:1.0.11-1.el7sat
  • tfm-rubygem-journald-native-debuginfo-0:1.0.11-1.el7sat
  • tfm-rubygem-jwt-0:1.2.1-1.el7sat
  • tfm-rubygem-katello-0:3.10.0.46-1.el7sat
  • tfm-rubygem-launchy-0:2.4.3-6.el7sat
  • tfm-rubygem-ldap_fluff-0:0.4.7-3.el7sat
  • tfm-rubygem-little-plugger-0:1.1.3-23.el7sat
  • tfm-rubygem-locale-0:2.0.9-13.el7sat
  • tfm-rubygem-logging-0:2.2.2-5.el7sat
  • tfm-rubygem-logging-journald-0:2.0.0-1.el7sat
  • tfm-rubygem-multipart-post-0:1.2.0-6.el7sat
  • tfm-rubygem-net-ldap-0:0.15.0-3.el7sat
  • tfm-rubygem-net-ping-0:2.0.1-3.el7sat
  • tfm-rubygem-net-scp-0:1.2.1-3.el7sat
  • tfm-rubygem-net-ssh-0:4.0.1-5.el7sat
  • tfm-rubygem-net-ssh-krb-0:0.4.0-3.el7sat
  • tfm-rubygem-netrc-0:0.11.0-3.el7sat
  • tfm-rubygem-oauth-0:0.5.4-3.el7sat
  • tfm-rubygem-ovirt-engine-sdk-0:4.2.3-3.el7sat
  • tfm-rubygem-ovirt-engine-sdk-debuginfo-0:4.2.3-3.el7sat
  • tfm-rubygem-ovirt_provision_plugin-0:2.0.3-1.el7sat
  • tfm-rubygem-parse-cron-0:0.1.4-4.el7sat
  • tfm-rubygem-passenger-0:4.0.18-25.el7sat
  • tfm-rubygem-passenger-debuginfo-0:4.0.18-25.el7sat
  • tfm-rubygem-passenger-native-0:4.0.18-25.el7sat
  • tfm-rubygem-passenger-native-libs-0:4.0.18-25.el7sat
  • tfm-rubygem-pg-0:0.21.0-3.el7sat
  • tfm-rubygem-pg-debuginfo-0:0.21.0-3.el7sat
  • tfm-rubygem-polyglot-0:0.3.5-3.el7sat
  • tfm-rubygem-powerbar-0:2.0.1-1.el7sat
  • tfm-rubygem-prometheus-client-0:0.7.1-3.el7sat
  • tfm-rubygem-qpid_messaging-0:1.36.0-9.el7sat
  • tfm-rubygem-qpid_messaging-debuginfo-0:1.36.0-9.el7sat
  • tfm-rubygem-quantile-0:0.2.0-3.el7sat
  • tfm-rubygem-rabl-0:0.13.1-2.el7sat
  • tfm-rubygem-rack-jsonp-0:1.3.1-7.el7sat
  • tfm-rubygem-rails-i18n-0:5.1.1-2.el7sat
  • tfm-rubygem-rainbow-0:2.2.1-5.el7sat
  • tfm-rubygem-rbovirt-0:0.1.7-2.el7sat
  • tfm-rubygem-rbvmomi-0:1.10.0-3.el7sat
  • tfm-rubygem-record_tag_helper-0:1.0.0-2.el7sat
  • tfm-rubygem-redhat_access-0:2.2.4-1.el7sat
  • tfm-rubygem-redhat_access_lib-0:1.1.4-3.el7sat
  • tfm-rubygem-responders-0:2.4.0-2.el7sat
  • tfm-rubygem-rest-client-0:2.0.1-3.el7sat
  • tfm-rubygem-retriable-0:1.4.1-6.el7sat
  • tfm-rubygem-roadie-0:3.2.2-2.el7sat
  • tfm-rubygem-roadie-rails-0:1.3.0-2.el7sat
  • tfm-rubygem-robotex-0:1.0.0-21.el7sat
  • tfm-rubygem-ruby-libvirt-0:0.7.0-4.el7sat
  • tfm-rubygem-ruby-libvirt-debuginfo-0:0.7.0-4.el7sat
  • tfm-rubygem-ruby2ruby-0:2.4.0-2.el7sat
  • tfm-rubygem-ruby_parser-0:3.10.1-2.el7sat
  • tfm-rubygem-runcible-0:2.11.1-1.el7sat
  • tfm-rubygem-safemode-0:1.3.5-2.el7sat
  • tfm-rubygem-scoped_search-0:4.1.6-1.el7sat
  • tfm-rubygem-secure_headers-0:6.0.0-1.el7sat
  • tfm-rubygem-sequel-0:5.7.1-2.el7sat
  • tfm-rubygem-sexp_processor-0:4.10.0-5.el7sat
  • tfm-rubygem-signet-0:0.6.0-10.el7sat
  • tfm-rubygem-smart_proxy_dynflow_core-0:0.2.1-5.el7sat
  • tfm-rubygem-sshkey-0:1.9.0-3.el7sat
  • tfm-rubygem-statsd-instrument-0:2.1.4-2.el7sat
  • tfm-rubygem-trollop-0:2.1.2-3.el7sat
  • tfm-rubygem-unf-0:0.1.3-7.el7sat
  • tfm-rubygem-unf_ext-0:0.0.6-9.el7sat
  • tfm-rubygem-unf_ext-debuginfo-0:0.0.6-9.el7sat
  • tfm-rubygem-unicode-0:0.4.4.1-6.el7sat
  • tfm-rubygem-unicode-debuginfo-0:0.4.4.1-6.el7sat
  • tfm-rubygem-unicode-display_width-0:1.0.5-5.el7sat
  • tfm-rubygem-validates_lengths_from_database-0:0.5.0-5.el7sat
  • tfm-rubygem-webpack-rails-0:0.9.8-5.el7sat
  • tfm-rubygem-wicked-0:1.3.3-1.el7sat
  • tfm-rubygem-will_paginate-0:3.1.5-3.el7sat
  • tfm-rubygem-x-editable-rails-0:1.5.5-4.el7sat
  • tfm-runtime-0:5.0-3.el7sat
  • v8-1:3.14.5.10-19.el7sat
  • v8-debuginfo-1:3.14.5.10-19.el7sat
  • yaml-cpp-0:0.5.1-7.el7sat
  • yaml-cpp-debuginfo-0:0.5.1-7.el7sat