Vulnerabilities > CVE-2019-3845 - Unspecified vulnerability in Redhat Satellite

047910
CVSS 8.0 - HIGH
Attack vector
ADJACENT_NETWORK
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
low complexity
redhat
nessus

Summary

A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host registered to Satellite (or Capsule) can use this flaw to access QMF methods to any host also registered to Satellite (or Capsule) and execute privileged commands.

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-0733.NASL
    descriptionAn update for katello-installer-base which configures qpid-dispatch-router is now available for Red Hat Satellite 6.3 for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The qpid-dispatch-router package provides remote host management functionality and is configured through the katello-installer-base package. Additional packages included contain enhancements to support the fix. Security Fix : * qpid-dispatch-router: QMF methods were exposed to goferd via qdrouterd (CVE-2019-3845) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. This issue was discovered by Pavel Moravec (Red Hat).
    last seen2020-06-01
    modified2020-06-02
    plugin id123987
    published2019-04-11
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123987
    titleRHEL 7 : Satellite Server (RHSA-2019:0733)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2019:0733. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(123987);
      script_version("1.6");
      script_cvs_date("Date: 2020/01/23");
    
      script_cve_id("CVE-2019-3845");
      script_xref(name:"RHSA", value:"2019:0733");
    
      script_name(english:"RHEL 7 : Satellite Server (RHSA-2019:0733)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update for katello-installer-base which configures
    qpid-dispatch-router is now available for Red Hat Satellite 6.3 for
    RHEL 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Important. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    The qpid-dispatch-router package provides remote host management
    functionality and is configured through the katello-installer-base
    package. Additional packages included contain enhancements to support
    the fix.
    
    Security Fix :
    
    * qpid-dispatch-router: QMF methods were exposed to goferd via
    qdrouterd (CVE-2019-3845)
    
    For more details about the security issue(s), including the impact, a
    CVSS score, acknowledgments, and other related information, refer to
    the CVE page(s) listed in the References section.
    
    This issue was discovered by Pavel Moravec (Red Hat)."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2019:0733"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2019-3845"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:foreman-installer-katello");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:katello-installer-base");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:satellite");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:satellite-capsule");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:satellite-cli");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:satellite-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:satellite-debug-tools");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/04/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/04/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/04/11");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2019:0733";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL7", rpm:"satellite-6.3"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "Satellite Server");
    
      if (rpm_check(release:"RHEL7", reference:"foreman-installer-katello-3.4.5.35-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"katello-installer-base-3.4.5.35-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"satellite-6.3.5.1-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"satellite-capsule-6.3.5.1-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"satellite-cli-6.3.5.1-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"satellite-common-6.3.5.1-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"satellite-debug-tools-6.3.5.1-1.el7")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "foreman-installer-katello / katello-installer-base / satellite / etc");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-0735.NASL
    descriptionAn update for katello-installer-base which configures qpid-dispatch-router is now available for Red Hat Satellite 6.4 for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The qpid-dispatch-router package provides remote host management functionality and is configured through the katello-installer-base package. Additional packages included contain enhancements to support the fix. Security Fix(es) : * qpid-dispatch-router: QMF methods exposed to goferd via qdrouterd (CVE-2019-3845) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. This issue was discovered by Pavel Moravec (Red Hat).
    last seen2020-06-01
    modified2020-06-02
    plugin id123988
    published2019-04-11
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123988
    titleRHEL 7 : Satellite Server (RHSA-2019:0735)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2019:0735. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(123988);
      script_version("1.6");
      script_cvs_date("Date: 2020/01/23");
    
      script_cve_id("CVE-2019-3845");
      script_xref(name:"RHSA", value:"2019:0735");
    
      script_name(english:"RHEL 7 : Satellite Server (RHSA-2019:0735)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update for katello-installer-base which configures
    qpid-dispatch-router is now available for Red Hat Satellite 6.4 for
    RHEL 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Important. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    The qpid-dispatch-router package provides remote host management
    functionality and is configured through the katello-installer-base
    package. Additional packages included contain enhancements to support
    the fix.
    
    Security Fix(es) :
    
    * qpid-dispatch-router: QMF methods exposed to goferd via qdrouterd
    (CVE-2019-3845)
    
    For more details about the security issue(s), including the impact, a
    CVSS score, acknowledgments, and other related information, refer to
    the CVE page(s) listed in the References section.
    
    This issue was discovered by Pavel Moravec (Red Hat)."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2019:0735"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2019-3845"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:S/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:foreman-installer-katello");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:katello-installer-base");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:satellite");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:satellite-capsule");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:satellite-cli");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:satellite-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:satellite-debug-tools");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/04/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/04/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/04/11");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2019:0735";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL7", rpm:"satellite-6.4"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "Satellite Server");
    
      if (rpm_check(release:"RHEL7", reference:"foreman-installer-katello-3.7.0.19-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"katello-installer-base-3.7.0.19-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"satellite-6.4.2.1-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"satellite-capsule-6.4.2.1-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"satellite-cli-6.4.2.1-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"satellite-common-6.4.2.1-1.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"satellite-debug-tools-6.4.2.1-1.el7")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "foreman-installer-katello / katello-installer-base / satellite / etc");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-0734.NASL
    descriptionAn update for katello-installer-base which configures qpid-dispatch-router is now available for Red Hat Satellite 6.2 for RHEL 6 and Red Hat Satellite 6.2 for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The qpid-dispatch-router package provides remote host management functionality and is configured through the katello-installer-base package. Additional packages included contain enhancements to support the fix. Security Fix(es) : * qpid-dispatch-router: QMF methods exposed to goferd via qdrouterd (CVE-2019-3845) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. This issue was discovered by Pavel Moravec (Red Hat).
    last seen2020-06-01
    modified2020-06-02
    plugin id123964
    published2019-04-10
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123964
    titleRHEL 6 / 7 : Satellite Server (RHSA-2019:0734)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1223.NASL
    descriptionAn update is now available for Satellite Tools 6.5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool. This update provides the Satellite 6.5 Tools repositories. For the full list of new features provided by Satellite 6.5, see the Release Notes linked to in the references section. See the Satellite 6 Installation Guide for detailed instructions on how to install a new Satellite 6.5 environment, or the Satellite 6 Upgrading and Updating guide for detailed instructions on how to upgrade from prior versions of Satellite 6. All users who require Satellite version 6.5 are advised to install these new packages. Security Fix(es) : * qpid-dispatch-router: QMF methods exposed to goferd via qdrouterd (CVE-2019-3845) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id125053
    published2019-05-14
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125053
    titleRHEL 6 / 7 / 8 : Red Hat Satellite Tools (RHSA-2019:1223)

Redhat

advisories
rhsa
idRHSA-2019:1223
rpms
  • foreman-installer-katello-0:3.4.5.35-1.el7sat
  • katello-installer-base-0:3.4.5.35-1.el7sat
  • satellite-0:6.3.5.1-1.el7sat
  • satellite-capsule-0:6.3.5.1-1.el7sat
  • satellite-cli-0:6.3.5.1-1.el7sat
  • satellite-common-0:6.3.5.1-1.el7sat
  • satellite-debug-tools-0:6.3.5.1-1.el7sat
  • foreman-installer-katello-0:3.0.0.105-1.el6sat
  • foreman-installer-katello-0:3.0.0.105-1.el7sat
  • katello-installer-base-0:3.0.0.105-1.el6sat
  • katello-installer-base-0:3.0.0.105-1.el7sat
  • libwebsockets-0:2.1.0-3.el6
  • libwebsockets-0:2.1.0-3.el7
  • libwebsockets-debuginfo-0:2.1.0-3.el6
  • libwebsockets-debuginfo-0:2.1.0-3.el7
  • python-qpid-0:1.35.0-5.el6
  • python-qpid-0:1.35.0-5.el7
  • python-qpid-proton-0:0.16.0-12.el6sat
  • python-qpid-proton-0:0.16.0-12.el7sat
  • python-qpid-qmf-0:1.36.0-19.el6
  • python-qpid-qmf-0:1.36.0-19.el7
  • qpid-cpp-client-0:1.36.0-19.el6
  • qpid-cpp-client-0:1.36.0-19.el7
  • qpid-cpp-client-devel-0:1.36.0-19.el6
  • qpid-cpp-client-devel-0:1.36.0-19.el7
  • qpid-cpp-debuginfo-0:1.36.0-19.el6
  • qpid-cpp-debuginfo-0:1.36.0-19.el7
  • qpid-cpp-server-0:1.36.0-19.el6
  • qpid-cpp-server-0:1.36.0-19.el7
  • qpid-cpp-server-linearstore-0:1.36.0-19.el6
  • qpid-cpp-server-linearstore-0:1.36.0-19.el7
  • qpid-dispatch-debuginfo-0:0.8.0-10.el6
  • qpid-dispatch-debuginfo-0:0.8.0-16.el7sat
  • qpid-dispatch-router-0:0.8.0-10.el6
  • qpid-dispatch-router-0:0.8.0-16.el7sat
  • qpid-dispatch-tools-0:0.8.0-10.el6
  • qpid-dispatch-tools-0:0.8.0-16.el7sat
  • qpid-proton-c-0:0.16.0-12.el6sat
  • qpid-proton-c-0:0.16.0-12.el7sat
  • qpid-proton-debuginfo-0:0.16.0-12.el6sat
  • qpid-proton-debuginfo-0:0.16.0-12.el7sat
  • qpid-qmf-0:1.36.0-19.el6
  • qpid-qmf-0:1.36.0-19.el7
  • qpid-tools-0:1.36.0-19.el6
  • qpid-tools-0:1.36.0-19.el7
  • satellite-0:6.2.16.1-1.0.el6sat
  • satellite-0:6.2.16.1-1.0.el7sat
  • satellite-capsule-0:6.2.16.1-1.0.el6sat
  • satellite-capsule-0:6.2.16.1-1.0.el7sat
  • satellite-cli-0:6.2.16.1-1.0.el6sat
  • satellite-cli-0:6.2.16.1-1.0.el7sat
  • satellite-debug-tools-0:6.2.16.1-1.0.el6sat
  • satellite-debug-tools-0:6.2.16.1-1.0.el7sat
  • tfm-rubygem-foreman_theme_satellite-0:0.1.47.5-1.el6sat
  • tfm-rubygem-foreman_theme_satellite-0:0.1.47.5-1.el7sat
  • tfm-rubygem-katello-0:3.0.0.171-1.el6sat
  • tfm-rubygem-katello-0:3.0.0.171-1.el7sat
  • tfm-rubygem-katello_ostree-0:3.0.0.171-1.el7sat
  • tfm-rubygem-qpid_messaging-0:1.36.0-6.el6sat
  • tfm-rubygem-qpid_messaging-0:1.36.0-6.el7sat
  • tfm-rubygem-qpid_messaging-debuginfo-0:1.36.0-6.el6sat
  • tfm-rubygem-qpid_messaging-debuginfo-0:1.36.0-6.el7sat
  • foreman-installer-katello-0:3.7.0.19-1.el7sat
  • katello-installer-base-0:3.7.0.19-1.el7sat
  • satellite-0:6.4.2.1-1.el7sat
  • satellite-capsule-0:6.4.2.1-1.el7sat
  • satellite-cli-0:6.4.2.1-1.el7sat
  • satellite-common-0:6.4.2.1-1.el7sat
  • satellite-debug-tools-0:6.4.2.1-1.el7sat
  • foreman-cli-0:1.20.1.34-1.el7sat
  • gofer-0:2.11.9-1.el5
  • gofer-0:2.11.9-1.el6sat
  • gofer-0:2.12.5-3.el7sat
  • gofer-0:2.12.5-3.el8sat
  • katello-agent-0:3.5.0-2.el5
  • katello-agent-0:3.5.0-2.el6sat
  • katello-agent-0:3.5.0-2.el7sat
  • katello-agent-0:3.5.0-2.el8sat
  • katello-host-tools-0:3.5.0-2.el5
  • katello-host-tools-0:3.5.0-2.el6sat
  • katello-host-tools-0:3.5.0-2.el7sat
  • katello-host-tools-0:3.5.0-2.el8sat
  • katello-host-tools-fact-plugin-0:3.5.0-2.el5
  • katello-host-tools-fact-plugin-0:3.5.0-2.el6sat
  • katello-host-tools-fact-plugin-0:3.5.0-2.el7sat
  • katello-host-tools-tracer-0:3.5.0-2.el7sat
  • katello-host-tools-tracer-0:3.5.0-2.el8sat
  • openscap-0:1.2.4-2.el6
  • openscap-debuginfo-0:1.2.4-2.el6
  • openscap-scanner-0:1.2.4-2.el6
  • pulp-puppet-tools-0:2.18.1-2.el7sat
  • pulp-rpm-handlers-0:2.18.1.5-1.el5
  • pulp-rpm-handlers-0:2.18.1.5-1.el6sat
  • puppet-agent-0:5.5.12-1.el5
  • puppet-agent-0:5.5.12-1.el6sat
  • puppet-agent-0:5.5.12-1.el7sat
  • puppet-agent-0:5.5.12-1.el8sat
  • python-argcomplete-0:1.7.0-2.el7sat
  • python-gofer-0:2.11.9-1.el5
  • python-gofer-0:2.11.9-1.el6sat
  • python-gofer-0:2.12.5-3.el7sat
  • python-gofer-proton-0:2.11.9-1.el5
  • python-gofer-proton-0:2.11.9-1.el6sat
  • python-gofer-proton-0:2.12.5-3.el7sat
  • python-hashlib-0:20081119-7.el5sat
  • python-hashlib-debuginfo-0:20081119-7.el5sat
  • python-isodate-0:0.5.0-4.el6sat
  • python-isodate-0:0.5.0-4.pulp.el5
  • python-isodate-0:0.5.0-5.pulp.el7sat
  • python-psutil-0:5.0.1-3.el7sat
  • python-psutil-debuginfo-0:5.0.1-3.el7sat
  • python-psutil-debugsource-0:5.0.1-3.el8sat
  • python-pulp-agent-lib-0:2.18.1.1-1.el5
  • python-pulp-agent-lib-0:2.18.1.1-1.el6sat
  • python-pulp-common-0:2.18.1.1-1.el5
  • python-pulp-common-0:2.18.1.1-1.el6sat
  • python-pulp-common-0:2.18.1.1-1.el7sat
  • python-pulp-manifest-0:2.18.1.5-1.el7sat
  • python-pulp-puppet-common-0:2.18.1-2.el7sat
  • python-pulp-rpm-common-0:2.18.1.5-1.el5
  • python-pulp-rpm-common-0:2.18.1.5-1.el6sat
  • python-qpid-proton-0:0.16.0-12.el6sat
  • python-qpid-proton-0:0.26.0-3.el7
  • python-qpid-proton-0:0.9-16.el5
  • python-uuid-0:1.30-4.el5
  • python2-beautifulsoup4-0:4.6.3-2.el7sat
  • python2-future-0:0.16.0-11.el7sat
  • python2-tracer-0:0.7.1-2.el7sat
  • python3-beautifulsoup4-0:4.6.3-2.el8sat
  • python3-future-0:0.16.0-11.el8sat
  • python3-gofer-0:2.12.5-3.el8sat
  • python3-gofer-proton-0:2.12.5-3.el8sat
  • python3-psutil-0:5.0.1-3.el8sat
  • python3-psutil-debuginfo-0:5.0.1-3.el8sat
  • python3-qpid-proton-0:0.26.0-3.el8
  • python3-qpid-proton-debuginfo-0:0.26.0-3.el8
  • python3-tracer-0:0.7.1-2.el8sat
  • qpid-proton-c-0:0.16.0-12.el6sat
  • qpid-proton-c-0:0.26.0-3.el7
  • qpid-proton-c-0:0.26.0-3.el8
  • qpid-proton-c-0:0.9-16.el5
  • qpid-proton-c-debuginfo-0:0.26.0-3.el8
  • qpid-proton-cpp-debuginfo-0:0.26.0-3.el8
  • qpid-proton-debuginfo-0:0.16.0-12.el6sat
  • qpid-proton-debuginfo-0:0.26.0-3.el7
  • qpid-proton-debuginfo-0:0.26.0-3.el8
  • qpid-proton-debuginfo-0:0.9-16.el5
  • qpid-proton-debugsource-0:0.26.0-3.el8
  • rubygem-foreman_scap_client-0:0.4.5-1.el6sat
  • rubygem-foreman_scap_client-0:0.4.5-1.el7sat
  • rubygem-foreman_scap_client-0:0.4.5-1.el8sat
  • rubygem-json-0:1.4.6-2.el6
  • rubygem-json-debuginfo-0:1.4.6-2.el6
  • rubygems-0:1.3.7-5.el6
  • satellite-cli-0:6.5.0-11.el7sat
  • tfm-ror52-rubygem-mime-types-0:3.2.2-1.el7sat
  • tfm-ror52-rubygem-mime-types-data-0:3.2018.0812-1.el7sat
  • tfm-ror52-rubygem-multi_json-0:1.13.1-1.el7sat
  • tfm-ror52-runtime-0:1.0-4.el7sat
  • tfm-rubygem-apipie-bindings-0:0.2.2-2.el7sat
  • tfm-rubygem-awesome_print-0:1.8.0-3.el7sat
  • tfm-rubygem-clamp-0:1.1.2-4.el7sat
  • tfm-rubygem-domain_name-0:0.5.20160310-4.el7sat
  • tfm-rubygem-fast_gettext-0:1.4.1-3.el7sat
  • tfm-rubygem-hammer_cli-0:0.15.1.2-1.el7sat
  • tfm-rubygem-hammer_cli_csv-0:2.3.1-3.el7sat
  • tfm-rubygem-hammer_cli_foreman-0:0.15.1.1-1.el7sat
  • tfm-rubygem-hammer_cli_foreman_admin-0:0.0.8-3.el7sat
  • tfm-rubygem-hammer_cli_foreman_ansible-0:0.1.1-3.el7sat
  • tfm-rubygem-hammer_cli_foreman_bootdisk-0:0.1.3.3-5.el7sat
  • tfm-rubygem-hammer_cli_foreman_discovery-0:1.0.0-3.el7sat
  • tfm-rubygem-hammer_cli_foreman_docker-0:0.0.6.1-1.el7sat
  • tfm-rubygem-hammer_cli_foreman_openscap-0:0.1.6-2.el7sat
  • tfm-rubygem-hammer_cli_foreman_remote_execution-0:0.1.0-2.el7sat
  • tfm-rubygem-hammer_cli_foreman_tasks-0:0.0.13-1.el7sat
  • tfm-rubygem-hammer_cli_foreman_templates-0:0.1.2-1.el7sat
  • tfm-rubygem-hammer_cli_foreman_virt_who_configure-0:0.0.3-3.el7sat
  • tfm-rubygem-hammer_cli_katello-0:0.16.0.11-1.el7sat
  • tfm-rubygem-hashie-0:3.6.0-1.el7sat
  • tfm-rubygem-highline-0:1.7.8-4.el7sat
  • tfm-rubygem-http-cookie-0:1.0.2-5.el7sat
  • tfm-rubygem-little-plugger-0:1.1.3-23.el7sat
  • tfm-rubygem-locale-0:2.0.9-13.el7sat
  • tfm-rubygem-logging-0:2.2.2-5.el7sat
  • tfm-rubygem-netrc-0:0.11.0-3.el7sat
  • tfm-rubygem-oauth-0:0.5.4-3.el7sat
  • tfm-rubygem-powerbar-0:2.0.1-1.el7sat
  • tfm-rubygem-rest-client-0:2.0.1-3.el7sat
  • tfm-rubygem-unf-0:0.1.3-7.el7sat
  • tfm-rubygem-unf_ext-0:0.0.6-9.el7sat
  • tfm-rubygem-unf_ext-debuginfo-0:0.0.6-9.el7sat
  • tfm-rubygem-unicode-0:0.4.4.1-6.el7sat
  • tfm-rubygem-unicode-debuginfo-0:0.4.4.1-6.el7sat
  • tfm-rubygem-unicode-display_width-0:1.0.5-5.el7sat
  • tfm-runtime-0:5.0-3.el7sat
  • tracer-common-0:0.7.1-2.el7sat
  • tracer-common-0:0.7.1-2.el8sat