id
int64
0
45.1k
file_name
stringlengths
4
68
file_path
stringlengths
14
193
content
stringlengths
32
9.62M
size
int64
32
9.62M
language
stringclasses
1 value
extension
stringclasses
6 values
total_lines
int64
1
136k
avg_line_length
float64
3
903k
max_line_length
int64
3
4.51M
alphanum_fraction
float64
0
1
repo_name
stringclasses
779 values
repo_stars
int64
0
882
repo_forks
int64
0
108
repo_open_issues
int64
0
90
repo_license
stringclasses
8 values
repo_extraction_date
stringclasses
146 values
sha
stringlengths
64
64
__index_level_0__
int64
0
45.1k
exdup_ids_cmlisp_stkv2
listlengths
1
47
3,989
changelog
spwhitton_consfigurator/debian/changelog
consfigurator (1.4.3-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Fri, 04 Oct 2024 09:31:03 +0800 consfigurator (1.4.2-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Fri, 26 Jul 2024 11:31:24 +0900 consfigurator (1.4.1-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Wed, 10 Jul 2024 08:38:00 +0800 consfigurator (1.4.0-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Thu, 09 May 2024 18:28:26 +0100 consfigurator (1.3.2-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Wed, 24 Apr 2024 08:34:43 +0100 consfigurator (1.3.1-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Mon, 12 Jun 2023 08:49:21 +0100 consfigurator (1.3.0-1) experimental; urgency=medium * New upstream release. * Add dep and build-dep on cl-parse-number. -- Sean Whitton <[email protected]> Fri, 17 Mar 2023 11:04:06 -0700 consfigurator (1.2.3-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Sun, 26 Feb 2023 10:30:49 -0700 consfigurator (1.2.2-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Mon, 20 Feb 2023 13:18:14 -0700 consfigurator (1.2.1-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Mon, 20 Feb 2023 13:07:54 -0700 consfigurator (1.2.0-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Tue, 29 Nov 2022 11:06:36 -0700 consfigurator (1.1.1-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Sun, 18 Sep 2022 15:18:33 -0700 consfigurator (1.1.0-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Tue, 02 Aug 2022 15:03:28 -0700 consfigurator (1.0.3-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Wed, 29 Jun 2022 17:38:28 -0700 consfigurator (1.0.2-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Thu, 19 May 2022 17:51:55 -0700 consfigurator (1.0.1-1) unstable; urgency=medium * New upstream release. * Add autopkgtest deps on gpg and pass. * d/tests/compile-and-tests.lisp: Set TMPDIR to AUTOPKGTEST_TMP. -- Sean Whitton <[email protected]> Wed, 11 May 2022 12:26:40 -0700 consfigurator (1.0.0-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Sat, 30 Apr 2022 12:42:44 -0700 consfigurator (0.14.0-1) unstable; urgency=medium * New upstream release. * d/copyright: update years for David Bremner to include 2022. -- Sean Whitton <[email protected]> Wed, 02 Feb 2022 13:49:48 -0700 consfigurator (0.13.0-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Wed, 15 Dec 2021 16:22:08 -0700 consfigurator (0.12.3-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Sun, 28 Nov 2021 19:10:23 -0700 consfigurator (0.12.2-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Mon, 15 Nov 2021 11:49:27 -0700 consfigurator (0.12.1-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Tue, 09 Nov 2021 17:53:33 -0700 consfigurator (0.12.0-1) unstable; urgency=medium * New upstream release. * Add deps and build-deps on cl-bordeaux-threads, libacl1-dev and libcap-dev. * Add ${sphinxdoc:Built-Using} to Built-Using. * Run 'wrap-and-sort -abst'. -- Sean Whitton <[email protected]> Mon, 08 Nov 2021 17:53:08 -0700 consfigurator (0.11.0-1) unstable; urgency=medium * New upstream release. * Add deps and build-deps on cl-anaphora and cl-osicat. -- Sean Whitton <[email protected]> Wed, 29 Sep 2021 20:06:58 -0700 consfigurator (0.10.0-1) unstable; urgency=medium * New upstream release. * Rewrite long description. -- Sean Whitton <[email protected]> Sun, 22 Aug 2021 15:53:02 -0700 consfigurator (0.9.1-1) unstable; urgency=medium * New upstream release. * Replace dep and build-dep cl-trivial-macroexpand-all -> cl-agnostic-lizard. * Add build-dep on python3-sphinx-rtd-theme. * Update copyright years. -- Sean Whitton <[email protected]> Fri, 20 Aug 2021 10:55:35 -0700 consfigurator (0.8.0-2) unstable; urgency=high * Backport some security & FFI fixes to :SETUID and :SUDO connections. -- Sean Whitton <[email protected]> Sat, 24 Jul 2021 15:54:41 -0700 consfigurator (0.8.0-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Fri, 04 Jun 2021 11:02:38 -0700 consfigurator (0.7.0-1) unstable; urgency=medium * New upstream release. * Override no-debian-changes Lintian tag. -- Sean Whitton <[email protected]> Tue, 25 May 2021 17:22:39 -0700 consfigurator (0.6.1-1) unstable; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Tue, 25 May 2021 15:35:44 -0700 consfigurator (0.6.0-1) unstable; urgency=medium * New upstream release. * Upload to unstable. * Add dep and build-dep on cl-closer-mop. * d/tests/compile-and-tests.lisp: Switch the *PACKAGE* to CONSFIGURATOR/TESTS when running tests so that there is a value for *CONSFIG*. * d/rules: also clean *.fasl from tests/. -- Sean Whitton <[email protected]> Sun, 23 May 2021 16:57:10 -0700 consfigurator (0.5.0-1) experimental; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Thu, 01 Apr 2021 23:45:51 -0700 consfigurator (0.4.1-1) experimental; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Thu, 01 Apr 2021 19:33:13 -0700 consfigurator (0.4.0-1) experimental; urgency=medium * New upstream release. * Add deps and build-deps on cl-heredoc, cl-named-readtables, cl-trivial-backtrace. * Run upstream test suite as part of autopkgtest. -- Sean Whitton <[email protected]> Thu, 01 Apr 2021 16:02:00 -0700 consfigurator (0.3.1-1) experimental; urgency=medium * New upstream release. -- Sean Whitton <[email protected]> Wed, 10 Mar 2021 12:58:59 -0700 consfigurator (0.3.0-1) experimental; urgency=medium * New upstream release. * Install consfigurator.el using dh_elpa - Add build-deps on dh-elpa, each cl-* package used by Consfigurator, sbcl - Depend on emacsen-common and Recommend emacs - Add Provides: elpa-consfigurator. -- Sean Whitton <[email protected]> Wed, 10 Mar 2021 12:42:30 -0700 consfigurator (0.2.1-1) experimental; urgency=medium * New upstream release. * Update Homepage. * Add trailing slashes to Vcs-Git and Vcs-Browser. -- Sean Whitton <[email protected]> Tue, 02 Mar 2021 19:02:08 -0700 consfigurator (0.2.0-1) experimental; urgency=medium * New upstream release. * Add dependencies on cl-babel, cl-cffi. * Add an autopkgtest, marked as superficial, to test compiling and loading. * Add "Provides: consfigurator". * Move ${sphinxdoc:Depends} Depends->Recommends to ease installing on stable. * wrap-and-sort -abst -- Sean Whitton <[email protected]> Tue, 02 Mar 2021 18:08:45 -0700 consfigurator (0.0.1-1) experimental; urgency=medium * Initial release. -- Sean Whitton <[email protected]> Wed, 24 Feb 2021 19:42:21 -0700
7,743
Common Lisp
.l
150
48.546667
79
0.744817
spwhitton/consfigurator
57
1
0
GPL-3.0
9/19/2024, 11:26:04 AM (Europe/Amsterdam)
0843f6ccd1fc8aeb56d2844d055aed17f6e10a96d7a04d94b256eaa142b147ce
3,989
[ -1 ]
3,990
rules
spwhitton_consfigurator/debian/rules
#!/usr/bin/make -f ELPA_NAME=consfigurator export ELPA_NAME %: dh $@ --with sphinxdoc,elpa override_dh_auto_build: make -C doc html info make -C emacs consfigurator.el override_dh_auto_clean: find src tests -name "*.fasl" -delete make -C doc clean
257
Common Lisp
.l
11
21.545455
38
0.756198
spwhitton/consfigurator
57
1
0
GPL-3.0
9/19/2024, 11:26:04 AM (Europe/Amsterdam)
7824b7be6e1b629e51dac2c4e183d1e257109be3cc0c08a09dcf49862b5f653a
3,990
[ -1 ]
3,991
control
spwhitton_consfigurator/debian/control
Source: consfigurator Section: admin Priority: optional Maintainer: Sean Whitton <[email protected]> Build-Depends: cl-agnostic-lizard, cl-alexandria, cl-anaphora, cl-babel, cl-bordeaux-threads, cl-cffi, cl-closer-mop, cl-heredoc, cl-interpol, cl-named-readtables, cl-osicat, cl-parse-number, cl-ppcre, cl-trivial-backtrace, debhelper-compat (= 13), dh-elpa, libacl1-dev, libcap-dev, python3-sphinx, python3-sphinx-rtd-theme, sbcl, sphinx-common, texinfo, Standards-Version: 4.5.1 Homepage: https://spwhitton.name/tech/code/consfigurator/ Vcs-Git: https://git.spwhitton.name/consfigurator/ Vcs-Browser: https://git.spwhitton.name/consfigurator/ Rules-Requires-Root: no Package: cl-consfigurator Architecture: all Depends: cl-agnostic-lizard, cl-alexandria, cl-anaphora, cl-babel, cl-bordeaux-threads, cl-cffi, cl-closer-mop, cl-heredoc, cl-interpol, cl-named-readtables, cl-osicat, cl-parse-number, cl-ppcre, cl-trivial-backtrace, emacsen-common, libacl1-dev, libcap-dev, ${misc:Depends}, Recommends: emacs, sbcl, ${sphinxdoc:Depends}, Provides: consfigurator, elpa-consfigurator, Built-Using: ${sphinxdoc:Built-Using}, Description: Lisp declarative configuration management system Consfigurator is a system for declarative configuration management using Common Lisp. You can use it to configure hosts as root, deploy services as unprivileged users, build and deploy containers, install operating systems, produce disc images, and more. Some key advantages: . * Apply configuration by transparently starting up another Lisp image on the machine to be configured, so that you can use the full power of Common Lisp to inspect and control the host. . * Also define properties of hosts in a more restricted language, that of :POSIX properties, to configure machines, containers and user accounts where you can't install Lisp. These properties can be applied using just an SSH or serial connection, but they can also be applied by remote Lisp images, enabling code reuse. . * Flexibly chain and nest methods of connecting to hosts. For example, you could have Consfigurator SSH to a host, sudo to root, start up Lisp, use the setns(2) system call to enter a Linux container, and then deploy a service. Secrets, and other prerequisite data, are properly passed along. . * Combine declarative semantics for defining hosts and services with a multiparadigmatic general-purpose programming language that won't get in your way. . Declarative configuration management systems like Consfigurator and Propellor share a number of goals with projects like the GNU Guix System and NixOS. However, tools like Consfigurator and Propellor try to layer the power of declarative and reproducible configuration semantics on top of traditional, battle-tested UNIX system administration infrastructure like distro package managers, package archives and daemon configuration mechanisms, rather than seeking to replace any of those. Let's get as much as we can out of all that existing distro policy-compliant work!
3,120
Common Lisp
.l
96
30.28125
79
0.796891
spwhitton/consfigurator
57
1
0
GPL-3.0
9/19/2024, 11:26:04 AM (Europe/Amsterdam)
bb2d38cd109c0f53f641749f3ecb121805e8a57f5eb11329358ddb8f4b01cb34
3,991
[ -1 ]
3,993
control
spwhitton_consfigurator/debian/tests/control
Test-Command: sbcl --script debian/tests/compile-and-tests.lisp Depends: gpg, pass, sbcl, @, Restrictions: allow-stderr, superficial
137
Common Lisp
.l
7
18
63
0.792308
spwhitton/consfigurator
57
1
0
GPL-3.0
9/19/2024, 11:26:04 AM (Europe/Amsterdam)
1cb4efae679e58f64051b9a786bbb5c9db946df3c2898fcd1ab753dac884d198
3,993
[ -1 ]
4,056
installation.rst
spwhitton_consfigurator/doc/installation.rst
.. _Installation: Installation ============ Debian and Debian derivatives ----------------------------- The most recent tagged release of Consfigurator is usually included in `Debian unstable`_, and the .deb there should work fine on Debian stable and testing, and derivatives like Ubuntu. After adding an apt source for unstable if necessary, ``apt-get install cl-consfigurator/unstable``. During Debian's pre-release freezes, the newest release of Consfigurator might be available in `Debian experimental`_ instead of unstable. .. _Debian unstable: https://www.debian.org/doc/manuals/debian-faq/choosing.en.html .. _Debian experimental: https://wiki.debian.org/DebianExperimental Quicklisp --------- The most recent tagged release of Consfigurator is included in the `Quicklisp`_ service: ``(ql:quickload "consfigurator")``. .. _Quicklisp: https://www.quicklisp.org/ From git -------- If you would like to follow development more closely, you can:: % git clone https://git.spwhitton.name/consfigurator ~/.local/share/common-lisp/source/consfigurator and ASDF should pick it up.
1,097
Common Lisp
.l
23
46.043478
104
0.757291
spwhitton/consfigurator
57
1
0
GPL-3.0
9/19/2024, 11:26:04 AM (Europe/Amsterdam)
bf8c4cd627ec82eab6826062935f9da3473540e3132b4da00a19f33f390d22a8
4,056
[ -1 ]
4,057
pitfalls.rst
spwhitton_consfigurator/doc/pitfalls.rst
Pitfalls and limitations ======================== Invoking properties from within properties ------------------------------------------ Properties can programmatically invoke arbitrary properties to be applied in the context of their current deployment. However, when this is done the ``:hostattrs`` subroutine of the invoked property will not be called, so, for example, prerequisite data might be missing. You will need to add a call to ``PROPATTRS`` in the invoking property's own ``:hostattrs`` subroutine. There are other risks in the vicinity: missing informational attributes might cause some other properties to misbehave. To avoid all this, consider using ``DEFPROPLIST`` to combine properties, rather than having them call each other. Attempting to work with anonymous properties or connection types ---------------------------------------------------------------- Hosts, property application specifications and deployments are mutable values, which you can build, pass around and change in your own code. For example, deployments can be built and executed programmatically. However, properties and connection types should be defined in ``.lisp`` files, loaded into Lisp, and then *not* created or modified, except by reloading. In particular, do not try to define properties and connection types programmatically, or try to dynamically rebind or flet-bind them. The reason for this restriction is that some connection types need to invoke fresh Lisp images on remote hosts with (local equivalents to) the function objects contained in properties and connections available to be called. Since function objects are not serialisable, the only way to do this is to send over the contents of your ``.lisp`` files and load the same properties and connection types into the remote Lisp. By contrast, hosts, property application specifications and deployments can be send over in serialised form. If you were to dynamically rebind properties or connection types in the root Lisp, then connections which do not start remote Lisp images would use your new definitions, but connections which start remote Lisp images would use the static definitions in your ``.lisp`` files (or lack definitions altogether). This would violate the idea in Consfigurator that properties, including nested deployments, have the same meaning regardless of the connection types they are used with. Note that you *can* programmatically determine the arguments to pass to properties upon deployment, though each of these arguments needs to be serialisable, so you can't pass anonymous functions or objects containing those. You can work around the latter restriction by defining a new property which passes in the desired anonymous function, and then adding the new property to your property application specification. Code-walking limitations ------------------------ The preprocessing of propspecs, and the conversion of unevaluated propspecs into propspecs, both require code walking. Consfigurator's implementation of this is in the function ``MAP-PROPSPEC-PROPAPPS``. However, due to limitations in the Common Lisp standard, it is not possible to implement the work of that function in a way which is both always correct and fully portable. I have not found a general purpose code walker which hooks into implementation-specific functionality and that is currently maintained, and so at present we use a best-effort portable code walker, Agnostic Lizard. This will almost always generate the correct expansions, but if you have particularly advanced macro property combinators then it is possible that ``MAP-PROPSPEC-PROPAPPS`` will return incorrectly expanded forms. For full details see Michael Raskin. 2017. "Writing a best-effort portable code walker in Common Lisp." In *Proceedings of 10th European Lisp Symposium*, Vrije Universiteit Brussel, Belgium, April 2017 (ELS2017). DOI: 10.5281/zenodo.3254669. It is possible to implement the work of ``MAP-PROPSPEC-PROPAPPS`` in terms of ``MACROEXPAND-ALL``, whose semantics are conventionally well-understood and for which fully correct implementations are available in most implementations of Common Lisp (the trivial-macroexpand-all library can be used to get at these). However, note that we cannot just call ``MACROEXPAND-ALL`` on propspecs because unquoted lists appearing as arguments to properties in atomic property applications will look like invalid function calls to the code walker. Avoiding this would seem to require wrapping the propspec in one macrolet for each known property, and this makes ``MACROEXPAND-ALL`` too slow, even if the macrolet forms are precomputed. Dumping and reinvoking Lisp --------------------------- Remote Lisp images can dump executable images of themselves using the IMAGE-DUMPED property, and some connection types work by dumping and then immediately reinvoking Lisp. However, there are some limitations to how these features can be used that are connected with changing execution context, in the way that :CHROOT.FORK, :SETUID, and the Linux namespace-entering connections do. Firstly, for at least some Lisp implementations, the build of Lisp that's running must be accessible via the filesystem in order for it to be possible to dump an image. In the case of SBCL, for example, the very same /usr/bin/sbcl and /usr/lib/sbcl/sbcl.core need to be accessible. If Consfigurator has forked into a chroot then this may not be the case. So, for example, when preparing a disk image by applying properties to a chroot, you can't easily apply a property like CRON:RUNS-CONSFIGURATOR. See the docstring for IMAGE-DUMPED for one way to handle this situation. Secondly, dumped images can fail to start up at all if they cannot reopen all the shared libraries they had open right before the dump, and if the execution context has changed, these files might not be readable anymore. For example, if Consfigurator has forked into a chroot and then dumped an image, libacl1.so might not be present at all, or -- what is more likely in the case of that particular library -- only accessible via a different path. Additionally, the use of the CFFI groveller by Consfigurator and its dependency Osicat means that the reinvoked image will try to load shared libraries out of the ~/.cache/common-lisp belonging to the user who originally started up the remote Lisp image. For example, if :SETUID has been used to switch from root to an unprivileged user, and then an image is dumped, the unprivileged user won't be able to execute that image. This is because the unprivileged user cannot typically read files under /root/.cache/common-lisp. This second issue could be partly mitigated using CFFI's ``STATIC-PROGRAM-OP`` ASDF operation, as described in the "Static Linking" section of the CFFI manual. This is not currently implemented, for several reasons. Firstly, it is less portable than the current CFFI features we use, and does not actually solve the problem of inaccessible system libraries like libacl1.so, only the problem of files under ~/.cache/common-lisp. Secondly, there are unsolved difficulties integrating it with some of Consfigurator's standard usage patterns, such as calls to TRY-REGISTER-DATA-SOURCE which appear directly in consfigs (STATIC-PROGRAM-OP tries to load up consfigs in another Lisp image without a way for us to bind *NO-DATA-SOURCES*). Thirdly, `CFFI currently tries to reopen all shared libraries upon reinvocation regardless of the use of STATIC-PROGRAM-OP <https://github.com/cffi/cffi/pull/163>`_. Finally, many builds of SBCL (including Debian's at the time of writing) can't get all the way through STATIC-PROGRAM-OP without hacks like manually setting the SBCL_HOME environment variable before starting the attempt.
7,769
Common Lisp
.l
112
68.214286
80
0.799215
spwhitton/consfigurator
57
1
0
GPL-3.0
9/19/2024, 11:26:04 AM (Europe/Amsterdam)
7bea424930fd8940c81d88e4dcf8e0a79e1083f4da5576584402edad035d3b5c
4,057
[ -1 ]
4,058
GNUmakefile
spwhitton_consfigurator/doc/GNUmakefile
include ../consfigurator.mk LISP = $(wildcard ../src/property/*.lisp ../src/util/*.lisp) \ ../src/connection.lisp ../src/property.lisp ../src/propspec.lisp \ ../src/host.lisp ../src/combinator.lisp ../src/deployment.lisp \ ../src/data.lisp ../src/image.lisp ../src/util.lisp PAGES = $(patsubst ../src/%,%,$(LISP:lisp=rst)) .PHONY: all all: html info .PHONY: html info html info: $(PAGES) conf.py $(wildcard *.rst */*.rst) sphinx-build -M $@ . _build reader.rst: $(PAGES) &: $(wildcard *.rst.in */*.rst.in) $(LISP) $(SBCL) --eval "(mapc #'consfigurator::build-manual-rst \ uiop:*command-line-arguments*)" --quit $(PAGES) .PHONY: clean clean: rm -rf _build rm -f $(PAGES) # property.lisp contains the definition of BUILD-MANUAL-RST. .SECONDEXPANSION: %.rst: $$(wildcard $$*.rst.in) ../src/$$(*D)/$$(*F).lisp ../src/property.lisp $(SBCL) --eval '(consfigurator::build-manual-rst "$@")' --quit
921
Common Lisp
.l
23
37.695652
77
0.648709
spwhitton/consfigurator
57
1
0
GPL-3.0
9/19/2024, 11:26:04 AM (Europe/Amsterdam)
8eb3785a82983dd38c17f19de0cf1c195ac4dab8700cdd68571cc8a99dce25d2
4,058
[ -1 ]
4,059
os_installation.rst
spwhitton_consfigurator/doc/tutorial/os_installation.rst
OS installation =============== Consfigurator implements a number of methods for installing operating systems. .. include:: conventions.rst Build and write out a raw disk image ------------------------------------ This is the simplest method, and Consfigurator has decent support built-in: see the previous tutorial. It is less practical for systems which have large disks and/or complex, nested partitioning schemes, such as ext4 on LVM on LUKS, as is common for GNU/Linux laptops. In such cases it is nontrivial to expand the partitions to fill the whole physical disk after the first successful boot, so the disk image has to be the same size as the target disk, which can be unwieldy. Installing directly to target host's primary storage ---------------------------------------------------- This is similar to the previous method, but it avoids the problem of having to expand filesystems upon first boot. Suppose we have connected the target host's hard disk to our laptop, or transferred its boot SD card to our laptop's SD card reader, etc.. Then we can install to it directly::: CONSFIG> (hostdeploy-these laptop.example.com (disk:first-disk-installed-for nil test.example.com "/dev/mmcblk0")) Live replacement of provider cloud images ----------------------------------------- See the docstring of the INSTALLER:CLEANLY-INSTALLED-ONCE property. This is an efficient way to handle machines in faraway datacentres. Consfigurator's support for installing Debian stable this way has been fairly well tested, and the technique should work for other operating systems too, once Consfigurator has been taught how to bootstrap them. Build a specialised live image ------------------------------ This fourth approach requires more work in your consfig. With this approach you build a live image containing everything you need to run Consfigurator on the hardware to which you want to install. After booting up the live system, you can either run Consfigurator manually, or you can set things up to have it run automatically upon boot. Consfigurator's ability to bootstrap fresh root filesystems typically requires Internet access, but an alternative is to build and customise a chroot corresponding to the root filesystem of the target system, and include that in the live image, such that after boot Consfigurator just needs to partition the disk, copy in the contents of the prebuilt chroot, and update /etc/fstab and /etc/crypttab with UUIDs. Here is a minimal version of something like that:: (try-register-data-source :git-snapshot :name "consfig" :repo #P"common-lisp/consfig/" :depth 1 :branch "master") (defproplist live-installer-built-for :lisp (with-chroot-for) "Build a custom Debian Live system at /srv/live/installer.iso. Typically this property is not applied in a DEFHOST form, but rather run as needed at the REPL. The reason for this is that otherwise the whole image will get rebuilt each time a commit is made to ~/common-lisp/consfig/." (:desc "Debian Live system image built") (disk:debian-live-iso-built. nil "/srv/live/installer.iso" (os:debian-stable "bullseye" :amd64) (hostname:configured "debian") (apt:installed "sudo" "task-english" "emacs" "sbcl" "slime" "cl-consfigurator" "build-essential" "lvm2" "cryptsetup" "gdisk" "kpartx" "dosfstools") (user:has-account "user") (user:has-enabled-password "user" :initial-password "live") (file:exists-with-content "/etc/sudoers.d/user" '("user ALL=(ALL:ALL) NOPASSWD: ALL") :mode #o600) (as "user" (git:snapshot-extracted "consfig" "common-lisp/" :replace t)) (chroot:os-bootstrapped-for nil (merge-pathnames (get-hostname with-chroot-for) "/srv/chroot/") with-chroot-for))) Supposing we've a DEFHOST form for test.example.com, on our laptop we could then use:: CONSFIG> (hostdeploy-these laptop.example.com (live-installer-built-for test.example.com)) Then once the live system has booted on the target host, you'd complete the installation using something like this::: CONSFIG> (deploy-these (:sudo :sbcl) "debian" (os:debian-stable "bullseye" :amd64) (disk:volumes-installed-for nil test.example.com :leave-open t :chroot "/srv/chroot/test.example.com") This approach requires that a ``:DEVICE-FILE`` is specified for each of the host's physical disks. To prepare a live image that is capable of installing more than one system without an Internet connection, you'd probably need to investigate including an apt repo, or equivalent, in the live system, and point Consfigurator's OS bootstrapping properties at that.
4,735
Common Lisp
.l
81
54.580247
83
0.733319
spwhitton/consfigurator
57
1
0
GPL-3.0
9/19/2024, 11:26:04 AM (Europe/Amsterdam)
6ce84bc71e22f862127014020827b35a6860c2460dc81811942dae1905447d27
4,059
[ -1 ]
4,060
Makefile
spwhitton_consfigurator/emacs/Makefile
include ../consfigurator.mk consfigurator.el: consfigurator.el.in $(SBCL) --eval '(consfigurator::dump-properties-for-emacs "$<" "$@")'\ --quit
148
Common Lisp
.l
4
35
71
0.706294
spwhitton/consfigurator
57
1
0
GPL-3.0
9/19/2024, 11:26:04 AM (Europe/Amsterdam)
81febdbf503f57465a7a17231b20eae72df048cfb70fac8752a3013fb136960d
4,060
[ -1 ]
4,061
consfigurator.el.in
spwhitton_consfigurator/emacs/consfigurator.el.in
;;; consfigurator.el --- Utilities for Consfigurator consfigs -*- lexical-binding:t -*- ;; Copyright (C) 2021, 2023 Sean Whitton ;; Copyright (C) 2002-2023 Free Software Foundation, Inc. ;; Author: Sean Whitton <[email protected]> ;; Maintainer: Sean Whitton <[email protected]> ;; Version: 1.4.3 ;; URL: https://git.spwhitton.name/consfigurator/tree/emacs/consfigurator.el.in ;; Keywords: languages, lisp, syntax, unix ;; This file is free software; you can redistribute it and/or modify ;; it under the terms of the GNU General Public License as published by ;; the Free Software Foundation, either version 3 of the License, or ;; (at your option) any later version. ;; This file is distributed in the hope that it will be useful, ;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ;; GNU General Public License for more details. ;; You should have received a copy of the GNU General Public License ;; along with this program. If not, see <https://www.gnu.org/licenses/>. ;;; Commentary: ;; Utilities for working with Consfigurator consfigs from Emacs. ;; Please see <https://spwhitton.name/tech/code/consfigurator/> for more ;; information about Consfigurator. ;;; Code: (require 'lisp-mode) (require 'perl-mode) (defgroup consfigurator nil "Options for Consfigurator Emacs utilities." :group 'tools) (defcustom consfigurator-auto-activate-indentation-hints t "Whether `consfigurator-lisp-mode' should call `consfigurator-activate-indentation-hints'. Activation of the indentation hints is not buffer-local." :type 'boolean :group 'consfigurator) ;;;###autoload (defun activate-consfigurator-indentation-hints () "Activate indentation hints for Consfigurator properties. Note that these hints assume you're using the recommended consfig defpackage, where the :consfigurator package is used unqualified, and packages providing properties have local nicknames corresponding to the final dot-delimited component of their names." (interactive) ;; Properties @putforms@ ;; Other operators (put 'with-unapply 'common-lisp-indent-function '(&body)) (put 'os:typecase 'common-lisp-indent-function '(&rest (&whole 2 &rest 1))) (put 'os:etypecase 'common-lisp-indent-function '(&rest (&whole 2 &rest 1)))) (defun consfigurator--finish-propertize-qq-heredoc (limit) (let ((state (syntax-ppss)) ender) (cond ((and (nth 4 state) (setq ender (cdr (get-text-property (nth 8 state) 'syntax-table)))) (when (search-forward ender limit t) (let ((char (- (point) (length ender)))) (put-text-property (1- char) char 'syntax-table (eval-when-compile (string-to-syntax "!"))) (put-text-property (- (nth 8 state) (length ender) 3) (point) 'syntax-multiline t)))) ;; Based on `perl-syntax-propertize-special-constructs', which see. ((and (nth 3 state) (or (not (characterp (nth 3 state))) (get-text-property (nth 8 state) 'syntax-table))) (let* ((startpos (point)) (twoargs (save-excursion (let (parse-sexp-lookup-properties) (goto-char (nth 8 state)) (skip-syntax-backward "w ") (member (buffer-substring (point) (progn (forward-word-strictly 1) (point))) '("tr" "s" "y"))))) (char (char-after (nth 8 state))) middle (close (cdr (assq char perl-quote-like-pairs))) (st (perl-quote-syntax-table char))) (when (with-syntax-table st (if close (condition-case nil (progn (goto-char (1+ (nth 8 state))) (up-list 1) t) (scan-error (goto-char startpos) nil)) (not (or (nth 8 (parse-partial-sexp (if twoargs (1+ (nth 8 state)) (point)) limit nil nil state 'syntax-table)) (and twoargs (not close) (setq middle (point)) (nth 8 (parse-partial-sexp (point) limit nil nil state 'syntax-table))))))) (if (and middle (eq char ?\")) (put-text-property (1- middle) middle 'syntax-table (eval-when-compile (string-to-syntax "."))) (put-text-property (1- (point)) (point) 'syntax-table (if close (eval-when-compile (string-to-syntax "|")) (eval-when-compile (string-to-syntax "\""))))) (put-text-property (nth 8 state) (point) 'syntax-multiline t) (when (and twoargs close (< (point) limit)) (put-text-property (point) (1+ (point)) 'syntax-table (if (assq (char-after) perl-quote-like-pairs) (eval-when-compile (string-to-syntax "|")) (eval-when-compile (string-to-syntax "\"")))) (forward-char 1) (consfigurator--finish-propertize-qq-heredoc limit)))))))) (defun consfigurator-syntax-propertize-function (start end) "`syntax-propertize-function' for Consfigurator's readtable. Modes that use this should add `syntax-propertize-multiline' to `syntax-propertize-extend-region-functions'." (goto-char start) (consfigurator--finish-propertize-qq-heredoc end) (cl-flet ((in-string-or-comment-p () (nth 8 (save-excursion (syntax-ppss (match-beginning 0)))))) (let (case-fold-search) (funcall (syntax-propertize-rules ("#\\(>>?\\)~?\\(.+?\\)\\1\\([^z-a]\\)" (3 (ignore (or (in-string-or-comment-p) (let ((beg (match-beginning 3)) (ender (match-string 2))) (put-text-property beg (1+ beg) 'syntax-table (cons (eval-when-compile (car (string-to-syntax "!"))) ender)) (consfigurator--finish-propertize-qq-heredoc end)))))) ((rx (| (: (group-n 1 "#?" (group-n 2 (opt (| "rx" ?r ?x)))) (group-n 3 (not (in alnum ?\\)))) (: (group-n 1 ?# (0+ digit) (opt ?!) ?~ (group-n 2 (opt (| "tr" ?m ?s ?y)))) (group-n 3 nonl)))) (1 (and (not (in-string-or-comment-p)) (eval-when-compile (string-to-syntax "'")))) ;; Based on code in one branch of `perl-syntax-propertize-function'. (3 (ignore (or (in-string-or-comment-p) (let* ((beg (match-beginning 3)) (char (char-after beg)) (prop (cond ((assq char perl-quote-like-pairs) (eval-when-compile (string-to-syntax "|"))) ((and (eq char ?\") (not (member (match-string 2) '("tr" "s" "y")))) nil) (t (eval-when-compile (string-to-syntax "\"")))))) (put-text-property beg (1+ beg) 'syntax-table prop) (consfigurator--finish-propertize-qq-heredoc end))))))) (point) end)))) (defun consfigurator--lisp-indent-function (indent-point state) ;; Don't indent to below trailing modifiers like the 'g' in '#~/foo/g'. (or (save-excursion (goto-char (1+ (nth 1 state))) (and (looking-at "#[[:digit:]]*!?~") (current-column))) (common-lisp-indent-function indent-point state))) ;; `slime-lisp-mode-hook' runs the hooks for `slime-mode' and only then sets ;; `lisp-indent-function', so I can't see a cleaner way to override it. (defun consfigurator--slime-lisp-mode-hook () (when (derived-mode-p 'consfigurator-lisp-mode) (setq-local lisp-indent-function #'consfigurator--lisp-indent-function))) (advice-add 'slime-lisp-mode-hook :after #'consfigurator--slime-lisp-mode-hook) ;;;###autoload (define-derived-mode consfigurator-lisp-mode lisp-mode "Lisp" "Derivative of `lisp-mode' for files using Consfigurator's readtable." (add-hook 'syntax-propertize-extend-region-functions #'syntax-propertize-multiline t t) (setq-local syntax-propertize-function #'consfigurator-syntax-propertize-function lisp-indent-function #'consfigurator--lisp-indent-function) (when consfigurator-auto-activate-indentation-hints (activate-consfigurator-indentation-hints))) (provide 'consfigurator) ;;; consfigurator.el ends here
7,813
Common Lisp
.l
188
36.648936
88
0.668157
spwhitton/consfigurator
57
1
0
GPL-3.0
9/19/2024, 11:26:04 AM (Europe/Amsterdam)
9d596c392c7cfae525968e04eb80cf3205d8e03b1bee36a667ee4eb8038dcef6
4,061
[ -1 ]
4,062
release
spwhitton_consfigurator/scripts/release
#!/bin/sh set -e if [ "$#" -ne 1 ]; then echo >&2 "usage: scripts/release VERSION" exit 1 fi version=$1 if ! (git diff-index --quiet --cached HEAD && \ git diff-files --quiet && \ test -z "$(git status --porcelain)" \ ) >/dev/null 2>&1; then echo >&2 "must commit first" exit 1 fi perl -pi -we's/:version ".+"/:version "'$version'"/' consfigurator.asd perl -pi -we's/^;; Version: .+/;; Version: '$version'/' \ emacs/consfigurator.el.in perl -pi -we"s/release = '.+'/release = '$version'/" doc/conf.py perl -MPOSIX=strftime -pi \ -we's/^\Q'$version' (unreleased)\E$/ strftime "'$version' (%Y-%m-%d)", localtime/e' doc/news.rst dist=$(dpkg-parsechangelog -SDistribution) if [ "$dist" = "UNRELEASED" ]; then dch -v$version-1 "" else dch -v$version-1 New upstream release. fi dch -r changed_files="consfigurator.asd emacs/consfigurator.el.in doc/conf.py doc/news.rst debian/changelog" if ! dpkg-parsechangelog | grep -q "New upstream release."; then echo >&2 'Debian changelog lacks line "New upstream release."' git checkout -- $changed_files exit 1 fi msg="release Consfigurator $version (-1 to Debian unstable)" git commit -s -m"$msg" -- $changed_files git tag -s -m"$msg" v$version git deborig dgit sbuild --run-piuparts --run-autopkgtest
1,332
Common Lisp
.l
39
30.769231
101
0.656786
spwhitton/consfigurator
57
1
0
GPL-3.0
9/19/2024, 11:26:04 AM (Europe/Amsterdam)
dad8f348e008d76b4e4e733fa9f2561d6d52aa2a0a60563faa5c49a7d1d1d346
4,062
[ -1 ]
4,077
openapi.lisp
fisxoj_sanity-clause/examples/openapi.lisp
;; load required libraries (ql:quickload '(jonathan sanity-clause)) (defclass contact-object () ((name :type string :data-key "name" :documentation "The identifying name of the contact person/organization.") (url :type string :data-key "url" :field-type :uri :documentation "The URL pointing to the contact information. MUST be in the format of a URL.") (email :type string :data-key "email" :field-type :email :documentation "The email address of the contact person/organization. MUST be in the format of an email address.")) (:metaclass sanity-clause:validated-metaclass)) (defclass license-object () ((name :type string :data-key "name" :documentation "The license name used for the API.") (url :type string :data-key "url" :field-type :uri :documentation "A URL to the license used for the API. MUST be in the format of a URL.")) (:metaclass sanity-clause:validated-metaclass)) (defclass info-object () ((title :type string :data-key "title" :required t :documentation "The title of the application.") (description :type string :data-key "description" :documentation "A short description of the application. GFM syntax can be used for rich text representation.") (terms-of-service :type string :data-key "termsOfService" :documentation "The Terms of Service for the API.") (contact :type contact-object :field-type :nested :data-key "contact" :element-type contact-object :documentation "The contact information for the exposed API.") (license :type license-object :field-type :nested :element-type license-object :data-key "license" :documentation "The license information for the exposed API.") (version :type string :documentation "Provides the version of the application API (not to be confused with the specification version)." :data-key "version" :required t)) (:metaclass sanity-clause:validated-metaclass)) ;;; Deserialize the json from the file into instances of these classes (let ((v2-info (alexandria:read-file-into-string (merge-pathnames "v2-info.json" *load-truename*)))) (sanity-clause:load 'info-object (jojo:parse v2-info :as :alist))) ;; => #<INFO-OBJECT {10045F9C93}> (slot-value * 'license) ;; => #<LICENSE-OBJECT {1006600BE3}> (slot-value * 'name) ;; => "Apache 2.0"
2,593
Common Lisp
.lisp
58
36.810345
126
0.653191
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
874976f21c3919353fb42c823b1e24020a9e485cff11cb56d44cf447992bbc0c
4,077
[ -1 ]
4,078
schema.lisp
fisxoj_sanity-clause/src/schema.lisp
(defpackage :sanity-clause.schema (:use #:cl #:alexandria #:arrows) (:export #:validated-metaclass) (:documentation "The :class:`validated-metaclass` is a way of defining classes that have contracts enforced for them. :: (defclass person () ((favorite-dog :type symbol :field-type :member :members (:wedge :walter) :data-key \"favoriteDog\" :required t) (age :type (integer 0) :data-key \"age\" :required t) (potato :type string :data-key \"potato\" :required t)) (:metaclass validated-metaclass)) The above defines a class that can be instantiated with :function:`sanity-clause.protocol:load, but will error if the initargs don't satisfy the contract required by the field. :: (sanity-clause:load 'person '((\"favoriteDog\" . \"wedge\") (\"age\" . 10) (\"potato\" . \"weasel\")) Some special types can be specifed with lisp type specs, like ``age`` above, which will generate an :class:`sanity-clause.field:integer-field`, with validations requiring the value be at least 0. **Nota Bene:** At the moment, there is no validation done on updating slots after instances are created and only instances created with :function:`sanity-clause.protocol:load` are checked. Using :function:`make-instance` doesn't validate anything.")) (in-package :sanity-clause.schema) (defun class-initargs (class) "Collect the initargs for :param:`class`, which is either a class or a symbol naming a class." (unless (c2mop:classp class) (setf class (find-class class))) (-> (loop for slot in (c2mop:class-slots class) collecting (c2mop:slot-definition-initargs slot)) alexandria:flatten)) (defun take-properties (take-list from) "Takes keys from :param:`take-list` from the provided plist :param:`from`." (let (found others) (doplist (k v from) (if (member k take-list) (appendf found (list k v)) (appendf others (list k v)))) (values found others))) (defun merge-plist (keys list1 list2) "Merge the keys :param:`keys` on :param:`list1` and :param:`list2`." (multiple-value-bind (take1 others1) (take-properties keys list1) (multiple-value-bind (take2 others2) (take-properties keys list2) (append (loop for key in keys appending (list key (append (getf take1 key) (getf take2 key)))) others1 others2)))) (defun slot-type-to-field-initargs (typespec) "Sometimes, it's useful to try to infer the field type from a lisp type-spec. For example:: (integer 0 10) should produce a field that expects integers ``(<= 0 n 10)``. In the event the type isn't a simple type, assume it's a class with metaclass :class:`validated-metaclass` and try to use that instead." (let ((typespec (ensure-list typespec))) (case (car typespec) (integer (values (find-class 'sanity-clause.field:integer-field) (list :validator (list (lambda (v) (sanity-clause.validator:int v :min (second typespec) :max (third typespec))))))) (string (values (find-class 'sanity-clause.field:string-field) (when-let ((length (second typespec))) (list :validator (list (lambda (v) (sanity-clause.validator:str v :max-length length :min-length length))))))) (real (values (find-class 'sanity-clause.field:real-field) nil)) ;; Try to identify classes that are validated-metaclass classes, which can be used as fields ;; when composing classes with others. (otherwise (if-let ((field-class (find-class (car typespec) nil))) (when (eq (class-of field-class) (find-class 'validated-metaclass)) field-class)))))) (defun initargs-for-slot (initargs) "Collects arguments for and initializes a field and then returns it along with the cleaned up :param:`initargs`. This list can then be passed as the initargs to :class:`validated-field-slot-definition`." (multiple-value-bind (field-class field-initargs-from-type) ;; Use the value of :field-type preferentially to whatever we ;; might or might not have derived from :type (if-let ((field-type (getf initargs :field-type))) (sanity-clause.field:find-field field-type) (slot-type-to-field-initargs (getf initargs :type))) (multiple-value-bind (field-initargs others) (take-properties (class-initargs field-class) initargs) ;; Try to set data-key based on an initarg ;; FIXME: probably better to be smart about which initarg we use ;; or possibly refactor to allow many possible data sources. (let* ((data-key (or (first (getf initargs :initargs)) (string-downcase (getf initargs :name)))) (field (apply #'sanity-clause.field:make-field field-class (list* :data-key (getf initargs :data-key data-key) (merge-plist '(:validator) field-initargs-from-type field-initargs))))) ;; Remove this one special property, too, which isn't an initarg for either the ;; field or the class. (remove-from-plist others :field-type) (list* :field-instance field others))))) (defclass validated-metaclass (standard-class) ()) (defmethod make-instance :around ((class validated-metaclass) &rest initargs &key ((data data))) (c2mop:ensure-finalized class) (let ( ;; There's one special case here to read values from environment variables if the &rest args ;; passed here are '(:source :env) (data-source (if (equal '(:source :env) data) :env data)) (instance (apply #'call-next-method class (remove-from-plist initargs 'data :source)))) (dolist (slot (c2mop:class-slots class)) (let ((field (field-of slot))) (when (and (sanity-clause.field:load-field-p field) ;; Don't bother trying to load something we don't have a data-key for (sanity-clause.field:data-key-of field)) (let ((value (sanity-clause.protocol:resolve field data-source))) (unless (eq value :missing) (setf (c2mop:slot-value-using-class class instance slot) value)))))) (values instance))) (defmethod c2mop:validate-superclass ((mc validated-metaclass) (c standard-object)) (declare (ignore c mc)) t) (defclass validated-slot-definition () ((field :accessor field-of :type sanity-clause.field:field :initarg :field-instance))) (defclass validated-direct-slot-definition (validated-slot-definition c2mop:standard-direct-slot-definition) ()) (defclass validated-effective-slot-definition (validated-slot-definition c2mop:standard-effective-slot-definition) ()) (defmethod c2mop:direct-slot-definition-class ((class validated-metaclass) &key) 'validated-direct-slot-definition) (defmethod c2mop:effective-slot-definition-class ((class validated-metaclass) &key) 'validated-effective-slot-definition) (defmethod shared-initialize :around ((slot validated-direct-slot-definition) slot-names &rest initargs &key &allow-other-keys) ;; This cleverly extracts the initargs for the field that will be stored on the slot ;; and returns the other arguments that are the usual initargs for a standard-direct-slot (apply #'call-next-method slot slot-names (initargs-for-slot initargs))) (defmethod c2mop:compute-effective-slot-definition :around ((class validated-metaclass) name direct-slot-definitions) ;; Make sure we set the field to the one defined on the most-specific (left-most) ;; direct slot definiton inherited by this class. (let ((effective-slot (call-next-method))) (setf (field-of effective-slot) (some #'field-of direct-slot-definitions)) effective-slot)) ;;; Code to add classes to the protocol for list-based schemas sanity-clause.schema:load ;;; This is useful for making classes from alists (ie. not using the ``make-instance`` interface. (defmethod sanity-clause.protocol:get-value ((slot validated-slot-definition) object) (declare (ignore field-name)) (sanity-clause.protocol:get-value (field-of slot) object)) ;;; Implementations of the load method for lists or metaclasses (defmethod sanity-clause.protocol:load ((schema list) data &optional format) (declare (ignore format)) (loop for (marker field) on schema by #'cddr unless (sanity-clause.field:data-key-of field) do (setf (sanity-clause.field:data-key-of field) marker) when (sanity-clause.field:load-field-p field) appending (list marker (sanity-clause.protocol:resolve field data (list schema))))) (defmethod sanity-clause.protocol:load ((symbol symbol) data &optional format) (declare (ignore format)) (sanity-clause.protocol:load (find-class symbol) data)) (defmethod sanity-clause.protocol:load ((class validated-metaclass) data &optional format) (declare (ignore format)) (make-instance class 'data data)) ;;; Implementations of the dump method for lists or metaclasses (defmethod sanity-clause.protocol:dump ((schema symbol) data &optional format) (sanity-clause.protocol:dump (find-class schema) data format)) (defmethod sanity-clause.protocol:dump ((schema list) (data list) &optional format) (loop for (marker field) on schema by #'cddr for value = (getf data marker) for field-name = (or (sanity-clause.field:attribute-of field) (string marker)) when (sanity-clause.field:dump-field-p field) do (sanity-clause.protocol:validate field value) and if (eq format :alist) collect (cons field-name value) else append (list field-name value)))
10,140
Common Lisp
.lisp
182
47.005495
251
0.668457
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
2b0026e816698a40f692428e760e6ea83a0ced69e345714bed1fa7cab9613576
4,078
[ -1 ]
4,079
util.lisp
fisxoj_sanity-clause/src/util.lisp
(defpackage sanity-clause.util (:use #:cl #:arrows #:alexandria) (:export #:get-value #:do-key-values)) (in-package #:sanity-clause.util) (defun lisp-name->env-name (lisp-name) "Convert kebab case to upper snake case, e.g. ``some-name => SOME_NAME``" (->> lisp-name string-upcase (str:replace-all "-" "_"))) (defun get-value (object key &optional default) "Generic reader function for lists and class instances. Returns a ``(values value found-p)`` so you can tell if the value was in the list or not. Can also read from the environment if given ``:env`` as OBJECT." (if (and (keywordp object) (eq object :env)) ;; if key is a string, assume it's already an environment variable name like MY_VARIABLE, ;; if a symbol, assume we have to convert from kebab case to upper snake case. (let ((env-variable-name (etypecase key (string key) (symbol (lisp-name->env-name key))))) (values (or (uiop:getenvp env-variable-name) default) (not (not (uiop:getenvp env-variable-name))))) (etypecase object (standard-object (if (and (slot-exists-p object key) (slot-boundp object key)) (values (slot-value object key) t) (values default nil))) (trivial-types:property-list (values (getf object key default) (not (null (find key object))))) (trivial-types:association-list (let* ((assoc-cons (assoc key object :test #'string-equal)) (value (or (cdr assoc-cons) default))) (values value (not (null assoc-cons))))) (hash-table (gethash key object default))))) (defmacro do-key-values ((key value) data &body body) (with-gensyms (alist) `(let ((,alist (etypecase ,data (hash-table (hash-table-alist ,data)) (trivial-types:property-list (plist-alist ,data)) (trivial-types:association-list ,data)))) (loop for (,key . ,value) in ,alist do (progn ,@body)))))
2,027
Common Lisp
.lisp
46
36.804348
214
0.629705
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
05d5c611121dfe82356ed4030bd95ac4f15b1e05cee6035cc2eef6378d197957
4,079
[ -1 ]
4,080
protocol.lisp
fisxoj_sanity-clause/src/protocol.lisp
(defpackage sanity-clause.protocol (:use :cl) (:shadow #:load) (:export #:resolve #:deserialize #:serialize #:validate #:get-value #:load #:dump) (:documentation "The methods that govern behavior in sanity-clause. The methods relating to fields are: * :function:`resolve` * :function:`deserialize` * :function:`serialize` * :function:`validate` * :function:`get-value` The methods relating to schemas are: * :function:`load` * :function:`dump`")) (in-package :sanity-clause.protocol) (defgeneric resolve (field data &optional parents) (:documentation "A function that encapsulates getting, corecing, and validating values for a field. Calls :function:`get-value`, :function:`deserialize`, and :function:`validate`.")) (defgeneric deserialize (field value) (:documentation "Converts the value retrieved from the raw data into the datatype the field expects to work with, or fails, raising a :class:`sanity-clause.field:conversion-error`.")) (defgeneric serialize (field value) (:documentation "Converts the value of a field into another representation.")) (defgeneric validate (field value) (:documentation "Run the validation checks for a given field and raise a :class:`sanity-clause.field:validation-error` if it is invalid.")) (defgeneric get-value (field object) (:documentation "Tries to fetch the value corresponding to the field from some datastructure. :param:`field-name` is used if no attribute is explicitly set on the field.")) (defgeneric load (schema data &optional format) (:documentation "Deserializes :param:`data` into an instance of :param:`schema`. Fills in default values and validates fields. If :param:`schema` is ``:env``, it will try to load from environment variables.")) (defgeneric dump (schema data &optional format) (:documentation "WARNING: This isn't fully tested/supported, but it might work! I reserve the right to change the API in breaking ways, though. dump takes some data an serializes it to a plist or alist based on :param:`format`, which can be set to, well, ``:plist`` or ``:alist``."))
2,114
Common Lisp
.lisp
36
55.527778
213
0.746965
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
34c9bb3ee25a97de21579881f59ab3a37cd7d67f29eca141b1977d3a0add99b7
4,080
[ -1 ]
4,081
validator.lisp
fisxoj_sanity-clause/src/validator.lisp
(defpackage sanity-clause.validator (:use #:cl #:arrows #:alexandria) (:shadow #:real) (:export #:str #:int #:real #:email #:uuid #:not-empty #:hydrate-validators #:ensure-validator) (:documentation "Some validation functions that can be used with fields to make sure data has certain properties.")) (in-package :sanity-clause.validator) (defun ensure-validator (keyword-spec) "Find a validator function by keyword-spec and return the function represented by the spec unless it's already a function." (if (functionp keyword-spec) keyword-spec (let ((keyword-spec (ensure-list keyword-spec)) (validator-package (find-package :sanity-clause.validator))) (lambda (value) (apply (find-symbol (string-upcase (car keyword-spec)) validator-package) value (cdr keyword-spec)))))) (defun hydrate-validators (spec-plist) "Takes a list of validators in the form of keywords and turns them into living function references." (when-let ((validator-spec (getf spec-plist :validator))) (setf (getf spec-plist :validator) (mapcar #'ensure-validator validator-spec))) spec-plist) (defmacro fail (value reason &rest format-args) `(format nil ,(format nil "Value ~~a ~S" reason) ,value ,@format-args)) (defun int (value &key (radix 10) max min) "Accepts a :param:`value` as an integer or string. If :param:`value` is a string, interpret it as a value with base- :param:`radix`. If specified, make sure :param:`min` <= :param:`value` <= :param:`max`." (handler-case (let ((number (etypecase value (string (parse-integer value :radix radix)) (integer value)))) (cond ((and max (> number max)) (fail value "must be larger smaller than ~a" max)) ((and min (< number min)) (fail value "must be larger than ~a" min)) (t nil))) (parse-error (e) (declare (ignore e)) (fail value "must be parseable as an integer")))) (defun bool (value) "Attempts to convert :param:`value` to a ``t`` or ``nil`` by comparing it to a list of stringy true or false values. Throws a :class:`<validation-error>` if it can't figure out if :param:`value` is truthy or falsey." (cond ((member value '("y" "yes" "t" "true" "on" "enable" ) :test #'string-equal) nil) ((member value '("n" "no" "f" "false" "off" "disable") :test #'string-equal) nil) (t (fail value "is not a valid boolean value")))) (defun str (value &key min-length max-length) "Checks that :param:`value` is a string. If specified, checks that :param:`min-length` <= ``(length value)`` <= :param:`max-length`." (cond ((not (typep value 'string)) (fail value "must be a string.")) ((and min-length (< (length value) min-length)) (fail value "string length must be > ~d" min-length)) ((and max-length (> (length value) max-length)) (fail value "string length must be < ~d" max-length)) (t nil))) (defun email (value) "Checks that the input resembles an email." (unless (ppcre:scan ".+@.+\\\..{2,}" value) "Not a valid email address.")) (let ((uuid-scanner (ppcre:create-scanner '(:sequence :start-anchor (:greedy-repetition 8 8 (:char-class (:range #\0 #\9) (:range #\a #\f))) #\- (:greedy-repetition 4 4 (:char-class (:range #\0 #\9) (:range #\a #\f))) #\- (:greedy-repetition 4 4 (:char-class (:range #\0 #\9) (:range #\a #\f))) #\- (:greedy-repetition 4 4 (:char-class (:range #\0 #\9) (:range #\a #\f))) #\- (:greedy-repetition 12 12 (:char-class (:range #\0 #\9) (:range #\a #\f))) :end-anchor) :case-insensitive-mode t))) (defun uuid (value) "Checks that a value is a string that resembles a uuid." (unless (ppcre:scan uuid-scanner value) "Is not a valid uuid."))) (defun not-empty (value) "Checks that some value has been supplied. Note: this won't work well with boolean values because NIL is falsey." (when (emptyp value) "Must not be empty."))
4,162
Common Lisp
.lisp
89
40.247191
219
0.626115
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
6207a550ba94aefbe53f51aab8191851eb9d4b8b471b5378eba562c2bd7f400b
4,081
[ -1 ]
4,082
serde.lisp
fisxoj_sanity-clause/src/serde.lisp
(defpackage sanity-clause.serde (:use #:cl #:alexandria)) (in-package #:sanity-clause.serialize) (defvar *serializers* nil "Plist of known serializers.") (defgeneric serialize (field serializer value)) (defgeneric deserialize (field serializer value)) (defmacro defserializer (format &key (name-to-lisp #'identity) (lisp-to-name #'identity)))
372
Common Lisp
.lisp
11
30.181818
49
0.733146
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
e2778c68658e786037d679b2834696930ebf07903f04f6cf375dcab19c085680
4,082
[ -1 ]
4,083
sanity-clause.lisp
fisxoj_sanity-clause/src/sanity-clause.lisp
(defpackage sanity-clause (:use #:cl #:alexandria #:sanity-clause.protocol) (:import-from #:sanity-clause.field #:make-field) (:import-from #:sanity-clause.schema #:validated-metaclass) (:import-from #:sanity-clause.loadable-schema #:load-schema) (:shadowing-import-from #:sanity-clause.protocol #:load) (:export #:resolve #:deserialize #:serialize #:validate #:get-value #:load #:dump ;; loadable schema #:load-schema ;; field stuff #:make-field ;; schema stuff #:validated-metaclass) (:documentation "Main package of the :package:`sanity-clause` system. :package:`sanity-clause` helps define data contracts like \"this field will always have a valid integer greater than zero in it\". It's also useful for serializing and deserializing data to and from different formats. Contracts are built in the form of schemas, which are composed of :class:`sanity-clause.field:field` s. for example:: (setq schema (list :name (make-field 'string) :age (make-field 'integer :validator (lambda (v) (unless (> v 0) \"impossible age!\"))))) (setq some-data '((:name . \"matt\") (:age . \"7\"))) (load schema some-data) ;; => (:name \"matt\" :age 7) ;; note: the string for age got converted by DESERIALIZE from a string to an integer. To learn more about what fields exist, check out :package:`sanity-clause.field`. To see more validation functions, check out :package:`sanity-clause.validator`. To see how to load a schema from a file or keyword spec, check out :package:`sanity-clause.schema`.")) (in-package #:sanity-clause)
1,714
Common Lisp
.lisp
39
37.948718
323
0.667268
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
4c0e1c984e70d93cc6da3cb3e9541ab9ca793cea3df7c67e85775adc3f254946
4,083
[ -1 ]
4,084
loadable-schema.lisp
fisxoj_sanity-clause/src/loadable-schema.lisp
(defpackage sanity-clause.loadable-schema (:use #:cl #:alexandria) (:documentation "Loadable schemas can be expressed as plists of keywords and then can be loaded by :function:`load`, either from a file, or a list. You could, for example, define the configuration of a program that reads from the environment with:: (setq schema (sanity-clause.loadable-schema:load #P\"my-schema.sexp\")) And then you could load it from the environment with:: (sanity-clause.schema:load schema :env) your ``my-schema.sexp`` might look like:: (:name (:string :validator (:not-empty) :default \"lisa\" :required t) :age (:integer :validator ((:int :min 0)) :required t))") (:export #:load-schema)) (in-package :sanity-clause.loadable-schema) (defun load-schema (schema &key (data-key-transformer #'identity)) "Takes a :type:`pathname` or schema spec list like:: (:key (:string :validator (:not-empty) :default \"potato\") :key2 (:integer :validator ((:int :min 0)) :default 2)) and returns a schema plist with fields. The field names are transformed into the ``:data-key`` for the field by the :param:`data-key-transformer`, which is helpful when reading strings from a config file and putting them into a plist keyed with symbols." (typecase schema (pathname (load-schema (uiop:with-safe-io-syntax () (uiop:read-file-form schema)))) (cons (loop for (key (type . spec)) on schema by #'cddr appending (list key (apply #'sanity-clause.field:make-field type (append (list :data-key (funcall data-key-transformer key)) (sanity-clause.validator:hydrate-validators (copy-list spec)))))))))
1,783
Common Lisp
.lisp
25
61.64
255
0.659794
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
2c8507f4c8747bcb3a9e222048700c6e1f34448b1f9084533639dae4b816878c
4,084
[ -1 ]
4,085
json.lisp
fisxoj_sanity-clause/src/serde/json.lisp
(defpackage sanity-clause.serde.json (:use #:cl #:alexandria #:sanity-clause.field) (:export #:lisp-name-to-json-name #:json-name-to-lisp-name)) (in-package #:sanity-clause.serde.json) (defun lisp-name-to-json-name (name) "Converts a kebab style name to a pascal case name. eg. ``some-field => someField``" (with-output-to-string (s) (loop for c across name with last-char-dash = nil if (char= c #\-) do (setf last-char-dash t) else do (princ (if last-char-dash (char-upcase c) c) s) and do (setf last-char-dash nil)))) (defun json-name-to-lisp-name (name) "Converts a lower pascal case name to kebab case. eg. ``someField => some-field``" (with-output-to-string (s) (loop for c across name if (upper-case-p c) do (princ #\- s) and do (princ (char-downcase c) s) else do (princ c s)))) (defmethod sanity-clause.serde:dump ((schema list) value &optional (format (eql :json))) (jonthan:with-object (loop for (marker field) on schema by #'cddr for value = (getf data marker) for field-name = (or (sanity-clause.field:data-key-of field) (string marker)) for json-field = (if (symbolp field-name) (lisp-name-to-json-name field-name) field-name) when (sanity-clause.field:dump-field-p field) do (sanity-clause.field:validate field) and do (jojo:write-key-value (lisp-name-to-json-name (attribute field)) (get-value field value)))))
1,464
Common Lisp
.lisp
41
31.341463
100
0.669258
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
8aea377f6ebc9aec732797dda16033fd47c4867d024890fb4deaa89a7ef6e5b8
4,085
[ -1 ]
4,086
schema.lisp
fisxoj_sanity-clause/t/schema.lisp
(defpackage sanity-clause/test.schema (:use #:cl #:rove #:alexandria #:sanity-clause.schema) (:import-from #:sanity-clause.field #:make-field #:conversion-error #:validation-error #:required-value-error) (:shadowing-import-from #:sanity-clause.schema #:load)) (in-package :sanity-clause/test.schema) (defun dumb-list-eq (list1 list2) (every 'eq list1 list2)) (defun plist-eq (list1 list2) (and (= (length list1) (length list2)) (let ((result t)) (doplist (k v1 list1) (unless (let ((v2 (getf list2 k))) (typecase v1 (cons (dumb-list-eq v1 v2)) (t (eq v1 v2)))) (setf result nil))) result))) (deftest test-load (testing "plists" (let ((plist-schema (list :name (make-field 'string) :age (make-field 'integer :required t)))) (ok (sanity-clause.protocol:load plist-schema '(:name "Matt" :age 30)) "Can load from valid data.") (ok (sanity-clause.protocol:load plist-schema '(:name "Matt" :age "30")) "Can load valid data, converting from a string, if necessary.") (ok (signals (sanity-clause.protocol:load plist-schema '(:name "Matt" :age "potato")) 'conversion-error) "A string that isn't an int raises a conversion error.") (ok (signals (sanity-clause.protocol:load plist-schema '(:name 11 :age 30)) 'conversion-error) "An integer that is not a string raises a validation error.") (ok (signals (sanity-clause.protocol:load plist-schema '(:name "Matt")) 'required-value-error) "A missing, required value raises a required value error."))) (testing "alists" (let ((schema (list :name (make-field 'string) :age (make-field 'integer :required t)))) (ok (sanity-clause.protocol:load schema '((:name . "Matt") (:age . 30))) "Can load from valid data.") (ok (sanity-clause.protocol:load schema '((:name . "Matt") (:age . "30"))) "Can load valid data, converting from a string, if necessary.") (ok (signals (sanity-clause.protocol:load schema '((:name . "Matt") (:age . "potato"))) 'conversion-error) "A string that isn't an int raises a conversion error.") (ok (signals (sanity-clause.protocol:load schema '((:name . 11) (:age . 30))) 'conversion-error) "An integer that is not a string raises a validation error.") (ok (signals (sanity-clause.protocol:load schema '((:name . "Matt"))) 'required-value-error) "A missing, required value raises a required value error."))) (testing "hash-tables" (flet ((make-test-hash (alist) (alexandria:alist-hash-table alist :test 'equal))) (let ((schema (list :name (make-field 'string) :age (make-field 'integer :required t)))) (ok (sanity-clause.protocol:load schema (make-test-hash '((:name . "Matt") (:age . 30)))) "Can load from valid data.") (ok (sanity-clause.protocol:load schema (make-test-hash '((:name . "Matt") (:age . "30")))) "Can load valid data, converting from a string, if necessary.") (ok (signals (sanity-clause.protocol:load schema (make-test-hash '((:name . "Matt") (:age . "potato")))) 'conversion-error) "A string that isn't an int raises a conversion error.") (ok (signals (sanity-clause.protocol:load schema (make-test-hash '((:name . 11) (:age . 30)))) 'conversion-error) "An integer that is not a string raises a validation error.") (ok (signals (sanity-clause.protocol:load schema (make-test-hash '((:name . "Matt")))) 'required-value-error) "A missing, required value raises a required value error.")))) (testing "nested data" (defclass nested-data-person-schema () ((name :type string :validator sanity-clause.validator:not-empty :initarg :name :data-key "name" :required t) (age :type (integer 0) :initarg :age :data-key "age" :required t)) (:metaclass sanity-clause:validated-metaclass)) (defclass nested-data-schema () ((person :initarg :person :field-type :nested :element-type nested-data-person-schema :data-key "person" :required t)) (:metaclass sanity-clause:validated-metaclass)) (let* ((data '(("person" . (("name" . "some-name") ("age" . 11)))))) (ok (sanity-clause.protocol:load 'nested-data-schema data) "parses the nested object."))) (testing "a self-referential schema" (ok (defclass self-referential-schema () ((name :data-key "name" :field-type :string :validator sanity-clause.validator:not-empty :required t) (parent :data-key "parent" :field-type :one-schema-of :schema-choices (self-referential-schema) :required nil)) (:metaclass sanity-clause:validated-metaclass)) "can be defined without error.") (let ((person-without-parent '(("name" . "matt"))) (person-with-parent '(("name" . "wedge") ("parent" . (("name" . "matt")))))) (ok (sanity-clause.protocol:load 'self-referential-schema person-without-parent) "can be deserialized when the optional field is missing.") (ok (sanity-clause.protocol:load 'self-referential-schema person-with-parent) "can be deserialized when the optional field is present.")))) (deftest test-examples (testing "sexp configuration file" (let* ((raw-configuration (uiop:with-safe-io-syntax () (uiop:read-file-form (asdf:system-relative-pathname :sanity-clause/test "t/fixtures/environment.sexp")))) (schema (list :database-url (make-field 'string :validator (list 'sanity-clause.validator:not-empty (lambda (v) (unless (str:starts-with-p "postgres" v :ignore-case t) "expected a postgres protocol.")))) :port (make-field 'integer :validator (lambda (v) (sanity-clause.validator:int v :min 0))) :mode (make-field 'member :members '(:development :testing :production)) :penguin (make-field 'boolean :default t))) (configuration (sanity-clause.protocol:load schema raw-configuration))) (ok (typep (getf configuration :database-url) 'string) "database-uri is a valid string.") (ok (typep (getf configuration :port) 'integer) "port was converted to an integer.") (ok (typep (getf configuration :mode) 'keyword) "mode is a keyword.") (ok (typep (getf configuration :penguin) 'boolean) "a default value for penguin is set."))) (testing "environment variables" (let* ((schema (list :potato (make-field 'member :members '(:yam :idaho) :required t) :age (make-field 'integer :validator (lambda (v) (unless (> v 0) "must be greater than zero."))) :ice-cream (make-field 'member :members '(:strawberry :pistachio) :default :strawberry))) (configuration (sanity-clause.protocol:load schema :env))) (ok (typep (getf configuration :age) 'integer) "age is an integer") (ok (eq (getf configuration :potato) :yam) "potato is :yam.") (ok (eq (getf configuration :ice-cream) :strawberry) "ice-cream defaults to strawberry.")))) (deftest class-initargs (defclass orange () ((seeds :initarg :seeds :initarg :seed-number) (cultivar :initarg :cultivar))) (ok (set-equal (sanity-clause.schema::class-initargs (c2mop:ensure-finalized (find-class 'orange))) '(:seeds :seed-number :cultivar)) "collects the initargs of a given class.")) (deftest take-properties (multiple-value-bind (found others) (sanity-clause.schema::take-properties '(:p :r) '(:p 1 :c 2 :r 3 :q 5)) (ok (dumb-list-eq found '(:p 1 :r 3)) "takes the properties specified.") (ok (dumb-list-eq others '(:c 2 :q 5)) "filters out the other properties."))) (deftest test-merge-plist (let ((merged (sanity-clause.schema::merge-plist '(:a) '(:a (1 2) :b 3) '(:c 4 :a (3))))) (ok (= (length merged) 6) "merges lists.") (ok (every 'keywordp (loop for (k v) on merged by #'cddr collecting k)) "preserves keys."))) (deftest test-metaclass (testing "without any slots" (ok (defclass validated () () (:metaclass sanity-clause.schema:validated-metaclass)) "can define a class with VALIDATED-METACLASS as the metaclass.")) (testing "with slots that use type-derived field classes" (ok (defclass validated2 () ((name :type string :default "larry")) (:metaclass sanity-clause.schema:validated-metaclass)) "can define a class with a simple slot.")) (testing "with slots that have explicit field types" (ok (defclass validated3 () ((name :type string :field-type :member :members ("yam" "idaho"))) (:metaclass sanity-clause.schema:validated-metaclass)) "can define a class.") (c2mop:ensure-finalized (find-class 'validated3)) (let ((name-field (sanity-clause.schema::field-of (find 'name (c2mop:class-direct-slots (find-class 'validated3)) :key 'c2mop:slot-definition-name :test 'eq)))) (ok (typep name-field 'sanity-clause.field:member-field) "the field is of the correct type.")))) (deftest test-environment (ok (defclass environment-sourced () ((favorite-dog :type symbol :field-type :member :members (:wedge :walter) :initarg :favorite-dog :required t) (age :type integer :initarg :age :required t) (potato :type string :initarg :potato :required t)) (:metaclass sanity-clause.schema:validated-metaclass)) "can define the class.") (ok (sanity-clause:load 'environment-sourced '(:source :env)) "can load from the envrionment.")) (deftest test-inheritance (testing "Redefining slots with the same name" (defclass b () ((pie :type symbol :field-type :member :members (:apple :cherry) :initarg :pie)) (:metaclass sanity-clause.schema:validated-metaclass)) (defclass b () ((pie :type string :field-type :member :members ("peach" "key-lime") :initarg :pie)) (:metaclass sanity-clause.schema:validated-metaclass)) (ok (signals (sanity-clause:load 'b '(:pie :apple)) 'sanity-clause.field:conversion-error) "take the most specific definition of the field, raising an error for values that were valid for the old version.") (ok (make-instance 'b :pie "peach") "accept values for the new version of the slot."))) (deftest test-nested-class (defclass pie () ((pie :type string :field-type :member :members ("peach" "key-lime") :initarg :pie)) (:metaclass sanity-clause.schema:validated-metaclass)) (defclass pie-inventory () ((pie :field-type :nested :element-type pie :data-key :pie :initarg :pie) (quantity :type integer :data-key :qty)) (:metaclass sanity-clause.schema:validated-metaclass)) (defclass pie-list () ((pies :type list :field-type :list :element-type (:nested :element-type pie) :initarg :pies :data-key :pies)) (:metaclass sanity-clause.schema:validated-metaclass)) (testing "pie inventory" (let ((inventory (sanity-clause:load 'pie-inventory '(:pie (:pie "peach") :qty 10)))) (ok (typep (slot-value inventory 'pie) 'pie) "Pie slot is an instance of pie class.") (ok (typep (slot-value inventory 'quantity) 'integer) "Quantity slot is an instance of integer."))) (testing "list of pies" (let ((pie-list (sanity-clause:load 'pie-list '(:pies ((:pie "peach") (:pie "peach") (:pie "key-lime")))))) (ok pie-list "Can create a nested class with pies in it.") (ok (every (lambda (i) (typep i 'pie)) (slot-value pie-list 'pies)) "The field is filled with instances of the pie class.") (ok (= (length (slot-value pie-list 'pies)) 3) "The correct number of sub-classes are created.")))) (deftest test-slot-type-to-field-initargs (ok (eq (sanity-clause.schema::slot-type-to-field-initargs '(integer 0 10)) (find-class 'sanity-clause.field:integer-field)) "finds a field type for (INTEGER 0 10).") (ok (eq (sanity-clause.schema::slot-type-to-field-initargs 'integer) (find-class 'sanity-clause.field:integer-field)) "finds a field type for INTEGER.") (ok (eq (sanity-clause.schema::slot-type-to-field-initargs '(string 10)) (find-class 'sanity-clause.field:string-field)) "finds a field type for (STRING 10).") (ok (eq (sanity-clause.schema::slot-type-to-field-initargs 'string) (find-class 'sanity-clause.field:string-field)) "finds a field type for STRING."))
13,509
Common Lisp
.lisp
272
40.165441
164
0.609903
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
823fd3e18c5d0d71dc9de135227aeba5c35fe15652e38b048b5693e5580984f2
4,086
[ -1 ]
4,087
field.lisp
fisxoj_sanity-clause/t/field.lisp
(defpackage sanity-clause/test.field (:use #:cl #:rove #:sanity-clause.field #:alexandria #:arrows)) (in-package #:sanity-clause/test.field) (eval-when (:load-toplevel :compile-toplevel) (defvar +manual-only-fields+ '(map-field list-field nested-field one-field-of-field one-schema-of-field member-field) "Symbols of field types that require extra data to exist, like :class:`member-field`, which requires a set of symbols as an initarg.")) ;; (setf +manual-only-fields+ '(map-field list-field nested-field one-field-of-field one-schema-of-field member-field)) (defmacro with-test-fields (() &body body) "Generates a lexical environment where one of each kind of field (classes with a -FIELD suffix) are defined and bound to their name. E.g. (let ((string-field (make-field 'string)) ...) [BODY])" `(let (,@(let (field-bindings) (do-external-symbols (symbol (find-package :sanity-clause.field) field-bindings) (when (and (str:ends-with-p "-FIELD" (symbol-name symbol)) (not (member symbol +manual-only-fields+)) (find-class symbol nil)) (push `(,symbol (make-instance ',symbol)) field-bindings))))) ,@body)) (defclass inventory () ((potato-count :reader potato-count-of :initarg :count))) (deftest test-find-field (ok (sanity-clause.field:find-field :string) "can find a field by symbol.") (ok (sanity-clause.field:find-field "real") "can find a field by string.") (ok (signals (sanity-clause.field:find-field nil)) "raises an error when it can't find the given field.")) (deftest test-get-value (testing "missing values" (let ((default-field (make-instance 'field :default 3 :attribute 'potato-count)) (field (make-instance 'field :attribute 'potato-count)) (clos-inventory (make-instance 'inventory)) (plist-inventory '()) (alist-inventory)) (ok (= (sanity-clause.protocol:get-value default-field clos-inventory) 3) "Default values work for clos objects.") (ok (eq (sanity-clause.protocol:get-value field clos-inventory) :missing) "A missing value with no default is :missing for clos objects.") (ok (= (sanity-clause.protocol:get-value default-field plist-inventory) 3) "Default values work for plists.") (ok (eq (sanity-clause.protocol:get-value field plist-inventory) :missing) "A missing value with no default is :missing for plists.") (ok (= (sanity-clause.protocol:get-value default-field alist-inventory) 3) "Default values work for alists.") (ok (eq (sanity-clause.protocol:get-value field alist-inventory) :missing) "A missing value with no default is :missing for alists.")))) (deftest test-deserialize (with-test-fields () (testing "String field" (ok (sanity-clause.protocol:deserialize string-field "potato") "deserializes a string.") (ok (signals (sanity-clause.protocol:deserialize string-field 4.5) 'conversion-error) "signals an error when given a number.")) (testing "Integer field" (ok (sanity-clause.protocol:deserialize integer-field "4") "deserializes a string.") (ok (sanity-clause.protocol:deserialize integer-field 4) "deserializes an integer.") (ok (signals (sanity-clause.protocol:deserialize integer-field 4.5) 'conversion-error) "signals an error when given a float.") (ok (signals (sanity-clause.protocol:deserialize integer-field "garbage") 'conversion-error) "signals an error when given a garbage string.")) (testing "Real field" (ok (sanity-clause.protocol:deserialize real-field "3.1415") "deserializes PI as a string ;).") (ok (sanity-clause.protocol:deserialize real-field 3.1415) "deserializes PI as a float ;).") (ok (signals (sanity-clause.protocol:deserialize real-field "garbage") 'conversion-error) "signals an error when given a garbage string.") (ok (signals (sanity-clause.protocol:deserialize real-field :garbage) 'conversion-error) "signals an error when given a non-string and non-real datatype.")) (testing "Member field" (let ((member-field (make-field 'member :members '(:yam :yukon :idaho)))) (ok (sanity-clause.protocol:deserialize member-field "YaM") "deserializes a string with different case into its union member.") (ok (sanity-clause.protocol:deserialize member-field :idaho) "deserializes a keyword that is a union member.") (ok (signals (sanity-clause.protocol:deserialize member-field :woodear) 'conversion-error) "signals an error for a keyword that isn't a member of the union.") (ok (signals (sanity-clause.protocol:deserialize member-field "washington") 'conversion-error) "signals an error for a string that isn't a member of the union.") (ok (signals (sanity-clause.protocol:deserialize member-field 3) 'conversion-error) "signals an error for a non-string-like type."))) (testing "URI field" (ok (sanity-clause.protocol:deserialize uri-field "https://something.com/potato?woo=bar#id") "accpets a valid uri") (skip "Not sure how to validate uris, yet" ;; (ok (signals (sanity-clause.protocol:deserialize uri-field "woo//bugs") 'conversion-error) ;; "signals an error on a non-uri value.") )) (testing "Boolean field" (ok (eq (sanity-clause.protocol:deserialize boolean-field "on") t) "converts a truthy string to t.") (ok (signals (sanity-clause.protocol:deserialize boolean-field "wumbo") 'conversion-error) "signals an error for an uncertain value.")) (testing "Timestamp field" (ok (typep (sanity-clause.protocol:deserialize timestamp-field "2006-06-06TZ") 'local-time:timestamp) "converts values to timestamps from LOCAL-TIME.") (ok (signals (sanity-clause.protocol:deserialize timestamp-field "pizza") 'conversion-error) "throws a conversion error on badly formatted timestamp.")))) (deftest test-validate (testing "validation-error" ;; Two disjoint criteria to generate two validation errors (let ((test-field (make-field 'integer :validator (list (lambda (v) (sanity-clause.validator:int v :max -3)) (lambda (v) (sanity-clause.validator:int v :min 3)))))) (handler-case (progn (sanity-clause.protocol:validate test-field "woo.com") (fail "invalid data didn't raise a validation-error.")) (validation-error (e) (ok (= (length (error-messages-of e)) 2) "had more than 0 error messages."))))) (with-test-fields () (testing "Integer field" (ok (eq (sanity-clause.protocol:validate integer-field 4) nil) "validates an integer.")) (testing "Email field" (ok (null (sanity-clause.protocol:validate email-field "[email protected]")) "validates an email address.") (ok (signals (sanity-clause.protocol:validate email-field "wooo.com") 'validation-error) "raises an error when given an invalid email address.")) (testing "String field" (ok (null (sanity-clause.protocol:validate string-field "some string")) "accepts any string.")) (testing "Constant field" (let ((constant-string-field (make-field 'constant :constant "potato" :test 'string=)) (constant-number-field (make-field 'constant :constant 3 :test '=)) (constant-keyword-field (make-field 'constant :data-key 'potato-type :constant :russet))) (ok (null (sanity-clause.protocol:validate constant-string-field "potato")) "validates a correct string with string=.") (ok (signals (sanity-clause.protocol:validate constant-string-field "worm") 'validation-error) "raises an error for a value that isn't the constant according to string=.") (ok (null (sanity-clause.protocol:validate constant-number-field 3)) "validates a constant number value with =.") (ok (signals (sanity-clause.protocol:validate constant-number-field 5) 'validation-error) "raises an error for a value that isn't = to a constant.") (ok (signals (sanity-clause.protocol:validate constant-keyword-field :armadillo) 'sanity-clause.field:validation-error) "raises an error if the value doesn't match the constant value"))) (testing "UUID field" (ok (null (sanity-clause.protocol:validate uuid-field "74827715-C657-4122-B6CF-63E3FA700FF6")) "accepts a uuid string.") (ok (signals (sanity-clause.protocol:validate uuid-field "74827715-GGGG-4122-B6CF-63E3FA700FF6") 'validation-error) "raises validation errors for something that looks like a uuid, but has forbidden 'G's in it.")))) (deftest test-missing-values (defclass t-m-v-pizza () ((type :field-type :member :initarg :type :members (:pepperoni :hawaiian :plain) :required t) (size :field-type :member :initarg :size :members (:small :medium :large)) (rating :field-type :integer :initarg :rating :validator (lambda (rating) (sanity-clause.validator:int rating :min 0 :max 5)))) (:metaclass sanity-clause:validated-metaclass)) (ok (signals (sanity-clause:load 't-m-v-pizza '(:size :small)) 'required-value-error) "a required field signals an error when it's not supplied.") (ok (not (slot-boundp (sanity-clause:load 't-m-v-pizza '(:type :plain)) 'rating)) "non-required fields are left unbound if data isn't supplied.")) (deftest test-nested-field (defclass cat () ((name :type string :data-key :name) (age :type integer :initarg :data-key)) (:metaclass sanity-clause:validated-metaclass)) (defclass human () ((name :type string :initarg :name) (cat-friend :field-type :nested :element-type cat :initarg :cat-friend)) (:metaclass sanity-clause:validated-metaclass)) (defclass human-with-cat-list () ((name :type string :data-key :name) (cat-friends :field-type :list :element-type (:nested :element-type cat) :data-key :cat-friends)) (:metaclass sanity-clause:validated-metaclass)) (testing "simple nesting" (let ((data-with-cat '(:name "Matt" :cat-friend (:name "Tara" :age 10))) (data-without-cat '(:name "Matt"))) (ok (typep (slot-value (sanity-clause:load 'human data-with-cat) 'cat-friend) 'cat) "deserializes a cat class also, when data exists.") (ok (not (slot-boundp (sanity-clause:load 'human data-without-cat) 'cat-friend)) "leaves a slot unbound, when data is missing and the slot isn't required."))) (testing "list nesting" (let ((data-with-cats '(:name "Matt" :cat-friends ((:name "Tara" :age 10) (:name "Tiger" :age 4)))) (data-without-cats-field '(:name "Matt")) (data-with-zero-cats '(:name "Matt" :cat-friends ()))) (ok (= (length (slot-value (sanity-clause:load 'human-with-cat-list data-with-cats) 'cat-friends)) 2) "deserializes a list of cat classes, when data exists.") (ok (zerop (length (slot-value (sanity-clause:load 'human-with-cat-list data-with-zero-cats) 'cat-friends))) "deserializes a list of zero cat classes, when fields exists but is empty.") (ok (not (slot-boundp (sanity-clause:load 'human-with-cat-list data-without-cats-field) 'cat-friends)) "leaves a slot unbound, when data is missing and the slot isn't required.")))) (deftest test-one-schema-of-field (testing "A one-schema-of-field with two options" (defclass tosof-pizza () ((name :data-key :name :type string :required t)) (:metaclass sanity-clause.schema:validated-metaclass)) (defclass tosof-weasel-count () ((count :data-key :count :type integer :validate (lambda (v) (sanity-clause.validator:int v :min 0)) :required t)) (:metaclass sanity-clause.schema:validated-metaclass)) (let ((dumb-field (sanity-clause.field:make-field :one-schema-of :schema-choices '(tosof-pizza tosof-weasel-count) :required t))) (ok (typep (sanity-clause.protocol:deserialize dumb-field '(:name "pepperoni")) 'tosof-pizza) "decodes the first option.") (ok (typep (sanity-clause.protocol:deserialize dumb-field '(:count "112")) 'tosof-weasel-count) "decodes the second option.") (ok (signals (sanity-clause.protocol:deserialize dumb-field '(:armadillo :arnie)) 'sanity-clause.field:conversion-error) "signals an error if it can't decode either option."))) (testing "a descriminated union based on a 'version' field)" (defclass tosof-v1 () ((version :field-type :constant :initarg :version :constant "1" :required t)) (:metaclass sanity-clause:validated-metaclass)) (defclass tosof-v2 () ((version :field-type :constant :initarg :version :constant "2" :required t)) (:metaclass sanity-clause:validated-metaclass)) (defclass tosof-v3 () ((version :field-type :constant :initarg :version :constant "3" :required t)) (:metaclass sanity-clause:validated-metaclass)) (let ((union-type-field (make-field :one-schema-of :schema-choices '(tosof-v1 tosof-v2 tosof-v3)))) (ok (every 'eq '(tosof-v3 tosof-v1 tosof-v2) (mapcar (lambda (data) (class-name (class-of (sanity-clause.protocol:deserialize union-type-field data)))) '((:version "3") (:version "1") (:version "2")))) "decodes to the correct version of the class.")))) (deftest test-one-field-of-field (testing "a one-of-field defined with :field-choices class syntax" (let* ((string-field (make-field :string :validator 'sanity-clause.validator:not-empty)) (integer-field (make-field :integer)) (field (sanity-clause:make-field :one-field-of :data-key :data :field-choices (list string-field integer-field)))) (ok (typep (sanity-clause.protocol:resolve field '(:data "hello")) 'string) "accepts a string.") (ok (typep (sanity-clause.protocol:resolve field '(:data 4)) 'integer) "accepts an integer.") (ok (signals (sanity-clause.protocol:resolve field (list :data (local-time:now))) 'sanity-clause.field:conversion-error) "signals an error for a datetime."))) (testing "a one-of-field defined with :field-choices keyword syntax" (let ((field (sanity-clause:make-field :one-field-of :data-key :data :field-choices '((:string :validator (:not-empty)) :integer)))) (ok (typep (sanity-clause.protocol:resolve field '(:data "hello")) 'string) "accepts a string.") (ok (typep (sanity-clause.protocol:resolve field '(:data 4)) 'integer) "accepts an integer.") (ok (signals (sanity-clause.protocol:resolve field (list :data (local-time:now))) 'sanity-clause.field:conversion-error) "signals an error for a datetime."))))
15,332
Common Lisp
.lisp
274
47.824818
139
0.663124
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
d33ae19188e93b540db4c6e6007bc315e5d820a7a7c929434df6b9f7152abacf
4,087
[ -1 ]
4,088
util.lisp
fisxoj_sanity-clause/t/util.lisp
(defpackage sanity-clause/test.util (:use #:cl #:alexandria #:rove #:sanity-clause.util)) (in-package #:sanity-clause/test.util) (defclass test-class () ((value :initarg :value))) (deftest test-get-value (let ((alist '((:value . 2))) (plist '(:value 2)) (object (make-instance 'test-class :value 2))) (testing "alists" (multiple-value-bind (value found-p) (get-value alist :value) (ok (= value 2) "Finds a value that exists.") (ok (eq found-p t) "Says it found the value for a value that exists.")) (multiple-value-bind (value found-p) (get-value alist :nonexistent :default) (ok (eq value :default) "Returns the default value for a missing value.") (ok (eq found-p nil) "Knows it didn't find the value for a missing value."))) (testing "plists" (multiple-value-bind (value found-p) (get-value plist :value) (ok (= value 2) "Finds a value that exists.") (ok (eq found-p t) "Says it found the value for a value that exists.")) (multiple-value-bind (value found-p) (get-value plist :nonexistent :default) (ok (eq value :default) "Returns the default value for a missing value.") (ok (eq found-p nil) "Knows it didn't find the value for a missing value."))) (testing "objects" (multiple-value-bind (value found-p) (get-value object 'value) (ok (= value 2) "finds a value that exists.") (ok (eq found-p t) "says it found the value for a value that exists.")) (multiple-value-bind (value found-p) (get-value object 'nonexistent :default) (ok (eq value :default) "returns the default value for a missing value.") (ok (eq found-p nil) "knows it didn't find a value for a missing value."))) (testing "environment variables" (multiple-value-bind (value found-p) (get-value :env 'value) (ok (string= value "2") "finds a value that exists.") (ok (eq found-p t) "says it found the value for a value that exists.")) (multiple-value-bind (value found-p) (get-value object :env :default) (ok (eq value :default) "returns the default value for a missing value.") (ok (eq found-p nil) "knows it didn't find a value for a missing value.")))))
2,328
Common Lisp
.lisp
56
35.160714
83
0.631695
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
461ed65f0563763120cb648e49641f1518848b7440a796b0a6d6be8b9b3e9f75
4,088
[ -1 ]
4,089
loadable-schema.lisp
fisxoj_sanity-clause/t/loadable-schema.lisp
(defpackage sanity-clause/test.loadable-schema (:use #:cl #:rove #:alexandria)) (in-package :sanity-clause/test.loadable-schema) (deftest test-load-schema (macrolet ((test-case (&key test-data (data-key-transformer '#'identity)) `(let* ((schema (sanity-clause.loadable-schema:load-schema (asdf:system-relative-pathname :sanity-clause/test "t/fixtures/schema.sexp") :data-key-transformer ,data-key-transformer)) (raw-data ',test-data) (data (sanity-clause.protocol:load schema raw-data))) (ok (typep (getf data :port) 'integer) "port is an integer.") (ok (typep (getf data :name) 'string) "name is a string.") (ok (eq (getf data :mode) :on) "member was converted to a keyword.") (ok (eq (getf data :boolean) nil) "boolean is off.")))) (testing "can load a schema with keyword keys" (test-case :test-data ((:port . 3) (:name . "something") (:mode . "on") (:boolean . "no")))) (testing "can load a schema with string keys" (test-case :test-data (("port" . 3) ("name" . "something") ("mode" . "on") ("boolean" . "no")) :data-key-transformer #'string-downcase))))
1,391
Common Lisp
.lisp
28
36.857143
108
0.539143
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
24826900eaa3f9ec821874a63c1f0609ff416be45ab282bda13e7ee21b957832
4,089
[ -1 ]
4,090
json.lisp
fisxoj_sanity-clause/t/serde/json.lisp
(defpackage sanity-clause/test.serde.json (:use #:cl #:rove #:alexandria #:sanity-clause.serde.json)) (in-package :sanity-clause/test.serde.json) (let ((cases '(("something" . "something") ("potato-type" . "potatoType") ("some-cool-thing" . "someCoolThing")))) (deftest test-lisp-name-to-json-name (loop for (lisp . json) in cases do (ok (string= (lisp-name-to-json-name lisp) json) (format nil "correctly converts ~S to ~S" lisp json)))) (deftest test-json-name-to-lisp-name (loop for (lisp . json) in cases do (ok (string= (json-name-to-lisp-name json) lisp) (format nil "correctly converts ~S to ~S" json lisp)))))
669
Common Lisp
.lisp
17
35.352941
59
0.667183
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
a0dba51cb440539159411c82bc44746eb8a748b9793731cda53cf4d3e5d43539
4,090
[ -1 ]
4,091
sanity-clause.asd
fisxoj_sanity-clause/sanity-clause.asd
(defsystem sanity-clause :author "Matt Novenstern" :license "LGPLv3" :version "0.7.4" :homepage "https://fisxoj.github.io/sanity-clause/" :depends-on ("alexandria" "arrows" "cl-ppcre" "closer-mop" "local-time" "str" "trivial-types" "parse-float" "quri") :pathname "src" :components ((:file "util") (:file "validator") (:file "protocol") (:file "field") (:file "loadable-schema") (:file "schema") (:file "sanity-clause")) :description "Sanity clause is a data contract and validation library." :long-description #.(uiop:read-file-string #P"README.rst") :in-order-to ((test-op (test-op sanity-clause/test)))) (defsystem sanity-clause/test :depends-on ("sanity-clause" "rove") :pathname "t" :components ((:file "rove-junit-reporter") (:file "util") (:file "field") (:file "loadable-schema") (:file "schema")) :perform (test-op (op c) (declare (ignore op)) (uiop:symbol-call :rove/reporter/junit :run c :env '(("VALUE" . "2") ("POTATO" . "YAM") ("AGE" . "11") ("FAVORITE_DOG" . "WEDGE")))))
1,339
Common Lisp
.asd
41
23.073171
73
0.51466
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
b4a1712a81c0d716e0122ea92af9959ef4094932ff0289910027110ac23aec44
4,091
[ -1 ]
4,092
sanity-clause-json.asd
fisxoj_sanity-clause/sanity-clause-json.asd
(defsystem sanity-clause-json :depends-on ("sanity-clause" "jonathan") :pathame "src/serde/" :components ((:file "json")))
137
Common Lisp
.asd
5
23.6
31
0.659091
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
4b37c383aa720f0d21fe503a75c7d2ffa1ccd6e646299a9a03fa970b05c2cd77
4,092
[ -1 ]
4,113
test.yml
fisxoj_sanity-clause/.github/workflows/test.yml
name: Test on: [push] jobs: test: strategy: matrix: implementation: - sbcl - ccl # - ecl # - abcl test-package: - sanity-clause/test name: ${{ matrix.implementation }} container: clfoundation/cl-devel:2021-06-01 runs-on: ubuntu-latest timeout-minutes: 10 env: JUNIT_ENABLED: 1 JUNIT_REPORT_FILENAME: /home/cl/report.xml CL_SOURCE_REGISTRY: (:source-registry (:tree "/__w/") :inherit-configuration) # So actions run here instead of the /__w/ directory, which belongs to a magical github user HOME: /home/cl steps: - name: Checkout uses: actions/checkout@v1 - name: Kludge so the cache works run: sudo chmod ogu+rw -R /__w/_temp - name: Cache compiled files uses: actions/cache@v2 with: path: | ~/.cache/common-lisp ~/quicklisp/dists key: "${{ hashFiles('**.asd') }}-${{ matrix.implementation}}-v1" restore-keys: ${{ hashFiles('**.asd') }}- env: RUNNER_TEMP: /tmp - name: Install dependencies run: cl-launch -l ${{ matrix.implementation }} -Q '(ql:quickload :${{ matrix.test-package }})' - name: Run tests run: cl-launch -l ${{ matrix.implementation }} -Q '(asdf:test-system :${{ matrix.test-package }})' - name: Publish Results uses: mikepenz/action-junit-report@v2 if: always() with: report_paths: '/home/cl/report.xml' check_name: "${{ matrix.implementation }} Test Report" generate-docs: needs: test runs-on: ubuntu-latest if: ${{ github.event_name == 'push' && github.ref == 'refs/heads/master' }} steps: - name: Checkout uses: actions/checkout@v1 - name: Generate Docs run: | docker pull quay.io/fisxoj/coo:latest docker run --rm -v $PWD:/work:Z quay.io/fisxoj/coo:latest - name: Publish uses: peaceiris/actions-gh-pages@v3 with: github_token: ${{ secrets.GITHUB_TOKEN }} publish_dir: ./docs
2,138
Common Lisp
.l
64
25.5
106
0.576737
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
7d3173a4e9b2ae5e4f0e9ed500fe4de940816cecaace423895a2a2f13602350e
4,113
[ -1 ]
4,128
schema.sexp
fisxoj_sanity-clause/t/fixtures/schema.sexp
(:port (:integer :validator ((:int :min 0) (:int :max 5))) :name (:string :validator (:not-empty)) :mode (:member :members (:on :off)) :boolean (:boolean :default t))
170
Common Lisp
.sexp
4
40.75
58
0.63253
fisxoj/sanity-clause
49
2
8
LGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
0a3902d0d4fb6122119ad2015bf6838b138704970a70d5c85dd7f41a423364cf
4,128
[ -1 ]
4,129
win32.lisp
VitoVan_cl-pkr/win32.lisp
(in-package #:cl-pkr) (define-foreign-library user32 (:win32 (:or "user32.dll"))) (use-foreign-library user32) (define-foreign-library gdi32 (:win32 (:or "gdi32.dll"))) (use-foreign-library gdi32) (defcfun ("GetDC" get-dc) :pointer (hwnd :pointer)) (defcfun ("DeleteDC" delete-dc) :boolean (hdc :pointer)) (defcfun ("ReleaseDC" release-dc) :int (hWnd :pointer) (hdc :pointer)) (defcfun ("DeleteObject" delete-object) :boolean (ho :pointer)) (defcfun ("CreateCompatibleDC" create-compatible-dc) :pointer (hdc :pointer)) (defcfun ("CreateCompatibleBitmap" create-compatible-bitmap) :pointer (hdc :pointer) (cx :int) (cy :int)) (defcfun ("SelectObject" select-object) :pointer (hdc :pointer) (h :pointer)) (defcfun ("GetPixel" get-pixel) :uint32 (hdc :pointer) (x :int) (y :int)) ;; https://docs.microsoft.com/en-us/windows/desktop/api/wingdi/nf-wingdi-bitblt ;; http://www.jasinskionline.com/windowsapi/ref/b/bitblt.html ;; Const SRCCOPY = &HCC0020 ;; HEX Value CC0020 -> Decimal Value 13369376 (defparameter *SRCCOPY* 13369376) (defcfun ("BitBlt" bit-blt) :boolean (hdc :pointer) (x :int) (y :int) (cx :int) (cy :int) (hdcSrc :pointer) (x1 :int) (y1 :int) (drop :uint32)) (defun x-display-size () (values (screen-width) (screen-width))) (defmacro with-screen-dc ((dc width height) &body body) `(let* ((screen-dc (get-dc (null-pointer))) (,dc (create-compatible-dc screen-dc)) (screen-size (multiple-value-list (x-display-size))) (,width (car screen-size)) (,height (cadr screen-size)) (bitmap (create-compatible-bitmap screen-dc ,width ,height)) (old-obj (select-object ,dc bitmap))) (unwind-protect (progn (bit-blt ,dc 0 0 ,width ,height screen-dc 0 0 *SRCCOPY*) ,@body) (progn (select-object ,dc old-obj) (delete-dc ,dc) (release-dc (null-pointer) screen-dc) (delete-object bitmap))))) (defun raw-dc->pixel-list (raw-dc x0 y0 x1 y1) (loop for _y from y0 to y1 collect (loop for _x from x0 to x1 collect (let* ((decimal-pixel (get-pixel raw-dc _x _y)) (rgb-data (decimal->rgb decimal-pixel)) (r (nth 0 rgb-data)) (g (nth 1 rgb-data)) (b (nth 2 rgb-data)) (a 255)) (list b g r a))))) (defun x-snapshot (&key (x 0) (y 0) (width 1) (height 1) (offset 0)) (and (>= x 0) (>= y 0) (with-screen-dc (dc w h) ; w is the real width of full screenshot (setf x (- x offset) y (- y offset)) (let* ((proper-x (if (> x w) w (if (> x 0) x 0))) (proper-y (if (> y h) h (if (> y 0) y 0))) (proper-width (if (> width w) w width)) (proper-height (if (> height h) h height)) (max-x (+ proper-x proper-width)) (max-y (+ proper-y proper-height)) (proper-max-x (if (> max-x w) w max-x)) (proper-max-y (if (> max-y h) h max-y))) (raw-dc->pixel-list dc proper-x proper-y (1- proper-max-x) (1- proper-max-y))))))
3,052
Common Lisp
.lisp
89
29.179775
79
0.609417
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
348ee987b182f2bafcde9cecd215b31deb0bb2f9b098db1fa86051759db57b28
4,129
[ -1 ]
4,130
package.lisp
VitoVan_cl-pkr/package.lisp
(defpackage #:cl-pkr (:use #:cl #:ltk #+(or win32 darwin) #:cffi) (:export :color-picker))
103
Common Lisp
.lisp
4
21.75
35
0.575758
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
c96fa78106036563dd370f0044c933f05c263703cacee5027178b9b03604fc75
4,130
[ -1 ]
4,131
cl-pkr.lisp
VitoVan_cl-pkr/cl-pkr.lisp
(in-package #:cl-pkr) (defparameter *update-frequency* 10) (defparameter *hacking* nil) (setf *wish-args* '("-name" "Color Picker")) (let ((tip-index 0)) (defun get-tip () (nth tip-index #+darwin '("[Cmd + C] to Copy HEX" "[Cmd + Shift + C] to Copy RGB" "[Cmd + Option + C] to Copy HSL") #+(or linux win32) '("[Control + C] to Copy HEX" "[Control + Shift + C] to Copy RGB" "[Control + Alt + C] to Copy HSL"))) (defun scramble-tip () (setf tip-index (random 3)))) (defun make-larger-image (pixels ratio) (let* ((raw-photo (make-instance 'photo-image)) (photo (make-instance 'photo-image))) (with-atomic (image-setpixel raw-photo pixels 0 0) (format-wish "~A copy ~A -zoom ~A" (widget-path photo) (widget-path raw-photo) ratio) (format-wish "image delete ~A" (widget-path raw-photo))) photo)) (defun make-blank-image () (make-instance 'photo-image :width 248 :height 248)) (defun make-point-canvas () (make-instance 'canvas :background "white" :highlightthickness 1 :highlightbackground "black")) (defun make-sample-canvas () (make-instance 'canvas :background "white" :highlightthickness 2 :highlightbackground "black" :width 244 :height 84)) (defun make-color-label (text) (make-instance 'label :text text :width 248 :padding 10)) (defun make-tip-label () (make-instance 'label :text (get-tip) :width 248 :padding 10 :foreground "blue")) (defun make-about-button () (make-instance 'button :text "About" :command (lambda () (format t "shit") (message-box (format nil "cl-pkr~%Version: ~A~%https://github.com/VitoVan/cl-pkr~%~%Icon made by [dinosoftlabs]~%From www.flaticon.com~%https://www.flaticon.com/authors/dinosoftlabs" (asdf:component-version (asdf:find-system 'cl-pkr))) "About Color Picker" "ok" "info" :parent *tk*)))) (defun init-window (&optional (width 496) (height 248)) (mapcar (lambda (func) (funcall func *tk* width height)) '(maxsize minsize))) (defmacro bind-hotkeys (hex-color rgb-color hsl-color) `(progn (bind *tk* #+darwin "<Command-c>" #+(or linux win32) "<Control-c>" (lambda (e) (declare (ignore e)) (x-copy ,hex-color) (scramble-tip))) (bind *tk* #+darwin "<Command-Shift-c>" #+(or linux win32) "<Control-C>" (lambda (e) (declare (ignore e)) (x-copy ,rgb-color) (scramble-tip))) (bind *tk* #+darwin "<Command-Option-c>" #+(or linux win32) "<Control-Alt-c>" (lambda (e) (declare (ignore e)) (x-copy ,hsl-color) (scramble-tip))))) (defun color-picker () (if *hacking* (setf *wish-pathname* "./bin/tclkit-gui") (setf *wish-pathname* (or (uiop:getenv "WISH_PATHNAME") #+(or linux darwin) (namestring (merge-pathnames "tclkit-gui" (car (unix-opts:argv)))) "tclkit-gui"))) (with-ltk () (init-window) (let* ((hex-color nil) (rgb-color nil) (hsl-color nil) (blank-image (make-blank-image)) (point-canvas (make-point-canvas)) (sample-canvas (make-sample-canvas)) (image-label (make-instance 'label :image blank-image)) (hex-label (make-color-label "HEX: #FFFFFF")) (rgb-label (make-color-label "RGB: 255, 255, 255")) (hsl-label (make-color-label "HSL: 0, 0%, 100%")) (tip-label (make-tip-label)) (about-button (make-about-button)) (old-x nil) (old-y nil)) (configure image-label :borderwidth 0) (place image-label 0 0) (place hex-label 248 0 :height 40) (place rgb-label 248 40 :height 40) (place hsl-label 248 80 :height 40) (place tip-label 248 120 :height 40) (place about-button 410 8 :height 24 :width 80) (bind-hotkeys hex-color rgb-color hsl-color) (labels ((tip-talk (str &key (color "blue")) (setf (text tip-label) str) (configure tip-label :foreground color)) (update () (let* ((x (screen-mouse-x)) (y (screen-mouse-y))) (when (not (and (eq x old-x) (eq y old-y))) (when (or (< x 0) (< y 0)) (tip-talk "Come Back to Main Screen, Please" :color "#EE0000") (after *update-frequency* #'update) (return-from update)) (setf old-x x old-y y) (handler-case (let* ((pixels (x-snapshot :x x :y y :width 31 :height 31 :offset 15)) (colors (color->strs (pixel->color pixels 15 15)))) (tip-talk (get-tip)) (setf hex-color (first colors) rgb-color (second colors) hsl-color (third colors) (text hex-label) (concat "HEX: " hex-color) (text rgb-label) (concat "RGB: " rgb-color) (text hsl-label) (concat "HSL: " hsl-color)) (configure point-canvas :background hex-color :highlightbackground (fourth colors)) (configure sample-canvas :background hex-color) (place point-canvas 120 120 :width 8 :height 8) (place sample-canvas 248 160) (configure image-label :image (make-larger-image pixels 8))) (error (c) (tip-talk "Mmm... Try Me on Main Screen?" :color "#EE0000"))))) (after *update-frequency* #'update))) (format-wish "focus -force .") (after *update-frequency* #'update)))))
6,375
Common Lisp
.lisp
145
30.662069
189
0.508044
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
1813a7d060d8d5fc8dca09d6b0e997b510a98f485c4b3f7469b6cd593f1a4f21
4,131
[ -1 ]
4,132
linux.lisp
VitoVan_cl-pkr/linux.lisp
(in-package #:cl-pkr) (defmacro with-default-display ((display &key (force nil)) &body body) `(let ((,display (xlib:open-default-display))) (unwind-protect (unwind-protect (progn ,@body) (when ,force (xlib:display-force-output ,display))) (xlib:close-display ,display)))) (defmacro with-default-display-force ((display) &body body) `(with-default-display (,display :force t) ,@body)) (defmacro with-default-screen ((screen) &body body) (let ((display (gensym))) `(with-default-display (,display) (let ((,screen (xlib:display-default-screen ,display))) ,@body)))) (defmacro with-default-window ((window) &body body) (let ((screen (gensym))) `(with-default-screen (,screen) (let ((,window (xlib:screen-root ,screen))) ,@body)))) (defun x-display-size () (with-default-screen (s) (values (xlib:screen-width s) (xlib:screen-height s)))) (defun raw-data->pixel-list (raw-data x0 y0 x1 y1 w) (loop for _y from 0 to (- y1 y0) collect (loop for _x from 0 to (- x1 x0) collect (let* ((cell-i (+ (* w _y)_x)) (value-i (* cell-i 4)) (r (aref raw-data value-i)) (g (aref raw-data (incf value-i))) (b (aref raw-data (incf value-i))) (a (aref raw-data (incf value-i)))) (list b g r a))))) (defun x-snapshot (&key (x 0) (y 0) (width 1) (height 1) (offset 0)) (and (>= x 0) (>= y 0) (multiple-value-bind (w h) (x-display-size) (with-default-window (window) (setf x (- x offset) y (- y offset)) (let* ((proper-x (if (> x w) w (if (> x 0) x 0))) (proper-y (if (> y h) h (if (> y 0) y 0))) (proper-width (if (> width w) w width)) (proper-height (if (> height h) h height)) (max-x (+ proper-x proper-width)) (max-y (+ proper-y proper-height)) (proper-max-x (if (> max-x w) w max-x)) (proper-max-y (if (> max-y h) h max-y))) (raw-data->pixel-list (xlib:get-raw-image window :x proper-x :y proper-y :width (- proper-max-x proper-x) :height (- proper-max-y proper-y) :format :z-pixmap) proper-x proper-y (1- proper-max-x) (1- proper-max-y) (- proper-max-x proper-x)))))))
2,578
Common Lisp
.lisp
66
28.530303
70
0.500599
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
372a66acd5e28d843a922b76df655b681a82bcb44d97fae5275e83d28a13b8c0
4,132
[ -1 ]
4,133
common.lisp
VitoVan_cl-pkr/common.lisp
(in-package #:cl-pkr) (defun concat (&rest rest) (apply #'concatenate 'string rest)) (defun pixel->color (pixel-list x y) (if pixel-list (funcall #'(lambda (data) (mapcar #'(lambda (i) (nth i (nth x (nth y data)))) '(0 1 2 3))) pixel-list) '(255 255 255 255))) ;; Modified from Emacs/color.el (2018 with GPL 3.0) ;; So, I have to make the whole project under GPL 3.0, I think ;; https://github.com/emacs-mirror/emacs/blob/master/lisp/color.el#L157 (defun color-rgb-to-hsl (red green blue) "Convert RGB colors to their HSL representation. Modified from Emacs/color.el with some ceiling and multiplication call, it's a short function, so you can compare the source yourself." (let* ((r red) (g green) (b blue) (max (max r g b)) (min (min r g b)) (delta (- max min)) (l (/ (+ max min) 2.0))) (if (= delta 0) (list 0 0 (ceiling (* 100 l))) (let* ((s (if (<= l 0.5) (/ delta (+ max min)) (/ delta (- 2.0 max min)))) (rc (/ (- max r) delta)) (gc (/ (- max g) delta)) (bc (/ (- max b) delta)) (h (mod (/ (cond ((= r max) (- bc gc)) ((= g max) (+ 2.0 rc (- bc))) (t (+ 4.0 gc (- rc)))) 6.0) 1.0))) (list (ceiling (* h 360)) (ceiling (* 100 s)) (ceiling (* 100 l))))))) (defun color->strs (color) (setf color (subseq color 0 3)) (list (apply #'format nil "#~2,'0X~2,'0X~2,'0X" color) (apply #'format nil "~A, ~A, ~A" color) (apply #'format nil "~A, ~A%, ~A%" (apply #'color-rgb-to-hsl (mapcar #'(lambda (c) (/ c 255)) color))) (apply #'format nil "#~2,'0X~2,'0X~2,'0X" (mapcar #'(lambda (c) (- 255 c)) color)))) (defun decimal->rgb (color) (if (> color 0) (let ((hex-str (format nil "~6,'0X" color))) (loop for i from 0 to 5 by 2 collect (parse-integer (concatenate 'string (string (char hex-str i)) (string (char hex-str (1+ i)))) :radix 16))) '(0 0 0))) (defun x-copy (text) (with-atomic (format-wish "clipboard clear") (format-wish "clipboard append \"~A\"" text)))
2,449
Common Lisp
.lisp
65
28
80
0.47603
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
e8f86b4313362493abb2d5bba25086c2ce6ce74604c5e435c0c22c4216bd2290
4,133
[ -1 ]
4,134
darwin.lisp
VitoVan_cl-pkr/darwin.lisp
(in-package #:cl-pkr) (define-foreign-library application-services (:darwin "ApplicationServices.framework/ApplicationServices")) (use-foreign-library application-services) (defcfun ("CGMainDisplayID" cg-main-display-id) :uint32) (defcfun ("CGDisplayPixelsHigh" cg-display-pixels-high) :int (display :uint32)) (defcfun ("CGDisplayPixelsWide" cg-display-pixels-wide) :int (display :uint32)) (defcfun ("CGDisplayCreateImage" cg-display-create-image) :pointer (display :uint32)) (defcfun ("CGImageRelease" cg-image-release) :void (image :pointer)) (defcfun ("CGImageGetDataProvider" cg-image-get-data-provider) :pointer (image :pointer)) (defcfun ("CGDataProviderCopyData" cg-data-provider-copy-data) :pointer (provider :pointer)) (defcfun ("CGImageGetWidth" cg-image-get-width) :int (image :pointer)) (defcfun ("CGImageGetHeight" cg-image-get-height) :int (image :pointer)) (defcfun ("CFDataGetBytePtr" cf-data-get-byte-ptr) :pointer (data :pointer)) (defcfun ("CFDataGetLength" cf-data-get-length) :int (data :pointer)) (defcfun ("CFRelease" cf-release) :void (image :pointer)) (defun get-cg-image-ref () (cg-display-create-image (cg-main-display-id))) (defun get-cf-data-ref (image) (cg-data-provider-copy-data (cg-image-get-data-provider image))) (defmacro with-cg-image-ref ((image) &body body) `(let ((,image (get-cg-image-ref))) (unwind-protect (progn ,@body) (cg-image-release ,image)))) (defmacro with-cf-data-ptr ((image data) &body body) `(let* ((data-ref (get-cf-data-ref ,image)) (,data (cf-data-get-byte-ptr data-ref))) (unwind-protect (progn ,@body) (cf-release data-ref)))) (defmacro with-display-pixel-data ((data width height) &body body) `(with-cg-image-ref (img) (let ((,width (cg-image-get-width img)) (,height (cg-image-get-height img))) (with-cf-data-ptr (img ,data) ,@body)))) (defun x-display-size () (let ((display-id (cg-main-display-id))) (values (cg-display-pixels-wide display-id) (cg-display-pixels-high display-id)))) (defun raw-data->pixel-list (raw-data x0 y0 x1 y1 w) (loop for _y from y0 to y1 collect (loop for _x from x0 to x1 collect (let* ((cell-i (+ (* w _y)_x)) (value-i (* cell-i 4)) (r (mem-aref raw-data :uint8 value-i)) (g (mem-aref raw-data :uint8 (incf value-i))) (b (mem-aref raw-data :uint8 (incf value-i))) (a (mem-aref raw-data :uint8 (incf value-i)))) (list b g r a))))) ;; for holy retina screen (defparameter *display-size-ratio* 2) (defun x-snapshot (&key (x 0) (y 0) (width 1) (height 1) (offset 0)) (and (>= x 0) (>= y 0) (multiple-value-bind (display-width) (x-display-size) (with-display-pixel-data (d w h) (setf *display-size-ratio* (/ w display-width) x (- (* *display-size-ratio* x) offset) y (- (* *display-size-ratio* y) offset)) (let* ((proper-x (if (> x w) w (if (> x 0) x 0))) (proper-y (if (> y h) h (if (> y 0) y 0))) (proper-width (if (> width w) w width)) (proper-height (if (> height h) h height)) (max-x (+ proper-x proper-width)) (max-y (+ proper-y proper-height)) (proper-max-x (if (> max-x w) w max-x)) (proper-max-y (if (> max-y h) h max-y))) (raw-data->pixel-list d proper-x proper-y (1- proper-max-x) (1- proper-max-y) w))))))
3,666
Common Lisp
.lisp
84
35.97619
92
0.597479
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
3fbba70d6160d4e181f08f1ead72b93a8fb1f2194dbecb167ecaed5cc8df6c0e
4,134
[ -1 ]
4,135
cl-pkr.asd
VitoVan_cl-pkr/cl-pkr.asd
#+sbcl (sb-ext:unlock-package :sb-ext) #+sbcl (defmethod asdf:perform ((o asdf:image-op) (c asdf:system)) (uiop:dump-image (asdf:output-file o c) :executable t #+sb-core-compression :compression #+sb-core-compression 9 #+win32 :application-type #+win32 :gui)) (asdf:defsystem #:cl-pkr :description "Cross Platform Color Picker written in Common Lisp" :author "Vito Van" :license "GPL-3.0" :version "1.2.0" :depends-on (#:ltk #+(or linux darwin) #:unix-opts #+(or win32 darwin) #:cffi #+linux #:clx) :serial t :components ((:file "package") (:file "common") #+darwin (:file "darwin") #+linux (:file "linux") #+win32 (:file "win32") (:file "cl-pkr")) :build-operation "program-op" :build-pathname "bin/color-picker" :entry-point "cl-pkr:color-picker")
969
Common Lisp
.asd
27
26.777778
67
0.552604
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
44908c50113680ac020ee5db4620d419e9edf6e3be6c35f2ba759f1065400200
4,135
[ -1 ]
4,141
deploy.sh
VitoVan_cl-pkr/deploy.sh
#!/bin/bash if [ "$TRAVIS_OS_NAME" = "" ] then case $(uname | tr '[:upper:]' '[:lower:]') in linux*) export OS=linux ;; darwin*) export OS=osx ;; msys*|mingw*) export OS=windows ;; *) export TRAVIS_OS_NAME=notset ;; esac else export OS=$TRAVIS_OS_NAME fi if [[ "$OS" == "windows" ]]; then export EXE=".exe"; fi if [[ "$OS" == "osx" ]]; then export APP=".app"; fi export TCLKIT=bin/tclkit-gui$EXE mkdir -p bin rm -rf bin/color-picker$EXE sbcl --disable-debugger \ --load cl-pkr.asd \ --eval "(ql:quickload 'cl-pkr)" \ --eval "(asdf:make :cl-pkr)" rm -rf out mkdir -p out if [[ "$OS" != "windows" ]]; then if [ ! -f "$TCLKIT" ]; then wget -O $TCLKIT \ https://github.com/VitoVan/kitgen/releases/download/8.6.12/$OS-tclkit-gui$EXE fi chmod +x bin/tclkit-gui; fi if [[ "$OS" == "windows" ]] then if [ "$EB" = "" ]; then echo "Please set env EB to the path of editbin.exe" exit 42 fi if [ ! -f bin/rh/rh.exe ]; then wget http://www.angusj.com/resourcehacker/resource_hacker.zip unzip resource_hacker.zip -d bin/rh mv bin/rh/ResourceHacker.exe bin/rh/rh.exe fi if [ ! -f bin/warp-packer.exe ]; then wget -O bin/warp-packer.exe https://github.com/dgiagio/warp/releases/download/v0.3.0/windows-x64.warp-packer.exe fi if [ ! -f "$TCLKIT" ]; then # get the not-UPX-ed version, to change icon with Resource Hacker wget -O $TCLKIT \ https://github.com/VitoVan/kitgen/releases/download/8.6.12/$OS-tclkit-gui$EXE fi mkdir -p out/tmp cp ./bin/color-picker.exe ./out/tmp/color-picker.exe # copy libzstd ls -lah /d/msys64/ cp /d/msys64/mingw64/bin/libzstd.dll ./out/tmp/libzstd.dll bin/rh/rh.exe -open ./bin/tclkit-gui.exe -save ./out/tmp/tclkit-gui-noicon.exe -action delete -mask ICONGROUP,, bin/rh/rh.exe -open ./out/tmp/tclkit-gui-noicon.exe -save ./out/tmp/tclkit-gui.exe -action addskip -res ./resources/iconfile.ico -mask ICONGROUP,TK rm -rf ./out/tmp/tclkit-gui-noicon.exe bin/warp-packer.exe --arch windows-x64 --input_dir ./out/tmp/ --exec color-picker.exe --output ./out/tmp/color-picker-warp.exe bin/rh/rh.exe -open ./out/tmp/color-picker-warp.exe -save ./out/color-picker.exe -action addskip -res ./resources/iconfile.ico -mask ICONGROUP,MAINICON "$EB" /subsystem:windows ./out/color-picker.exe rm -rf out/tmp fi if [[ "$OS" == "osx" ]] then export OSX_APP_DIR=out/color-picker.app/Contents mkdir -p $OSX_APP_DIR cp ./resources/Info.plist $OSX_APP_DIR/ mkdir -p $OSX_APP_DIR/MacOS cp ./bin/color-picker $OSX_APP_DIR/MacOS/color-picker-bin cp ./bin/tclkit-gui $OSX_APP_DIR/MacOS/ # copy libzstd cp /usr/local/lib/libzstd.1.dylib $OSX_APP_DIR/MacOS/ # set DYLD fallback cp ./resources/color-picker.sh $OSX_APP_DIR/MacOS/color-picker chmod +x $OSX_APP_DIR/MacOS/* mkdir -p $OSX_APP_DIR/Resources cp ./resources/iconfile.icns $OSX_APP_DIR/Resources cd out && zip -r -9 color-picker$APP.zip color-picker.app && cd .. rm -rf out/color-picker.app fi if [[ "$OS" == "linux" ]] then export LINUX_APP_DIR=out/color-picker.AppDir mkdir -p $LINUX_APP_DIR cp resources/AppRun $LINUX_APP_DIR/AppRun cp resources/color-picker.desktop $LINUX_APP_DIR/ cp resources/iconfile.svg $LINUX_APP_DIR/ mkdir -p $LINUX_APP_DIR/usr/bin cp bin/color-picker $LINUX_APP_DIR/usr/bin/ cp bin/tclkit-gui $LINUX_APP_DIR/usr/bin/ if [ ! -f bin/appimagetool ]; then wget -O bin/appimagetool \ https://github.com/AppImage/AppImageKit/releases/download/12/appimagetool-x86_64.AppImage fi chmod +x bin/appimagetool cd out && ../bin/appimagetool color-picker.AppDir color-picker.AppImage && cd .. rm -rf out/color-picker.AppDir fi
3,978
Common Lisp
.l
106
31.90566
155
0.63886
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
329a50c68f1829c8a42e9e41989ea512d2a19079fef0a4be63ec2e6b3303e509
4,141
[ -1 ]
4,144
.travis.yml
VitoVan_cl-pkr/.travis.yml
language: c os: - linux - osx - windows addons: apt: packages: - sbcl before_install: - if [[ "$TRAVIS_OS_NAME" == "osx" ]]; then export HOMEBREW_NO_AUTO_UPDATE=1; fi - if [[ "$TRAVIS_OS_NAME" == "osx" ]]; then brew install sbcl; fi - if [[ "$TRAVIS_OS_NAME" == "osx" ]]; then brew install make; fi - if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then wget http://prdownloads.sourceforge.net/sbcl/sbcl-1.4.14-x86-64-windows-binary.msi; fi - if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then 7z x sbcl-1.4.14-x86-64-windows-binary.msi -Osbcl-1.4.14; fi - if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then choco install make; fi install: - wget http://downloads.sourceforge.net/project/sbcl/sbcl/1.5.3/sbcl-1.5.3-source.tar.bz2 - bzip2 -cd sbcl-1.5.3-source.tar.bz2 | tar xvf - - cd sbcl-1.5.3 - if [[ "$TRAVIS_OS_NAME" == "osx" ]]; then export GNUMAKE=gmake; fi - if [[ "$TRAVIS_OS_NAME" != "windows" ]]; then sh make.sh --with-fancy --with-sb-core-compression; fi - if [[ "$TRAVIS_OS_NAME" != "windows" ]]; then sudo sh install.sh; fi - if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then PATH=$PATH:"../sbcl-1.4.14/" SBCL_HOME="../sbcl-1.4.14/" sh make.sh --with-fancy --with-sb-core-compression; fi - if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then sh install.sh; fi - if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then export PATH=$PATH:"C:\Program Files/sbcl/bin/"; fi - if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then export SBCL_HOME="C:\Program Files/sbcl/lib/sbcl/"; fi - cd .. - if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then export RH="C:\Program Files (x86)/Resource Hacker/ResourceHacker.exe"; fi - if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then cd ./.travis && ./whereis-editbin.bat && cd ..; fi - if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then export EB=`cat ./.travis/EDITBIN_PATH`; fi - wget https://beta.quicklisp.org/quicklisp.lisp - sbcl --load quicklisp.lisp --eval '(progn (quicklisp-quickstart:install) (quit))' - echo '(let ((quicklisp-init (merge-pathnames "quicklisp/setup.lisp" (user-homedir-pathname)))) (when (probe-file quicklisp-init) (load quicklisp-init)))' > ~/.sbclrc script: - bash deploy.sh # https://github.com/probonopd/uploadtool after_success: - export UPLOADTOOL_SUFFIX=$TRAVIS_OS_NAME - ls -lh out/* # Assuming you have some files in out/ that you would like to upload - wget -c https://github.com/probonopd/uploadtool/raw/master/upload.sh - bash upload.sh out/* branches: only: - # Do not build tags that we create when we upload to GitHub Releases - master
2,560
Common Lisp
.l
46
52.695652
169
0.647927
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
13bcbc93f438202f5eb3151856cfb9fc6e7013f5c457050c8b3ab456ec9ff4f3
4,144
[ -1 ]
4,146
main.yml
VitoVan_cl-pkr/.github/workflows/main.yml
# This is a basic workflow to help you get started with Actions name: CI # Controls when the workflow will run on: push: tags: - "*.*.*" - "pre-release-*" # Allows you to run this workflow manually from the Actions tab workflow_dispatch: # A workflow run is made up of one or more jobs that can run sequentially or in parallel jobs: osx-build: # The type of runner that the job will run on runs-on: macos-latest # Steps represent a sequence of tasks that will be executed as part of the job steps: # Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it - uses: actions/checkout@v3 # Prepare - name: Prepare SBCL run: | export HOMEBREW_NO_AUTO_UPDATE=1 brew install sbcl brew install make wget http://downloads.sourceforge.net/project/sbcl/sbcl/2.2.7/sbcl-2.2.7-source.tar.bz2 bzip2 -cd sbcl-2.2.7-source.tar.bz2 | tar xvf - cd sbcl-2.2.7 export GNUMAKE=gmake sh make.sh --with-fancy --with-sb-core-compression sudo sh install.sh wget https://beta.quicklisp.org/quicklisp.lisp sbcl --load quicklisp.lisp --eval '(progn (quicklisp-quickstart:install) (quit))' echo '(let ((quicklisp-init (merge-pathnames "quicklisp/setup.lisp" (user-homedir-pathname)))) (when (probe-file quicklisp-init) (load quicklisp-init)))' > ~/.sbclrc # Runs a set of commands using the runners shell - name: Build APP run: | bash deploy.sh ls -lah out/ - name: GH Release uses: softprops/[email protected] with: prerelease: true files: | out/* # This workflow contains a single job called "build" linux-build: # The type of runner that the job will run on runs-on: ubuntu-latest # Steps represent a sequence of tasks that will be executed as part of the job steps: # Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it - uses: actions/checkout@v3 # Prepare - name: Prepare SBCL run: | export HOMEBREW_NO_AUTO_UPDATE=1 sudo apt install sbcl libzstd-dev libcapstone-dev gcc-multilib wget http://downloads.sourceforge.net/project/sbcl/sbcl/2.2.7/sbcl-2.2.7-source.tar.bz2 bzip2 -cd sbcl-2.2.7-source.tar.bz2 | tar xvf - cd sbcl-2.2.7 sh make.sh --with-fancy --with-sb-core-compression sudo sh install.sh wget https://beta.quicklisp.org/quicklisp.lisp sbcl --load quicklisp.lisp --eval '(progn (quicklisp-quickstart:install) (quit))' echo '(let ((quicklisp-init (merge-pathnames "quicklisp/setup.lisp" (user-homedir-pathname)))) (when (probe-file quicklisp-init) (load quicklisp-init)))' > ~/.sbclrc # Runs a set of commands using the runners shell - name: Build APP run: | bash deploy.sh ls -lah out/ - name: GH Release uses: softprops/[email protected] with: prerelease: true files: | out/* windows-build: # The type of runner that the job will run on runs-on: windows-latest # Steps represent a sequence of tasks that will be executed as part of the job steps: # Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it - uses: actions/checkout@v3 - uses: msys2/setup-msys2@v2 with: location: D:\ release: true update: false install: >- unzip p7zip mingw-w64-x86_64-gcc mingw-w64-x86_64-zstd make diffutils git - name: Install Host SBCL shell: msys2 {0} run: | wget http://prdownloads.sourceforge.net/sbcl/sbcl-2.2.7-x86-64-windows-binary.msi 7z x sbcl-2.2.7-x86-64-windows-binary.msi -Osbcl-2.2.7-bin wget http://downloads.sourceforge.net/project/sbcl/sbcl/2.2.7/sbcl-2.2.7-source.tar.bz2 bzip2 -cd sbcl-2.2.7-source.tar.bz2 | tar xvf - - name: Build New SBCL shell: msys2 {0} run: | cd sbcl-2.2.7 PATH=$PATH:"../sbcl-2.2.7-bin/" SBCL_HOME="../sbcl-2.2.7-bin/" sh make.sh --xc-host='sbcl --lose-on-corruption --disable-ldb --disable-debugger' --with-fancy --with-sb-core-compression sh install.sh - name: Config MSBuild uses: microsoft/[email protected] - name: Config Editbin shell: cmd run: | call "C:\Program Files\Microsoft Visual Studio\2022\Enterprise\VC\Auxiliary\Build\vcvars64.bat" where editbin > EDITBIN_PATH - name: Config New SBCL and Build APP shell: msys2 {0} run: | export PATH=$PATH:"/c/Program Files/sbcl/bin/" export SBCL_HOME="/c/Program Files/sbcl/lib/sbcl/" export EB=`cat EDITBIN_PATH` wget https://beta.quicklisp.org/quicklisp.lisp sbcl --load quicklisp.lisp --eval '(progn (quicklisp-quickstart:install) (quit))' echo '(let ((quicklisp-init (merge-pathnames "quicklisp/setup.lisp" (user-homedir-pathname)))) (when (probe-file quicklisp-init) (load quicklisp-init)))' > ~/.sbclrc bash deploy.sh ls -lah out/ - name: GH Release uses: softprops/[email protected] with: prerelease: true files: | out/*
5,564
Common Lisp
.l
134
32.529851
194
0.620056
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
8638d84fabf39b724df3f9b59f84c2ae74de64634bbf24681913be235b459d8c
4,146
[ -1 ]
4,147
Info.plist
VitoVan_cl-pkr/resources/Info.plist
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>NSHighResolutionCapable</key> <true/> <key>CFBundleIconFile</key> <string>iconfile</string> </dict> </plist>
305
Common Lisp
.l
10
27.5
102
0.667797
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
a0c1d3f04abe2462e53cf8ef0110932d183b84c652b281f8356175a714f2feeb
4,147
[ -1 ]
4,148
iconfile.svg
VitoVan_cl-pkr/resources/iconfile.svg
<?xml version="1.0" encoding="iso-8859-1"?> <!-- Generator: Adobe Illustrator 19.0.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) --> <svg version="1.1" id="Capa_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 468.293 468.293" style="enable-background:new 0 0 468.293 468.293;" xml:space="preserve"> <path style="fill:#2F4859;" d="M49.348,12.832L49.348,12.832c17.11-17.111,44.851-17.11,61.962,0.001l67.416,67.416l-61.961,61.961 L49.349,74.795C32.239,57.684,32.238,29.943,49.348,12.832z"/> <path style="fill:#D5D6DB;" d="M187.202,78.056l148.377,148.377c29.749,29.749,47.551,69.111,50.703,110.773l18.187,18.187 c3.469,3.469,3.469,9.093,0,12.561l0,0c-3.469,3.469-9.093,3.469-12.561,0l-18.189-18.189 c-41.663-3.155-81.021-20.954-110.77-50.703L114.572,150.686L187.202,78.056z"/> <path style="fill:#27A2DB;" d="M364.856,265.514H229.4l33.548,33.548c29.749,29.749,69.107,47.549,110.77,50.704l18.189,18.188 c3.469,3.469,9.092,3.468,12.561,0l0,0c3.469-3.469,3.469-9.093,0-12.561l-18.187-18.187 C384.367,311.901,376.974,287.481,364.856,265.514z"/> <path style="fill:#64798A;" d="M203.832,62.471L203.832,62.471c5.782,5.782,5.782,15.155,0,20.937l-83.908,83.908 c-5.781,5.781-15.155,5.781-20.937,0l0,0c-5.781-5.781-5.781-15.155,0-20.937l83.908-83.908 C188.677,56.689,198.051,56.689,203.832,62.471z"/> <path style="fill:#27A2DB;" d="M398.186,376.886c0,0-33.59,39.265-33.59,57.816c0,18.551,15.039,33.59,33.59,33.59 c18.551,0,33.59-15.039,33.59-33.59C431.777,416.151,398.186,376.886,398.186,376.886z"/> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> </svg>
1,753
Common Lisp
.l
48
34.3125
128
0.659824
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
1af4c7c7c2a8879d7d483e977dcf300cbd697631618ba01f9853349150fcaf5e
4,148
[ -1 ]
4,149
color-picker.sh
VitoVan_cl-pkr/resources/color-picker.sh
#!/bin/bash export USER_DIR=$(pwd)/ # https://stackoverflow.com/questions/59895/how-can-i-get-the-source-directory-of-a-bash-script-from-within-the-script-itsel SOURCE="${BASH_SOURCE[0]:-$0}"; while [ -L "$SOURCE" ]; do # resolve $SOURCE until the file is no longer a symlink DIR="$( cd -P "$( dirname -- "$SOURCE"; )" &> /dev/null && pwd 2> /dev/null; )"; SOURCE="$( readlink -- "$SOURCE"; )"; [[ $SOURCE != /* ]] && SOURCE="${DIR}/${SOURCE}"; # if $SOURCE was a relative symlink, we need to resolve it relative to the path where the symlink file was located done DIR="$( cd -P "$( dirname -- "$SOURCE"; )" &> /dev/null && pwd 2> /dev/null; )"; cd $DIR if [[ "$OSTYPE" == "linux-gnu"* ]]; then # LD_LIBRARY_PATH=./ ./color-picker-bin echo "NO NEED TO CALL THIS FILE" elif [[ "$OSTYPE" == "darwin"* ]]; then DYLD_FALLBACK_LIBRARY_PATH=./ ./color-picker-bin else echo "Unknown Platform." fi
918
Common Lisp
.l
19
45.842105
166
0.632699
VitoVan/cl-pkr
47
2
2
GPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
3ac12d853dc75997c52d80c65472857df5813d2168a3586ff325110778231142
4,149
[ -1 ]
4,164
package.lisp
atgreen_red-light-green-light/package.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019, 2020, 2021 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. ;;;; package.lisp (defpackage #:matcher (:use #:cl) (:shadow #:package) (:export #:make-policy-matcher #:matcher #:githash #:log-entry #:kind #:expiration-date #:match-pair-in-alist #:match-candidate-pattern)) (defpackage #:policy (:use #:cl #:matcher #:cl-fad) (:shadow #:package) (:export #:*policy-dir* #:make-policy #:apply-policy #:commit-url-format #:version #:compile-scanners #:policy-repo-error #:policy-repo-error-description)) (defpackage #:rlgl-server (:use #:snooze #:cl #:matcher #:policy #:spinneret) (:shadow #:package) (:export #:start-rlgl-server #:stop-rlgl-server #:db #:db/sqlite #:db/postgresql #:storage/local #:storage/s3))
1,559
Common Lisp
.lisp
39
37.307692
78
0.69723
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
ad30835a8bbb5c99663a7293f2f3d2ece7fe07020df5dc6aa3a978b0217a305f
4,164
[ -1 ]
4,165
storage-local.lisp
atgreen_red-light-green-light/storage-local.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019, 2020, 2021, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-server) ;;; MVP storage driver using local storage (defclass storage/local (storage-backend) ((local-dir :reader local-dir))) (defmethod initialize-instance :after ((backend storage/local) &key) "Initialize a local storage backend." (log:info "Initializing storage/local") (setf (slot-value backend 'local-dir) (or (gethash "local-dir" (config backend) "/var/rlgl/docs"))) (let ((filename (str:concat (local-dir backend) "/.key" ))) (if (probe-file filename) (setf (slot-value backend 'key) (alexandria:read-file-into-string filename :external-format :latin-1)) (let ((key (rlgl-util:random-base36-string))) (with-open-file (stream filename :direction :output :if-exists :supersede :if-does-not-exist :create) (format stream key) (setf (slot-value backend 'key) key)))))) (defmethod delete-document ((backend storage/local) ref) "Delete a document from local storage." (delete-file (str:concat (local-dir backend) "/" (string ref)))) (defmethod read-document ((backend storage/local) ref) "Return an octet vector containing the document." (alexandria:read-file-into-byte-vector (str:concat (local-dir backend) "/" (string ref)))) (defmethod store-document ((backend storage/local) document) "Store a document into local storage." (let ((filename (concatenate 'string "RLGL-" (rlgl-util:random-base36-string)))) (with-open-file (stream (str:concat (local-dir backend) "/" filename) :direction :output :if-exists :supersede :if-does-not-exist :create :element-type '(unsigned-byte 8)) (write-sequence document stream) filename)))
2,523
Common Lisp
.lisp
53
44.245283
92
0.712546
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
9a9c234b37e09e005b980fa9f28daa20e3f6a7752e4f9bcfe1c69de60ca7145e
4,165
[ -1 ]
4,166
policy.lisp
atgreen_red-light-green-light/policy.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: POLICY; Base: 10 -*- ;;; ;;; Copyright (C) 2018-2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. ;; Matcher routines (in-package #:policy) (defvar *policy-lock* (bt:make-lock)) (defvar *policy-dir* nil) (defvar *git-log-table* (make-hash-table :test 'equal)) (defvar *git-commit-table* (make-hash-table :test 'equal)) (define-condition policy-repo-error (error) ((description :reader policy-repo-error-description :initarg :description)) (:report (lambda (condition stream) (format stream (policy-repo-error-description condition))))) (defclass policy () ((version :reader version) (xfail-matchers :reader xfail-matchers) (pass-matchers :reader pass-matchers) (fail-matchers :reader fail-matchers) (commit-url-format :reader commit-url-format))) (defun guess-commit-url-format (url) "Guess the commit URL format string based on URL." ;; They mostly look like this (gogs & github). Haven't seen ;; anything different yet... (str:concat (if (str:ends-with? ".git" url) (str:substring 0 (- (length url) 4) url) url) "/commit/~A")) (defun make-policy (url &key (commit-url-format (guess-commit-url-format url))) "Create an intance of a POLICY object based on the contents of the git repo at URL. If :COMMIT-URL-FORMAT is provided, use that as the format string for generating a git commit url given a commit hash argument. If not provided, we will try to guess this format string based on URL." ;; Hold one big lock, just in case... (bt:with-lock-held (*policy-lock*) (let* ((policy-dirname (str:concat (namestring *policy-dir*) (subseq (ironclad:byte-array-to-hex-string (ironclad:digest-sequence :sha1 (flexi-streams:string-to-octets url))) 0 8)))) ;; Update the policy (let ((output (if (not (fad:directory-exists-p policy-dirname)) (progn (log:info "GIT_TERMINAL_PROMPT=0 /usr/bin/git clone ~A ~A" url policy-dirname) (inferior-shell:run (format nil "GIT_TERMINAL_PROMPT=0 /usr/bin/git clone ~A ~A" url policy-dirname))) (progn (log:info "bash -c \"(cd ~A; /usr/bin/git pull --ff-only)\"" policy-dirname) (inferior-shell:run (format nil "bash -c \"(cd ~A; /usr/bin/git pull --ff-only)\"" policy-dirname)))))) (dolist (line output) (log:info line))) (let ((policy-pathname (fad:pathname-as-directory (make-pathname :name policy-dirname)))) (let ((xfail-file (merge-pathnames-as-file policy-pathname #p"XFAIL")) (pass-file (merge-pathnames-as-file policy-pathname #p"PASS")) (fail-file (merge-pathnames-as-file policy-pathname #p"FAIL"))) (dolist (file (list xfail-file pass-file fail-file)) (unless (file-exists-p (namestring file)) (fad:delete-directory-and-files policy-pathname :if-does-not-exist :ignore) (error 'policy-repo-error :description "Policy repo is missing policy files"))) (let ((p (make-instance 'policy))) (setf (slot-value p 'version) (inferior-shell:run/ss (format nil "bash -c \"(cd ~A; git rev-parse HEAD)\"" policy-dirname))) (setf (slot-value p 'commit-url-format) commit-url-format) (setf (slot-value p 'xfail-matchers) (read-json-patterns :XFAIL xfail-file)) (setf (slot-value p 'pass-matchers) (read-json-patterns :PASS pass-file)) (setf (slot-value p 'fail-matchers) (read-json-patterns :FAIL fail-file)) ;; Map all of the commit hashes to this policy for future ;; reference. (let ((hash-log (inferior-shell:run/lines (format nil "bash -c \"(cd ~A; git log --pretty=%H)\"" policy-dirname)))) (dolist (key hash-log) (setf (gethash key *git-commit-table*) p))) p)))))) ;; regex matcher for the special case of numeric ranges: two floating ;; point numbers separated by "..". (defparameter +range-matcher+ (cl-ppcre:create-scanner "^\\d+(|\.\\d*)\.\.\\d+(|\.\\d*)$")) (defparameter +number-matcher+ (cl-ppcre:create-scanner "^\\d+(|\.\\d*)")) (defparameter +numeric-range+ (cl-ppcre:create-scanner "^(\\d+)\.\.(\\d+)$")) (defun parse-numeric-range (value) "Extract the numeric values for a double-dotted range." (metabang.bind:bind (((:values _ _ start-array end-array) (cl-ppcre:scan +numeric-range+ value))) (values (parse-integer (subseq value (aref start-array 0) (aref end-array 0))) (parse-integer (subseq value (aref start-array 1) (aref end-array 1)))))) (defun compile-scanners (matcher) "Given an alist, MATCHER, replace the CDR of each pair with a function that runs one of three matching algorithms against a single string argument: numeric range checks, regexp matching, and string comparison. The algorithm choice depends on the CDR of the pair, which is either a numeric range string ('..' notation), a regexp (starting with \#^), or any other string." (mapcar (lambda (pair) (cons (car pair) (cond ((cl-ppcre:scan +range-matcher+ (cdr pair)) (multiple-value-bind (start end) (parse-numeric-range (cdr pair)) (eval `(lambda (s) (and (cl-ppcre:scan +number-matcher+ s) (let ((num (parse-integer s))) (and (>= num ,start) (<= num ,end)))))))) ((eq (char (cdr pair) 0) #\^) (eval `(lambda (s) (cl-ppcre:scan ,(cl-ppcre:create-scanner (str:concat (cdr pair) "$")) s)))) (t (eval `(lambda (s) (string= s ,(cdr pair)))))))) matcher)) (defun extract-expiration-date (line) "Given a matcher string LINE, return a universal time value if one exists after the JSON object, or NIL otherwise." (let* ((last-brace (position #\} line :from-end t)) (date-string (str:trim (str:substring (+ last-brace 1) t line)))) (and (> (length date-string) 0) (date-time-parser:parse-date-time date-string)))) ;; An arbitratily far-away date, representing "never" (defparameter +the-year-3000+ (date-time-parser:parse-date-time "3000")) (defun read-json-patterns (kind filename) (let ((patterns (list))) (let ((matcher-lines (inferior-shell:run/lines (format nil "bash -c \"(cd $(dirname ~A); git blame -s -l $(basename ~A))\"" filename filename)))) (dolist (matcher-line matcher-lines) (let ((githash (subseq (remove #\^ matcher-line) 0 40))) (multiple-value-bind (lineno location) (read-from-string (subseq matcher-line 40)) (let ((line (string-trim '(#\Space #\Tab) (subseq matcher-line (+ 41 location))))) (when (and (> (length line) 0) (null (find (char line 0) "#;-"))) (let ((json (compile-scanners (json:decode-json-from-string line)))) (setf patterns (cons (make-policy-matcher :kind kind :githash githash :lineno lineno :matcher json :expiration-date (or (extract-expiration-date line) +the-year-3000+)) patterns)))))))) ;; Now go through git logs (dolist (matcher patterns) (let* ((githash (githash matcher)) (log-entry (gethash githash *git-log-table*))) (when (and (null log-entry) (not (string= githash ; check for local change "0000000000000000000000000000000000000000"))) (progn (setf log-entry (inferior-shell:run/lines (format nil "bash -c \"(cd $(dirname ~A); git log -n 1 -r ~A $(basename ~A))\"" filename githash filename))) (setf (gethash githash *git-log-table*) log-entry))) (setf (slot-value matcher 'log-entry) log-entry)))) patterns)) (defun apply-policy (policy candidate-result-list) "Apply a POLICY to CANDIDATE-RESULT-LIST, a list of test results, where these results are represented as alists derived from json encoded values produced by the report parsers. This function returns two values: :GREEN or :RED, as well as a list of pairs made by consing the matcher object with the test result alist." (let ((red-or-green :GREEN) (now (get-universal-time))) (let ((result (mapcar (lambda (result) (cons (or ;; Check for exceptions (find-if (lambda (matcher) (and (< now (expiration-date matcher)) (match-candidate-pattern result (matcher matcher)))) (xfail-matchers policy)) ;; Now check for failures (let ((red-match (find-if (lambda (matcher) (and (< now (expiration-date matcher)) (match-candidate-pattern result (matcher matcher)))) (fail-matchers policy)))) (when red-match (setf red-or-green :RED)) red-match) ;; Now check for passes (find-if (lambda (matcher) (and (< now (expiration-date matcher)) (match-candidate-pattern result (matcher matcher)))) (pass-matchers policy)) ;; We don't have a match. Let's fail. (progn (setf red-or-green :RED) nil)) result)) candidate-result-list))) (values red-or-green result))))
9,755
Common Lisp
.lisp
226
37.517699
99
0.652137
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
f8f0d0ee0eb1ce559aa28155bb6650dd3a27efcef4a90e535fd775d7d069c291
4,166
[ -1 ]
4,167
api-key.lisp
atgreen_red-light-green-light/api-key.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019, 2020, 2021 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. ;; Make base32-style API keys. ;; Inspired by https://www.npmjs.com/package/uuid-apikey (defpackage #:rlgl.api-key (:use #:cl) (:shadow #:package) (:export #:make-api-key #:authorize-by-api-key #:authorize-by-policy-bound-api-key)) (in-package #:rlgl.api-key) (defun authorize-by-api-key (db api-key) (if (or (rlgl.db:find-puk-by-api-key db api-key) (rlgl.db:find-policy-bound-api-key db api-key)) t nil)) (defun authorize-by-policy-bound-api-key (db api-key policy-name) "Return nil if API-KEY is bound to a policy that is not POLICY-NAME, and t otherwise." (let ((bound-policy (rlgl.db:find-policy-bound-api-key db api-key))) (if bound-policy (string= policy-name bound-policy) t))) (defun int-to-byte-array (int) (let ((a (make-array 4))) (setf (aref a 0) (ldb (byte 8 0) int)) (setf (aref a 1) (ldb (byte 8 8) int)) (setf (aref a 2) (ldb (byte 8 16) int)) (setf (aref a 3) (ldb (byte 8 24) int)) a)) (defun string-to-base32 (s start end) (str:substring 0 7 (base32:bytes-to-base32 (int-to-byte-array (parse-integer (str:substring start end s) :radix 16))))) (defun make-api-key () "Make a base32-style API key." (let ((uuid (str:replace-all "-" "" (print-object (uuid:make-v4-uuid) nil)))) (str:upcase (str:concat (string-to-base32 uuid 0 7) "-" (string-to-base32 uuid 8 15) "-" (string-to-base32 uuid 16 23) "-" (string-to-base32 uuid 24 31)))))
2,347
Common Lisp
.lisp
61
35.016393
88
0.670764
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
daab5f2543b1d77fb55ac6993cf8b8bc93ee9d082958c3fe49d79e6ede8d4d18
4,167
[ -1 ]
4,168
matcher.lisp
atgreen_red-light-green-light/matcher.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019, 2020 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. ;; Matcher routines (in-package #:matcher) (defclass policy-matcher () ((kind :initarg :kind :reader kind) (githash :initarg :githash :reader githash) (lineno :initarg :lineno :reader lineno) (matcher :initarg :matcher :reader matcher) (expiration-date :initarg :expiration-date :reader expiration-date) (log-entry :reader log-entry))) (defun make-policy-matcher (&key kind (githash nil) (lineno 0) (matcher nil) expiration-date) (make-instance 'policy-matcher :kind kind :githash githash :lineno lineno :matcher matcher :expiration-date expiration-date)) (defun match-pair-in-alist (pair alist) "Given a cons PAIR, return non-NIL if PAIR matches in ALIST using the function stored in the CDR of PAIR." (let ((c (assoc (car pair) alist))) (and c (apply (cdr pair) (list (cdr c)))))) (defun match-candidate-pattern (candidate pattern) "Given a CANDIDATE alist, return T if PATTERN matches CANDIDATE." (not (find-if-not (lambda (v) (match-pair-in-alist v candidate)) pattern)))
2,006
Common Lisp
.lisp
46
40.043478
75
0.680655
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
689394b3325e09451b5a2a826342272e43d60f5030163dd152b599f0eb7e6768
4,168
[ -1 ]
4,169
storage-s3.lisp
atgreen_red-light-green-light/storage-s3.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*- ;;; ;;; Copyright (C) 2019, 2021, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-server) ;;; MVP storage driver using s3 storage ;; ---------------------------------------------------------------------------- ;; Make an AWS credentials list from environment variables (defun getenv-aws-credentials () (list (uiop:getenv "AWS_ACCESS_KEY") (uiop:getenv "AWS_SECRET_KEY"))) ;; ---------------------------------------------------------------------------- (defclass storage/s3 (storage-backend) ((s3-endpoint :initarg :s3-endpoint :reader s3-endpoint) (s3-bucket :initarg :s3-bucket :reader s3-bucket))) (defmethod initialize-instance :after ((backend storage/s3) &key) "Initialize a s3 storage backend." (log:info "Initializing storage/s3") (setf zs3:*credentials* (getenv-aws-credentials)) (setf (slot-value backend 's3-endpoint) (or (gethash "s3-endpoint" (config backend) "s3.amazonaws.com"))) (setf (slot-value backend 's3-bucket) (or (gethash "s3-bucket" (config backend) "rlgl-docs-2"))) (unless (zs3:bucket-exists-p (s3-bucket backend)) (zs3:create-bucket (s3-bucket backend)))) (defmethod delete-document ((backend storage/local) ref) "Delete a document from local storage." (zs3:delete-object (s3-bucket backend) (string ref))) (defmethod read-document ((backend storage/s3) ref) "Return a string containing the document." (zs3:get-vector (s3-bucket backend) (string ref))) (defmethod store-document ((backend storage/s3) document) "Store a document into s3 storage." (let ((ref (str:concat "RLGL-" (rlgl-util:random-base36-string)))) (zs3:put-vector document (s3-bucket backend) ref) ref))
2,471
Common Lisp
.lisp
49
47.877551
79
0.672471
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
b85e5d5a695d909cab66e9c7e15d3087e363a899352b4e9037e808e15d0b017f
4,169
[ -1 ]
4,170
test.lisp
atgreen_red-light-green-light/test/test.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*- ;;; ;;; Copyright (C) 2018-2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package #:cl-user) (defpackage #:test-rlgl-server (:use #:common-lisp #:rlgl-server #:prove #:matcher #:policy) (:export #:run)) (in-package #:test-rlgl-server) (setf prove:*default-reporter* :fiveam) (setf prove:*debug-on-error* t) (defvar *upload-ref* nil) (defun test-eval (report) (print (pathname report)) (subtest (format nil "upload ~A" report) (let* ((params `((file . (,(pathname report) :content-type "application/octet-stream" :filename ,(pathname report))))) (upload-ref (drakma:http-request "http://localhost:8080/upload" :method :post :form-data t :parameters params))) (setf *upload-ref* upload-ref) (like upload-ref "RLGL-[A-Z0-9]+"))) (subtest (format nil "evaluate ~A" report) (let* ((result (drakma:http-request "http://localhost:8080/evaluate" :method :post :content-type "application/json" :content (format nil "{ \"id\": \"~A\", \"policy\": \"~A\", \"ref\": \"~A\" }" (rlgl-util:random-base36-string) "http://github.com/moxielogic/rlgl-toolchain-policy" *upload-ref*))) (json (json:decode-json-from-string result))) (setf *json* json) (like (cdr (assoc :CALLBACK json)) "[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+"))) (subtest (format nil "callback ~A" report) (let ((result (nth-value 1 (drakma:http-request "http://localhost:8080/callback" :method :post :content-type "application/json" :content (format nil "{ \"id\": \"~A\", \"signature\": \"MGUCMEYUlcrqJlgR+p8AKNP1hOTZqspNbOnXMssK3xDq2q0Z9J/y0owNCaNz5gWu/NTjMAIxAPpztPFIbjtWugP0cyqhe6L3mtrzUjZazLEcTOnThJmEWPni1COga+wIUtqvgN3VxQ==\" }" (cdr (assoc :CALLBACK *json*))))))) (is result 200))) ) (defun run () (plan 1) (start-rlgl-server t "test/config.ini") ;; --------------------------------------------------------------------------- ;; API tests ;; --------------------------------------------------------------------------- (subtest "start test" (loop for i from 0 to 10 do (let ((id (drakma:http-request "http://localhost:8080/start"))) (is (length id) 8)))) (test-eval "test/report.html") (test-eval "test/sample-junit.xml") (test-eval "test/mysql-aqua.html") (test-eval "test/clair-report.json") (test-eval "test/empty-clair-report.json") (let* ((result (nth-value 1 (drakma:http-request "http://localhost:8080/evaluate" :method :post :content-type "application/json" :content (format nil "{ \"id\": \"~A\", \"policy\": \"http://github.com/atgreen/red-light-green-light\", \"ref\": \"~A\" }" (rlgl-util:random-base36-string) *upload-ref*))))) (log:info result)) (finalize) (if (uiop:getenv "RLGL_WAIT4EVER") (progn (format t "Waiting forever. Hit CTRL-C to exit.") (loop (sleep 3000)))) )
4,210
Common Lisp
.lisp
86
38.744186
233
0.54944
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
f0431c82d69cf09c8d17ac8974674d171583bd79ae399212b776ca148a907d3b
4,170
[ -1 ]
4,171
db.lisp
atgreen_red-light-green-light/db/db.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL.DB; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019, 2020, 2021, 2022 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. ;; Database routines (in-package #:rlgl.db) (defclass db-backend () ((key :initarg :key :reader key) (make-user-fn :initarg :make-user-fn :reader make-user-fn) (make-api-key-fn :initarg :make-api-key-fn :reader make-api-key-fn) (sql-insert-log-statement :initarg :sql-insert-log-statement :reader sql-insert-log-statement))) (defmethod initialize-instance :after ((db db-backend) &key) (let ((dbc (connect-cached db))) (when (fresh db) (mapc (lambda (command) (dbi:do-sql dbc command)) '("drop table if exists log;" "drop table if exists users;" "drop table if exists labels;" "drop table if exists policy_bound_api_keys;" "drop table if exists api_keys;"))) (mapc (lambda (command) (dbi:do-sql dbc command)) '("create table if not exists log (version char(40), colour varchar(6), report varchar(24) not null, signature char(140) not null, client_signature char(140) not null, unixtimestamp integer);" "create table if not exists policy_bound_api_keys (api_key char(31) not null, policy varchar(256) not null);" "create table if not exists labels (puk integer, report char(13), key varchar(64), value varchar(256));" "create table if not exists api_keys (puk integer, api_key char(31) not null);")))) (defmethod record-log ((db db-backend) api-key version result report signature client-signature labels) (let ((stmt (format nil (sql-insert-log-statement db) version result report signature client-signature))) (log:info stmt) (let ((connection (connect-cached db))) (dbi:do-sql connection stmt) (dolist (kv labels) (dbi:do-sql connection (format nil "insert into labels(puk, report, key, value) values ('~A', '~A', '~A', '~A');" (find-puk-by-api-key db api-key) report (str:substring 0 64 (string (car kv))) (str:substring 0 256 (cdr kv)))))))) (defmethod report-log ((db db-backend) server-uri labels) (let* ((connection (connect-cached db)) (report-sets (mapcar (lambda (kv) (let* ((query (dbi:prepare connection (format nil "select report from labels where key = '~A' and value = '~A'" (str:substring 0 64 (string (car kv))) (str:substring 0 256 (cdr kv))))) (result (dbi:execute query)) (reports (loop for row = (dbi:fetch result) while row collect (destructuring-bind (j1 report) row report)))) (fset:convert 'fset:set reports))) labels)) (reports (if (eq (length report-sets) 1) (car report-sets) (fset:reduce #'fset:intersection report-sets))) (fstr (make-array '(0) :element-type 'base-char :fill-pointer 0 :adjustable t))) (with-output-to-string (s fstr) (fset:do-set (report reports) (let* ((query (dbi:prepare (connect-cached db) (format nil "select unixtimestamp, colour, version, client_signature from log where report = '~A';" report))) (result (dbi:execute query))) (loop for row = (dbi:fetch result) while row do (destructuring-bind (j1 time j2 result j3 version j4 client-signature) row (local-time:format-timestring s (local-time:unix-to-timestamp time) :format local-time:+rfc-1123-format+) (format s ": ~A [~5A] ~A/doc?id=~A ~A~%" result version server-uri report client-signature)))))) fstr)) (defmethod find-signature-by-report ((db db-backend) report) (let* ((query (dbi:prepare (connect-cached db) (format nil "select signature from log where report = '~A';" report))) (result (dbi:fetch (dbi:execute query)))) (str:trim (getf result :|signature|)))) (defmethod find-client-signature-by-report ((db db-backend) report) (let* ((query (dbi:prepare (connect-cached db) (format nil "select client_signature from log where report = '~A';" report))) (result (dbi:fetch (dbi:execute query)))) (str:trim (getf result :|client_signature|)))) (defmethod find-puk-by-api-key ((db db-backend) api-key) (let* ((query (dbi:prepare (connect-cached db) (format nil "select puk from api_keys where api_key = '~A';" api-key))) (result (dbi:fetch (dbi:execute query)))) (getf result :|puk|))) (defmethod find-policy-bound-api-key ((db db-backend) api-key) (let* ((query (dbi:prepare (connect-cached db) (format nil "select policy from policy_bound_api_keys where api_key = '~A';" api-key))) (result (dbi:fetch (dbi:execute query)))) (getf result :|policy|))) (defmethod register-test-api-key ((db db-backend) api-key) (dbi:do-sql (connect-cached db) (format nil "insert into api_keys(puk, api_key) values (-1, '~A');" api-key))) (defmethod find-user-by-keycloak-id ((db db-backend) user-uuid preferred-username) (let* ((query (dbi:prepare (connect-cached db) (format nil "select puk from users where user_uuid = '~A';" user-uuid))) (result (dbi:fetch (dbi:execute query))) (user (let ((puk (getf result :|puk|))) (log:info "found user puk ~A" puk) (and puk (let* ((query (dbi:prepare (connect-cached db) (format nil "select api_key from api_keys where puk = ~A;" puk))) (junk (log:info (dbi:fetch (dbi:execute query)))) (api-key (getf (dbi:fetch (dbi:execute query)) :|api_key|))) (log:info "~A" result) (funcall (make-user-fn db) puk user-uuid api-key preferred-username)))))) (if (null user) (progn (log:info "registering new user ~A" user-uuid) (dbi:do-sql (connect-cached db) (format nil "insert into users(user_uuid, created_at) values ('~A', ~A);" user-uuid (local-time:timestamp-to-unix (local-time:now)))) (let* ((query (dbi:prepare (connect-cached db) (format nil "select puk from users where user_uuid = '~A';" user-uuid))) (newpuk (getf (dbi:fetch (dbi:execute query)) :|puk|))) (log:info "created user puk ~A" newpuk) (dbi:do-sql (connect-cached db) (format nil "insert into api_keys(puk, api_key) values (~A, '~A');" newpuk (funcall (make-api-key-fn db))))) (find-user-by-keycloak-id db user-uuid preferred-username)) user))) (defmethod register-policy-bound-api-key ((db db-backend) api-key policy) (dbi:do-sql (connect-cached db) (format nil "insert into policy_bound_api_keys(api_key, policy) values ('~A', '~A');" api-key policy)) (dbi:do-sql (connect-cached db) (format nil "insert into users(user_uuid, created_at) values ('~A', ~A) on conflict do nothing;" api-key (local-time:timestamp-to-unix (local-time:now)))) api-key)
8,079
Common Lisp
.lisp
143
46.538462
195
0.607499
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
618664308cfa06b619507d7d35a0af3697b2e2680bab5401713664d32f6d49a7
4,171
[ -1 ]
4,172
package.lisp
atgreen_red-light-green-light/db/package.lisp
(defpackage #:rlgl.db (:use #:cl) (:shadow #:package) (:export #:record-log #:report-log #:db/sqlite #:db/postgresql #:find-puk-by-api-key #:find-user-by-keycloak-id #:find-policy-bound-api-key #:find-signature-by-report #:find-client-signature-by-report #:register-policy-bound-api-key #:register-test-api-key))
345
Common Lisp
.lisp
7
43.714286
80
0.66568
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
fa7bdf6054b843f1ac0fde5956fcf6ce469e48988027d83fe8da340ce01505e3
4,172
[ -1 ]
4,173
db-postgresql.lisp
atgreen_red-light-green-light/db/db-postgresql.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL.DB; Base: 10 -*- ;;; ;;; Copyright (C) 2019, 2020, 2021, 2022 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. ;; Postgres driver (in-package #:rlgl.db) (defclass db/postgresql (db-backend) ((db-name :initarg :db-name :reader db-name) (host :initarg :host :reader host) (port :initarg :port :reader port) (password :initarg :password :reader password) (fresh :initarg :fresh :initform nil :reader fresh)) (:default-initargs :db-name "rlgl" :host "localhost" :port 5432 :sql-insert-log-statement "insert into log(version, colour, report, signature, client_signature, unixtimestamp) values ('~A', '~A', '~A', '~A', '~A', round(extract(epoch from now())));")) (defmethod initialize-instance :after ((db db/postgresql) &key) (let ((dbc (connect-cached db))) (mapc (lambda (command) (log:info command) (dbi:do-sql dbc command)) '("create extension if not exists \"uuid-ossp\";" "create table if not exists users (puk serial primary key, user_uuid char(36) not null, created_at integer, unique(user_uuid));")))) (defmethod connect-cached ((db db/postgresql)) (log:info "establishing postgresql connection at ~A:~A" (host db) (port db)) (log:info "postgresql host IP: ~A" (sb-bsd-sockets:get-host-by-name (host db))) (dbi:connect-cached :postgres :database-name (db-name db) :host (host db) :port (port db) :username "rlgl" :password (password db)))
2,225
Common Lisp
.lisp
58
34.758621
190
0.684089
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
c73e61ad01de50fa0db36782220931398efd83303df57f0881b6491a38f05cb3
4,173
[ -1 ]
4,174
db-sqlite.lisp
atgreen_red-light-green-light/db/db-sqlite.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL.DB; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019, 2020, 2021, 2022 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. ;; Matcher routines (in-package #:rlgl.db) (defclass db/sqlite (db-backend) ((sqlite-db-filename :initarg :filename :reader filename) (fresh :initarg :fresh :initform nil :reader fresh)) (:default-initargs :sql-insert-log-statement "insert into log(version, colour, report, signature, client_signature, unixtimestamp) values ('~A', '~A', '~A', '~A', '~A', strftime('%s','now'));" :filename (error "Must supply a filename."))) (defmethod initialize-instance :after ((db db/sqlite) &key) (let ((dbc (connect-cached db))) (mapc (lambda (command) (dbi:do-sql dbc command)) '("create table if not exists users (puk integer primary key autoincrement, user_uuid char(36) not null, created_at integer, unique(user_uuid));")))) (defmethod connect-cached ((db db/sqlite)) (dbi:connect-cached :sqlite3 :database-name (filename db)))
1,730
Common Lisp
.lisp
37
44.135135
176
0.707938
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
92e1470ad197f061a5ac1d67f7abf23dbeb7b75b4aad97031945e38be7af8390
4,174
[ -1 ]
4,175
package.lisp
atgreen_red-light-green-light/parsers/package.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*- ;;; ;;; Copyright (C) 2021 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (defpackage #:rlgl-parsers (:use #:cl) (:shadow #:package) (:export #:parse-report #:doctype #:title #:columns #:parser/anchore #:parser/aqua #:parser/clair #:parser/csv #:parser/dejagnu #:parser/junit #:parser/oscap-oval #:parser/oscap-xccdf #:parser/popeye #:parser/tripwire-pdf))
1,262
Common Lisp
.lisp
34
31.705882
76
0.650367
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
fda454e6d7fca69071d99b828778d5b34d76c4ec3ae03a3471fefd9768acf3d9
4,175
[ -1 ]
4,176
aqua.lisp
atgreen_red-light-green-light/parsers/aqua.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019, 2020, 2021, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-parsers) ;;; MVP Aqua report parser ;; ---------------------------------------------------------------------------- (defclass parser/aqua (report-parser) () (:default-initargs :title "Aqua Scan Report" :doctype "html")) (defmethod parse-report ((parser parser/aqua) doc labels) (let ((pdoc (plump:parse (flexi-streams:make-flexi-stream (flexi-streams:make-in-memory-input-stream doc) :external-format :utf-8))) (tests-fail (list))) (let* ((vulns (lquery:$ pdoc "#cves > tbody > tr > tr > td:nth-child(1) > a" (combine (attr :href) (text)))) (severity (lquery:$ pdoc "#cves > tbody > tr > tr > td:nth-child(3) > span" (text))) (score (lquery:$ pdoc "#cves > tbody > tr > tr > td:nth-child(4) > span" (text)))) (loop for i from 0 to (- (length vulns) 1) do (progn (setf tests-fail (cons (json:decode-json-from-string (format nil "{ \"report\": \"aqua\", \"result\": \"FAIL\", \"id\": \"~A\", \"url\": \"~A\", \"severity\": \"~A\", \"score\": \"~A\" ~A}" (car (cdr (aref vulns i))) (car (aref vulns i)) (aref severity i) (aref score i) (rlgl-util:jsonify-labels labels))) tests-fail))))) tests-fail))
2,161
Common Lisp
.lisp
51
37.627451
132
0.602759
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
9670834068184e72d1408972deb9d57bb38cfd6a89ce6f5329fccba2af2f6b4c
4,176
[ -1 ]
4,177
oscap-xccdf.lisp
atgreen_red-light-green-light/parsers/oscap-xccdf.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*- ;;; ;;; Copyright (C) 2019, 2020, 2021, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-parsers) ;;; MVP OpenSCAP XCCDF Results report parser (defclass parser/oscap-xccdf (report-parser) () (:default-initargs :title "OpenSCAP XCCDF Scan Report" :doctype "html")) (defmethod parse-report ((parser parser/oscap-xccdf) doc labels) (let ((pdoc (plump:parse (flexi-streams:make-flexi-stream (flexi-streams:make-in-memory-input-stream doc) :external-format :utf-8))) (tests-fail (list)) (tests-pass (list))) (let ((rows (lquery:$ pdoc "#rule-overview > table > tbody > tr"))) (loop for row across rows do (let ((text (lquery:$ row "td" (text)))) (when (eq (length text) 3) (let ((id (aref text 0)) (severity (aref text 1)) (result (aref text 2))) (cond ((string= result "fail") (setf tests-fail (cons (json:decode-json-from-string (format nil "{ \"report\": \"oscap-xccdf\", \"result\": \"FAIL\", \"id\": \"~A\", \"severity\": \"~A\" ~A}" id severity (rlgl-util:jsonify-labels labels))) tests-fail))) ((string= result "pass") (setf tests-pass (cons (json:decode-json-from-string (format nil "{ \"report\": \"oscap-xccdf\", \"result\": \"PASS\", \"id\": \"~A\", \"severity\": \"~A\" ~A}" id severity (rlgl-util:jsonify-labels labels))) tests-pass))))))))) (append tests-fail tests-pass)))
2,188
Common Lisp
.lisp
53
37.867925
111
0.660723
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
66a0b907d13dc398f48a24767d37e91067ebdb75f7c37fe59013a287466ed50f
4,177
[ -1 ]
4,178
anchore.lisp
atgreen_red-light-green-light/parsers/anchore.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*- ;;; ;;; Copyright (C) 2019, 2020, 2021, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-parsers) ;;; MVP Anchore Results report parser ;; ---------------------------------------------------------------------------- (defclass parser/anchore (report-parser) () (:default-initargs :title "Anchore Scan Report" :doctype "text")) (defmethod parse-report ((parser parser/anchore) doc labels) (let* ((report (json:decode-json-from-string doc)) (tests-pass (list)) (tests-fail (let ((vulnerabilities (cdr (assoc :VULNERABILITIES report)))) (mapcar (lambda (v) (json:decode-json-from-string (format nil "{ \"report\": \"anchore\", \"result\": \"FAIL\", \"id\": \"~A\", \"package name\": \"~A\", \"severity\": \"~A\", \"url\": \"~A\" ~A}" (cdr (assoc :VULN v)) (cdr (assoc :PACKAGE--NAME v)) (cdr (assoc :SEVERITY v)) (cdr (assoc :URL v)) (rlgl-util:jsonify-labels labels)))) vulnerabilities)))) (append tests-fail tests-pass)))
1,799
Common Lisp
.lisp
40
41.425
149
0.63683
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
ffd1259144c314157c40d73cb8ca54d92969781f759773426cb23fd359c1bff0
4,178
[ -1 ]
4,179
oscap-oval.lisp
atgreen_red-light-green-light/parsers/oscap-oval.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019, 2020, 2021, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-parsers) ;;; MVP OpenScap OVAL Results report parser ;; ---------------------------------------------------------------------------- (defclass parser/oscap-oval (report-parser) () (:default-initargs :title "OpenSCAP OVAL Scan Report" :doctype "html")) (defmethod parse-report ((parser parser/oscap-oval) doc labels) (let ((pdoc (plump:parse (flexi-streams:make-flexi-stream (flexi-streams:make-in-memory-input-stream doc) :external-format :utf-8))) (tests-fail (list)) (tests-pass (list))) ;;; Extract date ;;; (lquery:$ pdoc "body > table.noborder.nomargin > tbody > tr > td:nth-child(2) > table > tbody > tr:nth-child(3) > td:nth-child(4)" ;;; text (lquery:$ pdoc "tr.resultbadA > td:nth-child(4) > a" (combine (attr :href) (text)) (map-apply #'(lambda (url text) (setf tests-fail (cons (json:decode-json-from-string (format nil "{ \"report\": \"oscap-oval\", \"result\": \"FAIL\", \"id\": \"~A\", \"url\": \"~A\" ~A}" text url (rlgl-util:jsonify-labels labels))) tests-fail))))) (lquery:$ pdoc "tr.resultgoodA > td:nth-child(4) > a" (combine (attr :href) (text)) (map-apply #'(lambda (url text) (setf tests-pass (cons (json:decode-json-from-string (format nil "{ \"report\": \"oscap-oval\", \"result\": \"PASS\", \"id\": \"~A\", \"url\": \"~A\" ~A}" text url (rlgl-util:jsonify-labels labels))) tests-pass))))) (append tests-fail tests-pass)))
2,401
Common Lisp
.lisp
53
41.037736
137
0.620999
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
6816ca2835c53137320a98050de0eddbd7579cee55568484f524c2df20e02382
4,179
[ -1 ]
4,180
clair.lisp
atgreen_red-light-green-light/parsers/clair.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*- ;;; ;;; Copyright (C) 2019, 2020, 2021, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-parsers) ;;; MVP Clair Results report parser ;; ---------------------------------------------------------------------------- (defclass parser/clair (report-parser) () (:default-initargs :title "Clair Scan Report" :doctype "text")) (defmethod parse-report ((parser parser/clair) doc labels) (let* ((report (json:decode-json-from-source (flexi-streams:make-flexi-stream (flexi-streams:make-in-memory-input-stream doc) :external-format :utf-8))) (tests-pass (list)) (tests-fail (let ((vulnerabilities (cdr (assoc :VULNERABILITIES report)))) (mapcar (lambda (v) (json:decode-json-from-string (format nil "{ \"report\": \"clair\", \"result\": \"FAIL\", \"id\": \"~A\", \"url\": \"~A\" ~A}" (cdr (assoc :VULNERABILITY v)) (cdr (assoc :LINK v)) (rlgl-util:jsonify-labels labels)))) vulnerabilities)))) (append tests-fail tests-pass)))
1,801
Common Lisp
.lisp
40
41.35
99
0.649003
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
482623fb26b1d69cfcb8a484e534ce2941239462fc065cba149f4987cdca85e5
4,180
[ -1 ]
4,181
report-parser.lisp
atgreen_red-light-green-light/parsers/report-parser.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019, 2020, 2021 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-parsers) (defclass report-parser () ((name :initarg :name :reader name) (title :initarg :title :reader title) (doctype :initarg :doctype :reader doctype) (columns :initarg :columns :reader columns :initform nil)))
1,092
Common Lisp
.lisp
23
45.913043
78
0.731022
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
1aafe21d07a66e2e77567ab4f877ca93ca131e72935d6ce7432c8e6deb677c4d
4,181
[ -1 ]
4,182
dejagnu.lisp
atgreen_red-light-green-light/parsers/dejagnu.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*- ;;; ;;; Copyright (C) 2019, 2020, 2021, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-parsers) ;;; MVP DejaGnu Results report parser ;; ---------------------------------------------------------------------------- (defclass parser/dejagnu (report-parser) () (:default-initargs :title "DejaGnu Summary Report" :doctype "text")) (defmethod parse-report ((parser parser/dejagnu) doc labels) (let ((tests (list)) (host "UNKNOWN") (target "UNKNOWN") (in (flexi-streams:make-flexi-stream (flexi-streams:make-in-memory-input-stream doc) :external-format :utf-8))) (loop for line = (read-line in nil) while line do (setf tests (cond ((str:starts-with? "Native configuration is " line) (setf host (str:substring 24 nil line)) (setf target (str:substring 24 nil line)) tests) ((str:starts-with? "Host is" line) (setf host (str:substring 10 nil line)) tests) ((str:starts-with? "Target is" line) (setf target (str:substring 10 nil line)) tests) ((str:starts-with? "FAIL:" line) (cons (json:decode-json-from-string (let ((s (format nil "{ \"report\": \"dejagnu\", \"result\": \"FAIL\", \"host\": \"~A\", \"target\": \"~A\", \"id\": \"~A\" ~A}" host target (rlgl-util:escape-json-string (str:substring 6 nil line)) (rlgl-util:jsonify-labels labels)))) (log:info s) s)) tests)) ((str:starts-with? "XFAIL:" line) (cons (json:decode-json-from-string (let ((s (format nil "{ \"report\": \"dejagnu\", \"result\": \"XFAIL\", \"host\": \"~A\", \"target\": \"~A\", \"id\": \"~A\" ~A}" host target (rlgl-util:escape-json-string (str:substring 7 nil line)) (rlgl-util:jsonify-labels labels)))) (log:info s) s)) tests)) ((str:starts-with? "XPASS:" line) (cons (json:decode-json-from-string (let ((s (format nil "{ \"report\": \"dejagnu\", \"result\": \"XPASS\", \"host\": \"~A\", \"target\": \"~A\", \"id\": \"~A\" ~A}" host target (rlgl-util:escape-json-string (str:substring 7 nil line)) (rlgl-util:jsonify-labels labels)))) (log:info s) s)) tests)) (t tests)))) tests))
3,392
Common Lisp
.lisp
78
34
152
0.538531
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
7cb7ee555a44c360f67c725b56ec7c1dbb52447882196066ca742ac28cbc5412
4,182
[ -1 ]
4,183
junit.lisp
atgreen_red-light-green-light/parsers/junit.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*- ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-parsers) ;;; MVP JUnit XML parser ;; ---------------------------------------------------------------------------- (defclass parser/junit (report-parser) () (:default-initargs :title "JUnit Test Report" :doctype "text")) (defmethod parse-report ((parser parser/junit) doc labels) (let ((xmls (cxml:parse-octets doc (cxml-xmls:make-xmls-builder)))) (let ((children (cdr (cdr xmls)))) (remove nil (mapcar (lambda (child) (if (and (listp child) (string= (car child) "testcase")) (let ((classname nil) (result nil)) (dolist (a (car (cdr child))) (cond ((string= (car a) "classname") (setf classname (car (cdr a)))) ((string= (car a) "name") (setf result (car (cdr a)))))) (json:decode-json-from-string (format nil "{ \"report\": \"junit\", \"result\": \"~A\", \"id\": \"~A\" ~A}" result classname (rlgl-util:jsonify-labels labels)))) nil)) children)))))
1,770
Common Lisp
.lisp
45
35.266667
80
0.62093
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
aefb7a5d63258345dc3c45afd9efe2c7cea4a7d4bb174f17bceb8ffff79c411d
4,183
[ -1 ]
4,184
popeye.lisp
atgreen_red-light-green-light/parsers/popeye.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*- ;;; ;;; Copyright (C) 2021, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-parsers) ;;; MVP Popeye HTML Results report parser (defclass parser/popeye (report-parser) () (:default-initargs :title "Popeye Scan Report" :doctype "html" :columns '(:RESULT :TYPE :RESOURCE :ID :LEVEL))) (defmethod parse-report ((parser parser/popeye) doc labels) (let ((pdoc (plump:parse (flexi-streams:make-flexi-stream (flexi-streams:make-in-memory-input-stream doc) :external-format :utf-8))) (tests-fail (list))) (let ((sections (lquery:$ pdoc "div.section"))) (loop for section across sections do (let ((section-title (car (split-sequence:split-sequence #\space (str:trim (aref (lquery:$ section "div.section-title" (text)) 0)))))) (let ((outcomes (lquery:$ section "ul.outcome > li"))) (loop for outcome across outcomes do (let ((outcome-name (str:trim (aref (lquery:$ outcome "div.outcome" (text)) 0)))) (let ((issues (lquery:$ outcome "ul.issues > li > span"))) (map nil (lambda (issue) (let ((level (str:s-last (aref (lquery:$ issue (attr "class")) 0))) (text (str:trim (aref (lquery:$ issue (text)) 0)))) (when (> (parse-integer level) 0) (setf tests-fail (cons (json:decode-json-from-string (format nil "{ \"report\": \"popeye\", \"result\": \"FAIL\", \"type\": \"~A\", \"resource\": \"~A\", \"id\": \"~A\", \"level\": ~S ~A}" section-title outcome-name (ppcre:regex-replace-all "\"" text "\\\"" ) level (rlgl-util:jsonify-labels labels))) tests-fail))))) issues)))))))) (reverse tests-fail)))
3,027
Common Lisp
.lisp
57
38.684211
176
0.521915
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
e32733528d573157ef93e63a555874234abb2856847eeee65e616baa2cebbe99
4,184
[ -1 ]
4,185
tripwire-pdf.lisp
atgreen_red-light-green-light/parsers/tripwire-pdf.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*- ;;; ;;; Copyright (C) 2020, 2021, 2022, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package :rlgl-parsers) ;;; Tripwire Results report parser ;; ---------------------------------------------------------------------------- (defclass parser/tripwire-pdf (report-parser) () (:default-initargs :title "Tripwire Scan Report" :doctype "pdf")) (defparameter +newline+ (format nil "~A" #\newline)) (defun find-next (pos str doc) (let ((p-start (search str doc :start2 pos))) (when p-start (let* ((p-start (+ p-start (length str))) (p-end (search +newline+ doc :start2 p-start))) (when p-end (values (subseq doc p-start p-end) p-end)))))) (defun find-prev (pos str doc) (let ((p-start (search str doc :end2 pos :from-end t))) (when p-start (let* ((p-start (+ p-start (length str))) (p-end (search +newline+ doc :start2 p-start))) (when p-end (values (subseq doc p-start p-end) p-end)))))) (defun find-next-test (pos doc) (multiple-value-bind (test-name pos) (find-next pos "Test Name: " doc))) (defun parse-tripwire-text (text labels) (let ((tests (list)) (position 0)) (multiple-value-bind (policy-name ppos) (find-next position "Policy Name: " text) (multiple-value-bind (test-name tpos) (find-next ppos "Test Name: " text) (loop while test-name do (multiple-value-bind (rule-name rpos) (find-prev tpos "Rule Name: " text) (setf tests (cons (json:decode-json-from-string (format nil "{ \"report\": \"tripwire-pdf\", \"status\": ~S, \"policy\": ~S, \"rule\": ~S, \"id\": ~S ~A}" (find-next tpos "Status: " text) (rlgl-util:escape-json-string policy-name) (rlgl-util:escape-json-string rule-name) (rlgl-util:escape-json-string test-name) (rlgl-util:jsonify-labels labels))) tests)) (multiple-value-bind (next-test-name next-tpos) (find-next (+ 1 tpos) "Test Name: " text) (setf test-name next-test-name) (setf tpos next-tpos)))))) tests)) (defmethod parse-report ((parser parser/tripwire-pdf) doc labels) (tmpdir:with-tmpdir (tmpdir) (let* ((base-filename (str:concat tmpdir "/" (generate-random-string))) (pdf-filename (str:concat base-filename ".pdf")) (txt-filename (str:concat base-filename ".txt"))) (with-open-file (stream pdf-filename :direction :output :if-exists :supersede :if-does-not-exist :create :element-type '(unsigned-byte 8)) (write-sequence doc stream)) (inferior-shell:run (str:concat "pdftotext " pdf-filename " " txt-filename)) (parse-tripwire-text (alexandria:read-file-into-string txt-filename :external-format :latin-1) labels))))
4,012
Common Lisp
.lisp
83
37.73494
140
0.563409
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
dc1df9efb612d67603039035144a5a8cebe4ea560a15b32d4d076453768f011b
4,185
[ -1 ]
4,186
user.lisp
atgreen_red-light-green-light/user/user.lisp
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019, 2020, 2021 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package #:rlgl.user) (defclass user () ((id :reader user-id) (uuid :reader user-uuid) (api-key :reader user-api-key) (name :reader user-name))) (defun make-user (id uuid api-key login) (let ((u (make-instance 'user))) (setf (slot-value u 'id) id) (setf (slot-value u 'uuid) uuid) (setf (slot-value u 'api-key) api-key) (setf (slot-value u 'name) login) u)) (defun find-user-by-keycloak-id-token (db id-json) (let ((user (rlgl.db:find-user-by-keycloak-id db (cdr (assoc :SUB id-json)) (cdr (assoc :NAME id-json))))) user))
1,427
Common Lisp
.lisp
35
38.2
78
0.691643
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
f4f411be409eb41a425cca17cc8680ed63d312845e0f8f56347f459ca0609514
4,186
[ -1 ]
4,187
package.lisp
atgreen_red-light-green-light/user/package.lisp
(defpackage #:rlgl.user (:use #:cl) (:shadow #:package) (:export #:make-user #:user-api-key #:user-name #:find-user-by-oidc-id #:find-user-by-keycloak-id-token))
168
Common Lisp
.lisp
4
39.5
107
0.664634
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
0794672b19d65095be797baa3bc25a1ed89f1c716ef6b54ef9597e6954440e1d
4,187
[ -1 ]
4,188
#user.lisp#
atgreen_red-light-green-light/user/#user.lisp#
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019, 2020 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (in-package #:rlgl.user) (defclass user () ((id :reader user-id) (uuid :reader user-uuid) (api-key :reader user-api-key) (name :reader user-name))) (defun make-user (id uuid api-key login) (let ((u (make-instance 'user))) (setf (slot-value u 'id) id) (setf (slot-value u 'uuid) uuid) (setf (slot-value u 'api-key) api-key) (setf (slot-value u 'name) login) u)) (defun find-user-by-keycloak-id-token (db id-json) (let ((user (rlgl.db:find-user-by-keycloak-id db (cdr (assoc :SUB id-json)) (cdr (assoc :NAME id-json))))) user))
1,421
Common Lisp
.lisp
35
38.028571
75
0.691751
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
2939e9e006f0cc3dd0cf312c84941ea266407c668c68ddecb3bab0c144a8c6f3
4,188
[ -1 ]
4,189
test-rlgl-server.asd
atgreen_red-light-green-light/test-rlgl-server.asd
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*- ;;; ;;; Copyright (C) 2018, 2019 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (asdf:defsystem #:test-rlgl-server :description "Test the Red Light Green Light server." :depends-on (:rlgl-server :prove :drakma) :components ((:module "test" :serial t :components ((:file "test"))))) (defmethod perform ((o test-op) (c (eql (find-system :test-rlgl-server)))) (funcall (intern (string '#:run) '#:test-rlgl-server))) (defmethod operation-done-p ((o test-op) (c (eql (find-system :test-rlgl-server)))) nil)
1,286
Common Lisp
.asd
29
41.551724
83
0.69697
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
e7f753527f9be6fdb834380e5fa8e0e652001094f626a5f5ff271df25905006b
4,189
[ -1 ]
4,190
rlgl-server.asd
atgreen_red-light-green-light/rlgl-server.asd
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*- ;;; ;;; Copyright (C) 2018-2022, 2024 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (asdf:defsystem #:rlgl-server :description "The Red Light Green Light server." :author "Anthony Green <[email protected]>" :version "8" :serial t :components ((:file "package") (:file "api-key") (:file "matcher") (:file "policy") (:file "storage-local") (:file "storage-s3") (:file "rlgl-server")) :depends-on (:rlgl-parsers :rlgl-util :rlgl-db :rlgl-user :metabang-bind :markup :cl-template :cl-toml :snooze :cl-json :plump :lquery :ironclad :inferior-shell :hunchentoot :spinneret :cl-json-util :cl-fad :str :log4cl :cl-ppcre :cxml :cl-dbi :cl-date-time-parser :quri :local-time :cl-csv :prometheus :cl-postgres :dbd-sqlite3 :dbd-postgres :zs3 :simple-date-time :drakma :uuid :cl-base32 :legit :split-sequence :thread-pool :prometheus.formats.text :prometheus.exposers.hunchentoot :prometheus.collectors.sbcl :prometheus.collectors.process))
1,962
Common Lisp
.asd
43
37.697674
71
0.631908
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
8acec6f5cfa1efef25dbc5e8541405b5afec9744001d595b542601cff95dc139
4,190
[ -1 ]
4,191
rlgl-db.asd
atgreen_red-light-green-light/db/rlgl-db.asd
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*- ;;; ;;; Copyright (C) 2021, 2022, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (asdf:defsystem #:rlgl-db :description "Database functions" :author "Anthony Green <[email protected]>" :version "0" :serial t :components ((:file "package") (:file "db") (:file "db-postgresql") (:file "db-sqlite")) :depends-on (:cl-dbi :local-time :log4cl :fset :str :sb-bsd-sockets))
1,165
Common Lisp
.asd
27
40
72
0.692172
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
de72eed1673db02b555e5ded2f359107013fa1cff26d0ea9f787507169491fe4
4,191
[ -1 ]
4,192
cl-json-util.asd
atgreen_red-light-green-light/local-projects/cl-json-util/cl-json-util.asd
(asdf:defsystem :cl-json-util :version "0.0.1" :description "JSON utilities for Common Lisp" :author "Muyinliu Xing <[email protected]>" :depends-on (:jsown) :components ((:static-file "cl-json-util.asd") (:file "cl-json-util")))
256
Common Lisp
.asd
7
32
48
0.662651
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
e942e782239e5cbff4a7303e00cc8480997b8e6451267e4d86268049e0706193
4,192
[ -1 ]
4,193
rlgl-parsers.asd
atgreen_red-light-green-light/parsers/rlgl-parsers.asd
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*- ;;; ;;; Copyright (C) 2021, 2022, 2023 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (asdf:defsystem #:rlgl-parsers :description "Parsers for rlgl" :author "Anthony Green <[email protected]>" :version "0" :serial t :components ((:file "package") (:file "report-parser") (:file "anchore") (:file "aqua") (:file "clair") (:file "csv") (:file "dejagnu") (:file "junit") (:file "oscap-oval") (:file "oscap-xccdf") (:file "popeye") (:file "tripwire-pdf")) :depends-on (:cl-json :plump :lquery :flexi-streams :tmpdir :log4cl :str :cxml :quri :cl-csv :rlgl-util :inferior-shell))
1,502
Common Lisp
.asd
36
35.361111
72
0.625939
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
1a5de1fba05a16d73b0e516cb69b9f73db018c7ab95e141db5d7a8a8ca35e218
4,193
[ -1 ]
4,194
rlgl-user.asd
atgreen_red-light-green-light/user/rlgl-user.asd
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*- ;;; ;;; Copyright (C) 2021 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (asdf:defsystem #:rlgl-user :description "User functions" :author "Anthony Green <[email protected]>" :version "0" :serial t :components ((:file "package") (:file "user")) :depends-on (:rlgl-db))
1,033
Common Lisp
.asd
25
39.2
70
0.713009
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
c66eccc416e9f762ef9e0d3a23d0c19409eb3f2f2877d081bc817a11c80736eb
4,194
[ -1 ]
4,195
rlgl-util.asd
atgreen_red-light-green-light/util/rlgl-util.asd
;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*- ;;; ;;; Copyright (C) 2021 Anthony Green <[email protected]> ;;; ;;; This program is free software: you can redistribute it and/or ;;; modify it under the terms of the GNU Affero General Public License ;;; as published by the Free Software Foundation, either version 3 of ;;; the License, or (at your option) any later version. ;;; ;;; This program is distributed in the hope that it will be useful, ;;; but WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ;;; Affero General Public License for more details. ;;; ;;; You should have received a copy of the GNU Affero General Public ;;; License along with this program. If not, see ;;; <http://www.gnu.org/licenses/>. (asdf:defsystem #:rlgl-util :description "Utility functions" :author "Anthony Green <[email protected]>" :version "0" :serial t :components ((:file "util")) :depends-on (:cl-fad :str :quri))
1,013
Common Lisp
.asd
24
40.666667
70
0.724696
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
8a72af91b40e105e72cbb6f72ced09975a4c90bbcc61fc844ad408a72e174600
4,195
[ -1 ]
4,196
verify.sh.clt
atgreen_red-light-green-light/verify.sh.clt
#!/bin/sh set -x # Red Light Green Light validate.sh version <%= @ rlgl-version %> # This validate feature is provided in source form for transparency # and audit purposes. # This script performs three important validations: # # - validate the server signature of the report using the server's # public key # # - validate the client signature of the report using the client's # public key # # - validate the transparency log entry for this report using # rekor-cli # ---- Identify the document for which we are performing validation ----------- DOC=<%= @ id %> # ---- Error handling --------------------------------------------------------- set -e error_exit() { echo ERROR: ${1:-"Unknown Error"} 1>&2 exit 1 } # ---- Verify that all required programs are installed ------------------------ awk --help > /dev/null 2>&1 || error_exit "Cannot run awk. Please install it." for PROGRAM in "rekor-cli version" "openssl version" "curl --help" "grep --help" "base64 --help"; do $PROGRAM > /dev/null 2>&1 || error_exit "Cannot run $(echo ${PROGRAM} | awk '{ printf $1 }'). Please install it." done # ---- Create names of temporary files and ensure deletion on exit ------------ TMPDIR="$(mktemp -d)" trap 'rm -rf -- "$TMPDIR"' EXIT DOCUMENT=${TMPDIR}/${DOC} DIGEST=${TMPDIR}/${DOC}.digest SERVER_PUBKEY=${TMPDIR}/rlgl.pem SERVER_SIGNATURE=${TMPDIR}/${DOC}.digest.sig CLIENT_SIGNATURE=${TMPDIR}/${DOC}.digest.csig # ---- Download all artifacts ------------------------------------------------- curl -s <%= @ server-uri %>/pubkey > ${SERVER_PUBKEY} curl -s <%= @ server-uri %>/doc?id=${DOC} > ${DOCUMENT} cat ${DOCUMENT} | openssl dgst -sha3-256 - | awk '{ printf $2 }' > ${DIGEST} curl -s <%= @ server-uri %>/doc?id=${DOC}.sig | base64 -d > ${SERVER_SIGNATURE} curl -s <%= @ server-uri %>/doc?id=${DOC}.csig | base64 -d > ${CLIENT_SIGNATURE} # ---- Validate the server signature of the document digest ------------------- echo Checking document server signature: $(openssl dgst -sha256 -verify ${SERVER_PUBKEY} -signature ${SERVER_SIGNATURE} ${DIGEST}) # ---- Checking client signature ---------------------------------------------- if [ -z "$RLGL_CLIENT_PUBKEY" ]; then echo "Checking document client signature : Set the environment RLGL_CLIENT_PUBKEY to point at your public key" else echo "Checking document client signature :" $(cat ${DOCUMENT} | openssl dgst -sha3-256 -verify ${RLGL_CLIENT_PUBKEY} -signature ${CLIENT_SIGNATURE}) fi # ---- Look up this document in rekor and print out the record ---------------- echo DEBUG echo == DIGEST ==================================== cat ${DIGEST} echo == SERVER_SIGNATURE ========================== cat ${SERVER_SIGNATURE} echo == SERVER_PUBKEY ============================= cat ${SERVER_PUBKEY} echo ============================================== # ---- Look up this document in rekor and print out the record ---------------- echo Searching for sigstore record: HASH=$(rekor-cli verify --artifact ${DIGEST} --signature ${SERVER_SIGNATURE} --public-key ${SERVER_PUBKEY} --pki-format x509 | grep "Entry Hash:" | awk '{ printf $3 }') rekor-cli get --uuid $HASH
3,142
Common Lisp
.cl
64
47.5625
168
0.613251
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
c6c2ca0da4454487b39ad0c91e819abb6b2de108f0f48793de9a8383f6423647
4,196
[ -1 ]
4,202
Makefile
atgreen_red-light-green-light/Makefile
all: binary: buildapp --output rlgl-server \ --asdf-tree `pwd`/.. \ --asdf-tree `pwd`/local-projects/postmodern-20220220-git \ --asdf-tree `pwd`/local-projects/cl-json-util \ --asdf-tree `pwd`/local-projects/snooze-20210518-git \ --asdf-tree `pwd`/parsers \ --asdf-tree `pwd`/db \ --asdf-tree `pwd`/user \ --asdf-tree `pwd`/util \ --asdf-tree ~/quicklisp/dists/quicklisp/software \ --load-system rlgl-server \ --compress-core \ --entry "rlgl-server:start-rlgl-server" check: clean openssl genrsa -out /tmp/rlgl-test-key.pem 1024 openssl rsa -in /tmp/rlgl-test-key.pem -out /tmp/rlgl-public-test-key.pem -outform PEM -pubout PRIVATE_KEY_FILE=/tmp/rlgl-test-key.pem \ PUBLIC_KEY_FILE=/tmp/rlgl-public-test-key.pem \ sbcl --dynamic-space-size 4096 \ --disable-debugger \ --eval '(ql:quickload :prove)' \ --eval '(pushnew (truename ".") asdf:*central-registry* )' \ --eval '(pushnew (truename "./user") asdf:*central-registry* )' \ --eval '(pushnew (truename "./util") asdf:*central-registry* )' \ --eval '(pushnew (truename "./db") asdf:*central-registry* )' \ --eval '(pushnew (truename "./parsers") asdf:*central-registry* )' \ --eval '(pushnew (truename "./test/") asdf:*central-registry* )' \ --eval '(ql:register-local-projects)' \ --eval '(ql:quickload :rlgl-server)' \ --eval "(asdf:oos 'asdf:load-op :rlgl-server :force t)" \ --eval '(ql:quickload :test-rlgl-server)' \ --eval '(test-rlgl-server:run)' \ --eval '(sb-ext:quit)' run: clean openssl genrsa -out /tmp/rlgl-test-key.pem 1024 PRIVATE_KEY_FILE=/tmp/rlgl-test-key.pem \ sbcl --dynamic-space-size 4096 \ --eval '(pushnew (truename ".") asdf:*central-registry* )' \ --eval '(pushnew (truename "./local-projects/cl-json-util") asdf:*central-registry* )' \ --eval '(pushnew (truename "./user") asdf:*central-registry* )' \ --eval '(pushnew (truename "./util") asdf:*central-registry* )' \ --eval '(pushnew (truename "./db") asdf:*central-registry* )' \ --eval '(pushnew (truename "./parsers") asdf:*central-registry* )' \ --eval '(pushnew (truename "./test/") asdf:*central-registry* )' \ --eval '(asdf:load-system :rlgl-server)' \ --eval '(rlgl-server:start-rlgl-server t "test/config.ini")' cover: clean sbcl --disable-debugger \ --eval '(require :sb-cover)' \ --eval '(ql:quickload :prove)' \ --eval '(declaim (optimize sb-cover:store-coverage-data))' \ --eval '(pushnew (truename ".") asdf:*central-registry* )' \ --eval '(ql:register-local-projects)' \ --eval '(ql:quickload :rlgl-server)' \ --eval "(asdf:oos 'asdf:load-op :rlgl-server :force t)" \ --eval '(prove:run #P"test.lisp")' \ --eval '(sb-cover:report "./coverage/")' \ --eval '(sb-ext:quit)' coveralls: clean COVERALLS=true sbcl --disable-debugger \ --eval '(ql:quickload :cl-coveralls)' \ --eval '(pushnew (truename ".") asdf:*central-registry* )' \ --eval '(pushnew (truename "./test/") asdf:*central-registry*)' \ --eval '(ql:register-local-projects)' \ --eval '(ql:quickload :test-rlgl-server)' \ --eval '(coveralls:with-coveralls (:project-dir (directory-namestring (truename "."))) (test-rlgl-server:run))' \ --eval '(sb-ext:quit)' clean: @rm -rf system-index.txt test/system-index.txt coverage/* test-policy rlgl-server *~ */*~
3,428
Common Lisp
.l
71
43.507042
115
0.63205
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
c9834a4df4cc58d0d0e6cec3c5a30505e5b47713654f80a1213eca105ed4e631
4,202
[ -1 ]
4,203
Dockerfile.base
atgreen_red-light-green-light/Dockerfile.base
FROM quay.io/containerlisp/lisp-10-ubi8:latest COPY rlgl-server.asd /tmp RUN sbcl --eval '(let* ((ds (with-open-file (stream "/tmp/rlgl-server.asd") \ (read stream))) \ (pos (position :DEPENDS-ON ds))) \ (dolist (p (nth (+ pos 1) ds)) \ (ql:quickload p)))'
468
Common Lisp
.l
7
52.142857
87
0.368192
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
3d5976a6c92b3f0b27260a6242bddcda5357933c61f499f2b7e099a524fe75a6
4,203
[ -1 ]
4,205
browserconfig.xml
atgreen_red-light-green-light/browserconfig.xml
<?xml version="1.0" encoding="utf-8"?> <browserconfig> <msapplication> <tile> <square150x150logo src="/images/mstile-150x150.png"/> <TileColor>#da532c</TileColor> </tile> </msapplication> </browserconfig>
253
Common Lisp
.l
9
21.777778
65
0.614754
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
359223cd55ef292c6eeb0768500791673cc532fd36bbe9b4184557fc1f69e8dd
4,205
[ -1 ]
4,207
slynk-port-forward
atgreen_red-light-green-light/slynk-port-forward
#!/bin/sh # Forward ports from the rlgl-server to localhost for development # purposes. # Port 8080 is the HTTP port for rlgl-server # Port 4005 is the slynk port for connecting with the emacs sly client if [ "$#" -ne 1 ]; then echo "Usage: slynk-port-forward NAMESPACE" exit 1 fi NAMESPACE=$1 # trap ctrl-c and call ctrl_c() trap ctrl_c INT function ctrl_c() { kill -9 ${P1} kill -9 ${P2} } PODNAME=$(kubectl get pods -n ${NAMESPACE} --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' | grep rlgl-server) kubectl port-forward ${PODNAME} 8080 -n ${NAMESPACE} & P1=$? kubectl port-forward ${PODNAME} 4005 -n ${NAMESPACE} & P2=$? while true; do sleep 10000; done;
697
Common Lisp
.l
22
29.636364
125
0.693114
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
8ca43a0992438be06a841bc78cfc6f0f4e36759f23f84f62c1c5a67c6b30a55d
4,207
[ -1 ]
4,208
Dockerfile
atgreen_red-light-green-light/Dockerfile
FROM registry.access.redhat.com/ubi9/ubi MAINTAINER Anthony Green <[email protected]> ENV LC_ALL=C.utf8 \ LANG=C.utf8 \ LANGUAGE=C.utf8 \ SBCL_VERSION=2.3.10 \ GREEN_ORB_VERSION=0.2.4 \ PATH=/opt/rlgl/.local/bin:$PATH \ HOME=/opt/rlgl RUN dnf -y install bzip2 git make gcc file poppler-utils gpg RUN curl -L -O "https://downloads.sourceforge.net/project/sbcl/sbcl/${SBCL_VERSION}/sbcl-${SBCL_VERSION}-x86-64-linux-binary.tar.bz2" \ && tar -xf sbcl-${SBCL_VERSION}-x86-64-linux-binary.tar.bz2 \ && cd sbcl-${SBCL_VERSION}-x86-64-linux \ && ./install.sh --prefix=/usr/local \ && cd .. \ && rm -rf sbcl-${SBCL_VERSION}-x86-64-linux-binary.tar.bz2 sbcl-${SBCL_VERSION}-x86-64-linux RUN useradd -r -u 1000 -m -d /opt/rlgl -s /bin/bash rlgl WORKDIR /opt/rlgl COPY . . RUN chown -R rlgl /opt/rlgl RUN mkdir -p /var/rlgl/docs /var/rlgl/policy && chown -R 1000:0 /var/rlgl && chmod -R go+rwx /var/rlgl USER 1000 RUN curl -L -O "https://github.com/atgreen/green-orb/releases/download/v${GREEN_ORB_VERSION}/green-orb-${GREEN_ORB_VERSION}-linux-amd64.tar.gz" \ && tar xf green-orb-${GREEN_ORB_VERSION}-linux-amd64.tar.gz \ && rm green-orb-${GREEN_ORB_VERSION}-linux-amd64.tar.gz \ && echo "# config file here" > green-orb.yaml RUN git clone --depth=1 https://github.com/ocicl/ocicl.git; cd ocicl; make; make install; ocicl version; ocicl setup > ~/.sbclrc \ && echo "(asdf:initialize-source-registry '(:source-registry :ignore-inherited-configuration (:tree #P\"/opt/rlgl/\")))" >> ~/.sbclrc \ && echo "(setf ocicl-runtime:*verbose* t)" >> ~/.sbclrc \ && echo "(setf ocicl-runtime:*download* t)" >> ~/.sbclrc \ && cd .. && rm -rf ocicl RUN ocicl install && ./orb sbcl --non-interactive --eval "(progn (asdf:load-system :rlgl-server) (quit))" RUN chmod -R go+rwx /opt/rlgl CMD git config --global --add safe.directory /opt/rlgl && ./orb sbcl --userinit /opt/rlgl/.sbclrc --eval '(asdf:load-system :rlgl-server)' --eval '(progn (rlgl-server:start-rlgl-server) (loop do (sleep 1000)))'
2,059
Common Lisp
.l
34
57.088235
210
0.677099
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
1bb8fe8250dcd0ab4ee389ac6541e15ee0ce9e6ea0e32be8b8eecbb890d02b09
4,208
[ -1 ]
4,212
sample-junit.xml
atgreen_red-light-green-light/test/sample-junit.xml
<?xml version="1.0" encoding="UTF-8" ?> <testsuite errors="1" failures="1" hostname="mahmood-alis-macbook-pro.local" name="tests.ATest" tests="3" time="0.069" timestamp="2009-12-19T17:58:59"> <properties> <property name="java.vendor" value="Sun Microsystems Inc." /> <property name="jtreg.home" value="/Users/mahmood/research/jtreg" /> <property name="sun.java.launcher" value="SUN_STANDARD" /> <property name="sun.management.compiler" value="HotSpot 64-Bit Server Compiler" /> <property name="os.name" value="Darwin" /> <property name="sun.boot.class.path" value="../../jsr308-langtools/dist/lib/javac.jar:../jsr308-langtools/dist/lib/javac.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/resources.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/rt.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/sunrsasign.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/jsse.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/jce.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/charsets.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/classes" /> <property name="java.vm.specification.vendor" value="Sun Microsystems Inc." /> <property name="ant.home" value="/usr/share/ant" /> <property name="bindist.file" value="binary/jsr308-all.jar" /> <property name="java.runtime.version" value="1.6.0_03-p3-landonf_19_aug_2008_15_52-b00" /> <property name="user.name" value="mahmood" /> <property name="user.language" value="en" /> <property name="build" value="build" /> <property name="sun.boot.library.path" value="/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/amd64" /> <property name="ant.project.name" value="checkers" /> <property name="java.version" value="1.6.0_03-p3" /> <property name="build.tests" value="tests/build" /> <property name="user.timezone" value="" /> <property name="sun.arch.data.model" value="64" /> <property name="java.endorsed.dirs" value="/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/endorsed" /> <property name="sun.cpu.isalist" value="" /> <property name="sun.jnu.encoding" value="UTF-8" /> <property name="file.encoding.pkg" value="sun.io" /> <property name="file.separator" value="/" /> <property name="java.specification.name" value="Java Platform API Specification" /> <property name="src.tests" value="/Users/mahmood/research/checker-framework/checkers/tests/src/tests/ATest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/AnnotationBuilderTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/BasicEncryptedTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/BasicSuperSubTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/CheckerParameterized.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/CheckerTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/FailingTests.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/FlowTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/FrameworkTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/I18nTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/IGJTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/InterningTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/JavariTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/LockTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/NullnessTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/OIGJTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/ParameterizedCheckerTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/RegexTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/TaintingTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/TestInput.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/TestRun.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/TestUtilities.java" /> <property name="java.class.version" value="50.0" /> <property name="src" value="src" /> <property name="user.country" value="US" /> <property name="java.home" value="/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre" /> <property name="java.vm.info" value="mixed mode" /> <property name="ant.file" value="/Users/mahmood/research/checker-framework/checkers/build.xml" /> <property name="os.version" value="10.2.0" /> <property name="temp.dir" value="binary/buildbin" /> <property name="path.separator" value=":" /> <property name="java.vm.version" value="1.6.0_03-p3-landonf_19_aug_2008_15_52-b00" /> <property name="checkers.rel.jp" value="../checkers" /> <property name="ant.library.dir" value="/usr/share/ant/lib" /> <property name="dist.doc" value="doc" /> <property name="java.awt.printerjob" value="sun.print.PSPrinterJob" /> <property name="halt.on.test.failure" value="true" /> <property name="sun.io.unicode.encoding" value="UnicodeBig" /> <property name="compiler.exists" value="true" /> <property name="user.home" value="/Users/mahmood" /> <property name="java.specification.vendor" value="Sun Microsystems Inc." /> <property name="src.files.spaceseparated" value="/Users/mahmood/research/checker-framework/checkers/src/checkers/basetype/BaseTypeChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/basetype/BaseTypeVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/basetype/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/basic/BasicChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/flow/Flow.java /Users/mahmood/research/checker-framework/checkers/src/checkers/flow/GenKillBits.java /Users/mahmood/research/checker-framework/checkers/src/checkers/flow/Location.java /Users/mahmood/research/checker-framework/checkers/src/checkers/flow/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/I18nChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/KeyLookupAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/KeyLookupChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/SubI18Checker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/quals/LocalizableKey.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/quals/Localized.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/IGJAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/IGJBottom.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/IGJChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/IGJVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/Assignable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/AssignsFields.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/I.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/Immutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/Mutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/ReadOnly.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/InterningAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/InterningChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/InterningVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/quals/Interned.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/quals/PolyInterned.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/JavariAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/JavariChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/JavariVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/Assignable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/Mutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/PolyRead.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/QReadOnly.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/ReadOnly.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/ThisMutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/LinearAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/LinearChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/LinearVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/quals/Linear.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/quals/Normal.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/quals/Unusable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/lock/LockAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/lock/LockChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/lock/LockVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/lock/quals/GuardedBy.java /Users/mahmood/research/checker-framework/checkers/src/checkers/lock/quals/Holding.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/CollectionToArrayHeuristics.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/MapGetHeuristics.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessFlow.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessSubchecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/RawnessSubchecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/AssertNonNull.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/AssertNonNullIfTrue.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/LazyNonNull.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/NonNull.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/NonNullVariable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/NonRaw.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/Nullable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/PolyNull.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/PolyRaw.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/Raw.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/ImmutabilityAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/ImmutabilitySubchecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/ImmutabilityVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/OIGJChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/OIGJMutabilityBottom.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/OwnershipAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/OwnershipSubchecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/OwnershipVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/Assignable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/AssignsFields.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/Dominator.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/I.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/Immutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/Modifier.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/Mutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/O.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/ReadOnly.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/WildCard.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/World.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/DefaultLocation.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/DefaultQualifier.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/DefaultQualifierInHierarchy.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/DefaultQualifiers.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/Dependent.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/ImplicitFor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/PolymorphicQualifier.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/SubtypeOf.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/TypeQualifier.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/TypeQualifiers.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/Unqualified.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/Unused.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/regex/RegexAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/regex/RegexChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/regex/quals/Regex.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/Result.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/SourceChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/SourceVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/SupportedLintOptions.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/SuppressWarningsKey.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/tainting/TaintingAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/tainting/TaintingChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/tainting/quals/PolyTainted.java /Users/mahmood/research/checker-framework/checkers/src/checkers/tainting/quals/Tainted.java /Users/mahmood/research/checker-framework/checkers/src/checkers/tainting/quals/Untainted.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/AnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/AnnotatedTypeMirror.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/AnnotatedTypes.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/BasicAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/QualifierHierarchy.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/TreeAnnotator.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/TypeAnnotator.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/TypeFromElement.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/TypeFromTree.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/TypeHierarchy.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/VisitorState.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/visitors/AnnotatedTypeComparer.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/visitors/AnnotatedTypeScanner.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/visitors/AnnotatedTypeVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/visitors/SimpleAnnotatedTypeScanner.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/visitors/SimpleAnnotatedTypeVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/AggregateChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/AnnotationUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/DependentTypes.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/ElementUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/GraphQualifierHierarchy.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/Heuristics.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/InternalUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/QualifierDefaults.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/QualifierPolymorphism.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/TreeUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/TypesUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/count/AnnotationsCounter.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/count/Locations.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/debug/EmptyProcessor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/debug/SignaturePrinter.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/debug/TreeDebug.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/stub/Skeleton.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/stub/StubGenerator.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/stub/StubParser.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/stub/StubUtil.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/Critical.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/Encrypted.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/FactoryTestChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/FlowTestChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/Odd.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/PolyEncrypted.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/SubQual.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/SuperQual.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/TestChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/TypeOutputtingChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/package-info.java /Users/mahmood/research/checker-framework/checkers/src/edu/umd/cs/findbugs/annotations/CheckForNull.java /Users/mahmood/research/checker-framework/checkers/src/edu/umd/cs/findbugs/annotations/NonNull.java /Users/mahmood/research/checker-framework/checkers/src/edu/umd/cs/findbugs/annotations/Nullable.java /Users/mahmood/research/checker-framework/checkers/src/edu/umd/cs/findbugs/annotations/UnknownNullness.java /Users/mahmood/research/checker-framework/checkers/src/javax/annotation/CheckForNull.java /Users/mahmood/research/checker-framework/checkers/src/javax/annotation/Nonnull.java /Users/mahmood/research/checker-framework/checkers/src/javax/annotation/Nullable.java /Users/mahmood/research/checker-framework/checkers/src/net/jcip/annotations/GuardedBy.java /Users/mahmood/research/checker-framework/checkers/src/net/jcip/annotations/Immutable.java /Users/mahmood/research/checker-framework/checkers/src/net/jcip/annotations/NotThreadSafe.java /Users/mahmood/research/checker-framework/checkers/src/net/jcip/annotations/ThreadSafe.java /Users/mahmood/research/checker-framework/checkers/src/org/jetbrains/annotations/NotNull.java /Users/mahmood/research/checker-framework/checkers/src/org/jetbrains/annotations/Nullable.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/CheckForNull.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/NonNull.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/NullAllowed.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/NullUnknown.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/SuppressWarnings.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/package-info.java" /> <property name="java.library.path" value="/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/amd64/server:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/amd64:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/../lib/amd64:/usr/java/packages/lib/amd64:/lib:/usr/lib" /> <property name="java.vendor.url" value="http://java.sun.com/" /> <property name="javaparser.lib.uptodate" value="true" /> <property name="build.reports" value="build/reports" /> <property name="java.vm.vendor" value="Sun Microsystems Inc." /> <property name="javac.lib" value="../../jsr308-langtools/dist/lib/javac.jar" /> <property name="run.tests.should.fork" value="true" /> <property name="java.runtime.name" value="Java(TM) SE Runtime Environment" /> <property name="java.class.path" value="/Users/mahmood/research/jsr308-langtools/dist/lib/javac.jar:/Users/mahmood/research/checker-framework/jsr308-langtools/dist/lib/javac.jar:/Users/mahmood/research/checker-framework/checkers/tests/build:/Users/mahmood/research/checker-framework/checkers/tests/junit-4.7.jar:/Users/mahmood/research/checker-framework/checkers/build:/usr/share/java/ant-1.7.1/lib/ant-launcher.jar:/usr/share/ant/lib/ant.jar:/usr/share/ant/lib/ant-junit.jar" /> <property name="jsr308.langtools" value="../../jsr308-langtools" /> <property name="ant.version" value="Apache Ant version 1.7.1 compiled on September 22 2009" /> <property name="annotation-utils.lib" value="../annotation-file-utilities/annotation-file-utilities.jar:lib/asmx.jar" /> <property name="src.astub.files.uptodate" value="true" /> <property name="compiler.version" value="javac 1.7.0-jsr308-1.0.2" /> <property name="checkers.jar.file" value="checkers.jar" /> <property name="build.jtreg.dir" value="build/jtreg" /> <property name="java.vm.specification.name" value="Java Virtual Machine Specification" /> <property name="tmpdir" value="/var/tmp//mahmood/checkers" /> <property name="java.vm.specification.version" value="1.0" /> <property name="sun.cpu.endian" value="little" /> <property name="sun.os.patch.level" value="unknown" /> <property name="build.version" value="1.0.3" /> <property name="tests" value="tests" /> <property name="java.io.tmpdir" value="/var/tmp/" /> <property name="javaparser.lib" value="lib/javaparser.jar" /> <property name="java.vendor.url.bug" value="http://java.sun.com/cgi-bin/bugreport.cgi" /> <property name="javaparser.loc" value="../javaparser" /> <property name="compiler.version.goal" value="javac 1.7.0-jsr308-1.0.3" /> <property name="jp.project" value="true" /> <property name="os.arch" value="amd64" /> <property name="java.awt.graphicsenv" value="sun.awt.X11GraphicsEnvironment" /> <property name="ant.file.checkers" value="/Users/mahmood/research/checker-framework/checkers/build.xml" /> <property name="java.ext.dirs" value="/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/ext:/usr/java/packages/lib/ext" /> <property name="javadoc.lib" value="../../jsr308-langtools/dist/lib/javadoc.jar:../../jsr308-langtools/dist/lib/doclets.jar" /> <property name="user.dir" value="/Users/mahmood/research/checker-framework/checkers" /> <property name="checkers.lib" value="checkers.jar" /> <property name="line.separator" value=" " /> <property name="compiler.lib" value="../../jsr308-langtools/dist/lib/javac.jar:../jsr308-langtools/dist/lib/javac.jar" /> <property name="java.vm.name" value="Java HotSpot(TM) 64-Bit Server VM" /> <property name="basedir" value="/Users/mahmood/research/checker-framework/checkers" /> <property name="tests.junit" value="tests/junit-4.7.jar" /> <property name="javari.jdk.build" value="jdk/javari/build" /> <property name="ant.java.version" value="1.6" /> <property name="ant.core.lib" value="/usr/share/ant/lib/ant.jar" /> <property name="file.encoding" value="UTF-8" /> <property name="dist.annos.file" value="checkers-quals.jar" /> <property name="javari.jdk.src" value="jdk/javari/src" /> <property name="java.specification.version" value="1.6" /> </properties> <testcase classname="tests.ATest" name="error" time="0.0060"> <error type="java.lang.RuntimeException">java.lang.RuntimeException at tests.ATest.error(ATest.java:11) </error> </testcase> <testcase classname="tests.ATest" name="fail" time="0.0020"> <failure type="junit.framework.AssertionFailedError">junit.framework.AssertionFailedError: at tests.ATest.fail(ATest.java:9) </failure> </testcase> <testcase classname="tests.ATest" name="sucess" time="0.0" /> <system-out><![CDATA[here ]]></system-out> <system-err><![CDATA[]]></system-err> </testsuite>
28,067
Common Lisp
.l
115
239.504348
17,423
0.817473
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
36b5074da1cc6d92d41b975a2d8f3f2571168d2476896d06d4460710b80df6b0
4,212
[ -1 ]
4,213
clair-report.json
atgreen_red-light-green-light/test/clair-report.json
{ "image": "containerlisp/lisp-10-centos7", "unapproved": [ "RHSA-2019:1619", "RHSA-2018:0180", "RHSA-2017:0372", "RHSA-2018:0502", "RHSA-2018:0654", "RHSA-2018:1374", "RHSA-2018:2772", "RHSA-2018:1967" ], "vulnerabilities": [ { "featurename": "vim-minimal", "featureversion": "2:7.4.160-5.el7", "vulnerability": "RHSA-2019:1619", "namespace": "centos:7", "description": "Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim/neovim: ':source!' command allows arbitrary command execution via modelines (CVE-2019-12735) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "link": "https://access.redhat.com/errata/RHSA-2019:1619", "severity": "High", "fixedby": "2:7.4.160-6.el7_6" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:0180", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * A flaw was found in the patches used to fix the 'dirtycow' vulnerability (CVE-2016-5195). An attacker, able to run local code, can exploit a race condition in transparent huge pages to modify usually read-only huge pages. (CVE-2017-1000405) Red Hat would like to thank Eylon Ben Yaakov and Daniel Shapiro for reporting this issue. Bug Fix(es): * Previously, Red Hat Enterprise Linux 7.4 with the kernel version provided by the kernel-alt package, did not support turning off transactional memory (TM) on the POWER9 systems. With this update it is now possible to turn off TM on the POWER9 systems. (BZ#1509974) * Due to a bug in the ixgbe and i40e drivers, the socket buffer list (skb list) in some cases got corrupted when running Red Hat Enterprise Linux 7.4 with the kernel version provided by the kernel-alt package on the POWER9 systems. Consequently, a kernel panic occurred. This update fixes ixgbe and i40e, and the kernel no longer panics due to this behavior. (BZ#1518412) * Users can lower the max_sectors_kb setting in the sysfs file system to accommodate certain workloads. Previously, users needed to set the maximum I/O size to either the block layer default or the optional preferred I/O size reported by the device. This update fixes the scsi driver to keep the current heuristic function for the initial setting of max_sectors_kb. As a result, for subsequent invocations, the driver now only updates the current queue limit if it exceeds the capabilities of the hardware. (BZ#1518432) * When performing full-bootme tests on Boston ESS systems running Red Hat Enterprise Linux 7.4 with the kernel version provided in the kernel-alt package, a kernel panic occurred and the operating system dropped into the XMON software. This update fixes the Multi-Queue Block IO Queueing Mechanism (blk-mq), and the kernel no longer panics in these circumstances. (BZ#1518433) * When running the stress test on the file system with the gssstress command, and pulling one disk from one recovery group, \"kernel I/O error\" was reported, and gssstress became unresponsive. Gssstress now works as expected under the described circumstances. (BZ#1522645) * When using the fwupdate_xl710 utility to apply updates for NVM Intel Ethernet Converged Network Adapter XL710 on machines running Red Hat Enterpise Linux 7.4 with the kernel version provided in the kernel-alt package, a deadlock sometimes occurred when the i40e driver was acquiring access to the Non-Volatile Memory (NVM) of the device. Consequently, NVM acquire timeouts occurred, the firmware update failed with the following error message: \"Failed Acquiring NVM resource for read err=-53 status=0xa\", and left the device's memory in a corrupted state. This update fixes the i40e driver, and the firmware updates no longer fail due to this behavior. (BZ#1522843) * Previously, on POWER9 systems with more than 100 Pstates, the cpufreq driver did not handle the cases when the NxN matrix denominated transition table (trans_table) overflowed beyond the PAGE_SIZE boundary correctly. Consequently, reading trans_table for any of the CPUs failed with the following error: \"fill_read_buffer: show+0x0/0xa0 returned bad count\" With this update reading trans_table for any of the CPUs now proceeds as expected under the described circumstances. (BZ#1522844) * Previously, the /sys/firmware/opal/exports directory did not contain an export node. Consequently, a range of memory in the Open Power Abstraction Layer (OPAL) that the operating system attempted to export to user space for debugging purposes was not available. With this update the sysfs file under /sys/firmware/opal/exports is now available for each property found there, and this file can be used for debugging purposes. (BZ#1522845)", "link": "https://access.redhat.com/errata/RHSA-2018:0180", "severity": "High", "fixedby": "0:4.11.0-44.4.1.el7a" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2017:0372", "namespace": "centos:7", "description": "The kernel-aarch64 package contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important) * Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important) Red Hat would like to thank Phil Oester for reporting CVE-2016-5195. Bug Fix(es): * Previously, the operating system did not support the Mellanox ConnectX-4 PCIe Network Interface Controllers (NIC) in Ethernet mode. This update enables Ethernet support in the mlx5 driver. As a result, the Mellanox ConnectX-4 PCIe NICs now work in Ethernet mode as expected. (BZ#1413108) * On the Qualcomm Datacenter Technologies server platform with Qualcomm Datacenter Technologies Centriq 2400 CPU (QDF2400v1) memory accesses sometimes allocated Translation Lookaside Buffer (TLB) entries using an incorrect Address Space ID (ASID). This could consequently result in memory corruption and crashes under certain conditions. The underlying source code has been modified to handle the TTBRx_EL1[ASID] and TTBRx_EL1[BADDR] fields separately using a reserved ASID, and the described problem no longer occurs. (BZ#1421765)", "link": "https://access.redhat.com/errata/RHSA-2017:0372", "severity": "High", "fixedby": "0:4.5.0-15.2.1.el7" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:0502", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important)(ppc only) * kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak (CVE-2017-17712, Important) * kernel: mm/pagewalk.c:walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak (CVE-2017-16994, Moderate) Bug Fix(es): * When changing the Maximum Transmission Unit (MTU) size on Broadcom BCM5717, BCM5718 and BCM5719 chipsets, the tg3 driver sometimes lost synchronization with the device. Consequently, the device became unresponsive. With this update, tg3 has been fixed, and devices no longer hang due to this behavior. (BZ#1533478) * Previously, the perf tool used strict string matching to provide related events to a particular CPUID instruction. Consequently, the events were not available on certain IBM PowerPC systems. This update fixes perf to use regular expressions instead of string matching of the entire CPUID string. As a result, the perf tool now supports events on IBM PowerPC architectures as expected. (BZ#1536567) * Previously, the kernel debugfs file system implemented removal protection based on sleepable read-copy-update (SRCU), which slowed down the drivers relying on the debugfs_remove_recursive() function. Consequently, a decrease in performance or a deadlock sometimes occurred. This update implements per-file removal protection in debugfs. As a result, the performance of the system has improved significantly. (BZ#1538030) * When running the 'perf test' command on a PowerKVM guest multiple times, the branch instructions recorded in Branch History Rolling Buffer (BHRB) entries were sometimes unmapped before the kernel processed the entries. Consequently, the operating system terminated unexpectedly. This update fixes the bug, and the operating system no longer crashes in the described situation. (BZ#1538031)", "link": "https://access.redhat.com/errata/RHSA-2018:0502", "severity": "High", "fixedby": "0:4.11.0-44.6.1.el7a" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:0654", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. The following packages have been upgraded to a later upstream version: kernel-alt (4.14.0). (BZ#1492717) Security Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, ARM) Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important, ARM) Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important, ARM) * kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate) * kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate) * kernel: Incorrect updates of uninstantiated keys crash the kernel (CVE-2017-15299, Moderate) * kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate) * kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate) * kernel: Arbitrary stack overwrite causing oops via crafted signal frame (CVE-2017-1000255, Moderate) * kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate) * kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate) * kernel: Buffer overflow in mp_override_legacy_irq() (CVE-2017-11473, Low) * kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact (CVE-2018-6927, Low) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Google Project Zero for reporting CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754; Vitaly Mayatskih for reporting CVE-2017-12190; Kirill Tkhai for reporting CVE-2017-15129; Michael Ellerman, Gustavo Romero, Breno Leitao, Paul Mackerras, and Cyril Bur for reporting CVE-2017-1000255; and Armis Labs for reporting CVE-2017-1000410. Additional Changes: See the Red Hat Enterprise Linux 7.5 Release Notes linked from References.", "link": "https://access.redhat.com/errata/RHSA-2018:0654", "severity": "High", "fixedby": "0:4.14.0-49.el7a" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:1374", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Andy Lutomirski for reporting this issue. Bug Fix(es): * Previously, the nfs_commit_inode() function did not respect the FLUSH_SYNC argument and exited even if there were already the in-flight COMMIT requests. As a consequence, the mmap() system call occasionally returned the EBUSY error on NFS, and CPU soft lockups occurred during a writeback on NFS. This update fixes nfs_commit_inode() to respect FLUSH_SYNC. As a result, mmap() does not return EBUSY, and the CPU soft lockups no longer occur during NFS writebacks. (BZ#1559869) * Recent IBM z Systems hardware contains an extension to the time-of-day clock that ensures it will be operational after the year 2042 by avoiding an overflow that would happen without it. However, the KVM hypervisor was previously unable to handle the extension correctly, which lead to guests freezing if their kernel supported the time-of-day clock extension. This update adds support for the extension to the KVM hypervisor, and KVM guests which support it no longer freeze. (BZ#1559871) * This update provides the ability to disable the \"RFI Flush\" mitigation mechanism for the Meltdown vulnerability (CVE-2017-5754) in the kernel. The patches that mitigate the effect of Meltdown may have negative impact on performance when the mechanism they provide is enabled, and at the same time your systems may not need this mitigation if they are secured by other means. The vulnerability mitigation remains enabled by default and must be disabled manually; this restores system performance to original levels, but the system then also remains vulnerable to Meltdown. Instructions describing how to disable RFI Flush, as well as additional information, is provided in the following Red Hat Knowledgebase article: https://access.redhat.com/articles/3311301 (BZ#1561463)", "link": "https://access.redhat.com/errata/RHSA-2018:1374", "severity": "High", "fixedby": "0:4.14.0-49.2.2.el7a" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:2772", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * kernel: Infoleak/use-after-free in __oom_reap_task_mm function in mm/oom_kill.c (CVE-2017-18202) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Previously, on certain little-endian variants of IBM Power Systems, there was no “sysfs spec_store_bypass” file. As a consequence, there was no way to indicate the Speculative Store Bypass Disable (SSBD) mitigation status. This update adds infrastructure code into the kernel to create the /sys/devices/system/cpu/vulnerabilities/* files. As a result, sysfs spec_store_bypass shows whether the SSBD mitigation is disabled or enabled. (BZ#1602340) * Previously, the kernel architectures for IBM z Systems were missing support to display the status of the Spectre v2 mitigations. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spectre_v2 file did not exist. With this update, the kernel now shows the status in the above mentioned file and as a result, the file now reports either \"Vulnerable\" or \"Mitigation: execute trampolines\" message. (BZ#1619667)", "link": "https://access.redhat.com/errata/RHSA-2018:2772", "severity": "High", "fixedby": "0:4.14.0-49.13.1.el7a" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:1967", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC) * This release also includes next iteration of the CVE-2017-5715 mitigation that includes the SMCCC (Secure Monitor Call Calling Convention) 1.1 support. (CVE-2017-5715, ARM) Red Hat would like to thank Google Project Zero for reporting CVE-2017-5715 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639. Bug Fix(es): These updated kernel-alt packages include numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3485851", "link": "https://access.redhat.com/errata/RHSA-2018:1967", "severity": "High", "fixedby": "0:4.14.0-49.8.1.el7a" } ] }
19,096
Common Lisp
.l
1
19,090
19,090
0.787638
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
9060b8c7df9781ff52267274bd12944fcf229617b687808ad0aef4bcbc421461
4,213
[ -1 ]
4,214
mysql-aqua.html
atgreen_red-light-green-light/test/mysql-aqua.html
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title> | Scan Results</title> <style> .hidden{display:none}.pl30{padding-left:30px !important}.pl10{padding-left:10px !important}.severity{color:#fff;border-radius:3px;padding:3px 6px}.severity.negligible{background:#5cef97}.severity.high{background:#e0443d}.severity.medium{background:#f79421}.severity.low{background:#e1c930}progress,sub,sup{vertical-align:baseline}button,hr,input{overflow:visible}[type=checkbox],[type=radio],legend{box-sizing:border-box;padding:0}html{font-family:sans-serif;-ms-text-size-adjust:100%;-webkit-text-size-adjust:100%}article,aside,details,figcaption,figure,footer,header,main,menu,nav,section,summary{display:block}audio,canvas,progress,video{display:inline-block}audio:not([controls]){display:none;height:0}[hidden],template{display:none}a{background-color:transparent;-webkit-text-decoration-skip:objects}a:active,a:hover{outline-width:0}abbr[title]{border-bottom:none;text-decoration:underline;text-decoration:underline dotted}b,strong{font-weight:bolder}dfn{font-style:italic}h1{font-size:2em;margin:.67em 0}mark{background-color:#ff0;color:#000}small{font-size:80%}sub,sup{font-size:75%;line-height:0;position:relative}sub{bottom:-.25em}sup{top:-.5em}img{border-style:none}svg:not(:root){overflow:hidden}code,kbd,pre,samp{font-family:monospace, monospace;font-size:1em}figure{margin:1em 40px}hr{box-sizing:content-box;height:0}button,input,select,textarea{font:inherit;margin:0}optgroup{font-weight:700}button,select{text-transform:none}[type=reset],[type=submit],button,html [type=button]{-webkit-appearance:button}[type=button]::-moz-focus-inner,[type=reset]::-moz-focus-inner,[type=submit]::-moz-focus-inner,button::-moz-focus-inner{border-style:none;padding:0}[type=button]:-moz-focusring,[type=reset]:-moz-focusring,[type=submit]:-moz-focusring,button:-moz-focusring{outline:ButtonText dotted 1px}fieldset{border:1px solid silver;margin:0 2px;padding:.35em .625em .75em}legend{color:inherit;display:table;max-width:100%;white-space:normal}textarea{overflow:auto}[type=number]::-webkit-inner-spin-button,[type=number]::-webkit-outer-spin-button{height:auto}[type=search]{-webkit-appearance:textfield;outline-offset:-2px}[type=search]::-webkit-search-cancel-button,[type=search]::-webkit-search-decoration{-webkit-appearance:none}::-webkit-input-placeholder{color:inherit;opacity:.54}::-webkit-file-upload-button{-webkit-appearance:button;font:inherit}h1{font-weight:700}h2{font-size:1.2em}.success{margin:2em auto;max-width:400px;padding:1em;font-size:1.6em;background-color:#91b94f;color:#fff}table{width:auto;margin:1em auto;border-collapse:collapse}#summary tr:first-child td{padding:.75em;font-size:1.5em;border:1px solid #000;color:#fff;text-shadow:1px 1px 1px #000}#summary tr:first-child td:nth-child(1){background-color:#e0443d}#summary tr:first-child td:nth-child(2){background-color:#f79421}#summary tr:first-child td:nth-child(3){background-color:#e1c930}#summary tr:first-child td:nth-child(4){background-color:#5cef97}#summary tr:first-child td:nth-child(5){background-color:#1280c4}#summary tr:last-child td{padding-top:4px;font-size:.9em;text-transform:uppercase}#disallow{text-align:left;max-width:500px;margin:2em auto 0;background-color:#e0adad;padding:10px;border:1px solid #e0443d}#disallow li{line-height:24px}#disallow p{margin-bottom:10px}.wrapper{height:calc(100% - 190px);overflow:auto}.table-data{margin-top:0;width:calc(100% - 5px);text-align:left;background:#f9f9f9}.table-data caption{margin-bottom:.6em}.table-data td,.table-data th{padding:7px 10px;border:1px solid #1f9fba;position:relative}.table-data th{border:none;background:#fff}.table-data th:first-child{padding-left:32px}.table-data a{text-decoration:none;color:#08b1d5}.table-data a:hover{text-decoration:underline}.table-data tr:hover{background:#d5d2d0}.table-data tbody tr:nth-child(even) td{background-color:#daf1f6}.more-info th{border:1px solid #ccc !important}.more-info td{background:#fff !important;border:1px solid #ccc !important;font-size:14px}.more-info > td{background:#ececec !important}.more-info tr:hover td{background:#f9f9f9 !important}.more-info ul{list-style:none;text-align:left}.more-info{display:none;background:transparent !important;border:1px solid #1f9fba}body > p{margin-top:2em}.bold{font-weight:700}.chevron{color:#08b1d5;font-size:20px;padding:10px;cursor:pointer;position:absolute;left:-5px;top:40%;z-index:10;transform:translateY(-50%)}#logo{display:block;margin:0 auto;width:144px;height:52px;background-repeat:no-repeat;background-image:url(data:image/png;base64,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)}#logo span{display:none}*{margin:0;padding:0}html,body{max-height:100%;overflow:hidden;background:#ccc;font-family:'Lucida Grande', 'Lucida Sans', Arial, sans-serif;color:#464547}.mt20{margin-top:20px}.clearfix::after{display:block;content:"";clear:both}.header{height:50px;line-height:50px;background:#000}.header .logo{width:100px;margin-top:7px;margin-left:10px}.content{margin:30px;background:#fff;height:calc(100vh - 110px)}.tabset{float:left;list-style:none;padding-left:20px}.tabset li{float:left;position:relative}.tab input[type=radio]{display:none}.tab input[type=radio] + label{display:inline-block;padding:10px;color:#999;cursor:pointer}.tab input[type=radio]:checked + label{color:#2b2b2b;border:1px solid #ddd;border-bottom:0;border-radius:3px 3px 0 0}.tab input[type=radio]:checked + label:after{content:"";position:absolute;height:1px;width:calc(100% - 2px);background:#fff;left:1px;bottom:-1px;z-index:1000}.tabs-content{clear:both;height:calc(100% - 20px);overflow:auto;border-top:1px solid #ddd;padding:20px}.tabs-content .tab-content{display:none;height:100%}.tabs-content .tab1{display:block;height:calc(100% - 165px);overflow:auto}.content > .title{padding:15px 20px;margin-bottom:10px;border-bottom:0}.content > .title h1{margin-bottom:5px;font-size:24px}.content > .title span{font-size:16px}.box{padding:25px 20px;border:1px solid #ddd}.image-status{background:#f7f7f7}.image-status .icon-warning-triangle,.image-status .icon-check{width:60px;height:60px;float:left}.image-status h2,.image-status h5{padding-left:70px;margin-top:5px}.image-status h5{font-size:14px;font-weight:normal}.title{padding:0;margin:0;border-bottom:1px solid #ddd;padding-bottom:10px;font-weight:normal;font-size:16px}.vuln-nums{padding:10px}.vuln-nums li{list-style:none;float:left;padding:5px 10px;border-right:1px solid #ddd;font-size:12px}.vuln-nums li:last-child{border-right:none}.square{border-radius:3px;width:15px;height:15px;display:inline-block;position:relative;top:3px}.red{background:#e0443d}.orange{background:#f79421}.yellow{background:#e1c930}.green{background:#a5cf4f}.text-alert{color:#e0443d;fill:#e0443d}.text-success{color:#a5cf4f;fill:#a5cf4f}.assurance-checks li{list-style:none;padding:10px 5px;border-bottom:1px solid #ddd;font-size:14px}.assurance-checks .icon-warning-triangle{width:20px;position:relative;top:3px;margin-right:5px} </style> <script> function changeTab(e){for(var t=document.getElementsByClassName("tab-content"),n=document.getElementsByClassName(e)[0],s=0;s<t.length;s++)t[s].style.display="none";n.style.display="block"}function getDisplay(e){return e.currentStyle?e.currentStyle.display:getComputedStyle(e,null).display}function toggleOpen(e){var t=document.getElementById("show"+e.id);"none"===getDisplay(t)?(e.getElementsByClassName('chevron')[0].innerHTML="&#9662;",t.style.display="table-row"):(e.getElementsByClassName('chevron')[0].innerHTML="&#9656;",t.style.display="none");return false;}function toggleGroupBy(e){var t=document.getElementById("resources"),n=document.getElementById("cves");e.checked?(t.classList.remove("hidden"),n.classList.add("hidden")):(n.classList.remove("hidden"),t.classList.add("hidden"))} </script> </head> <body> <header class="header"> <svg class="logo" viewBox="0 0 490.42 176" xmlns="http://www.w3.org/2000/svg"> <defs> <style>.cls-1 { fill: #f1df36; } .cls-2 { fill: #faaf42; } .cls-3 { fill: #9ad7ec; } .cls-4 { fill: #08b1d5; } .cls-5 { fill: #f69421; } .cls-6 { fill: #1180c4; } .cls-7 { fill: #fff; } .cls-8 { fill: none; stroke: #f69421; stroke-miterlimit: 10; stroke-width: 22px; }</style> </defs> <title>aqua_logo_</title> <polygon class="cls-1" points="85.58 20 50.78 54 120.38 54 120.38 20"/> <polygon class="cls-2" points="120.38 122 155.18 88 155.18 54 120.38 54"/> <polygon class="cls-3" points="50.78 122 50.78 156 85.58 156 120.38 122"/> <polygon class="cls-4" points="15.98 88 15.98 122 50.78 122 50.78 54"/> <rect class="cls-5" x="120.38" y="20" width="34.8" height="34"/> <rect class="cls-6" x="15.98" y="122" width="34.8" height="34"/> <path class="cls-7" d="M239.94,51.45A25.86,25.86,0,0,0,230.15,47a59.53,59.53,0,0,0-12.93-1.21A70,70,0,0,0,204.48,47c-4.24.79-7.54,1.52-9.82,2.18l-1.08.31v15h2.52l0.28-.12a65.57,65.57,0,0,1,11.17-3.59,45.5,45.5,0,0,1,9.61-1.23,47.4,47.4,0,0,1,6.74.47A12.9,12.9,0,0,1,229,61.79a8.09,8.09,0,0,1,3.07,3.44,14.35,14.35,0,0,1,1.14,6.25v0.92c-5.91.35-11.49,0.86-16.62,1.52a51.69,51.69,0,0,0-14.84,4,23.27,23.27,0,0,0-10.73,9,26,26,0,0,0-3.4,13.6,26.31,26.31,0,0,0,1.86,9.81,23.78,23.78,0,0,0,5,7.87,23.46,23.46,0,0,0,16.65,6.87,31.87,31.87,0,0,0,8.91-1,38,38,0,0,0,6.5-2.69,29.78,29.78,0,0,0,5.1-3.32l1.56-1.23v6.2H248.4V71.94a32.05,32.05,0,0,0-2.06-12.13A19.67,19.67,0,0,0,239.94,51.45Zm-6.68,33.76V103a44,44,0,0,1-8,5.5,20.44,20.44,0,0,1-9.75,2.32c-4.1,0-7.21-.94-9.25-2.79s-3-4.56-3-8.3c0-3.29.89-5.75,2.73-7.53A18.22,18.22,0,0,1,213.43,88a58.31,58.31,0,0,1,10.47-1.86C227.49,85.76,230.62,85.46,233.25,85.21Z"/> <path class="cls-7" d="M306.7,49.86a40.8,40.8,0,0,0-6.95-3,33.78,33.78,0,0,0-10.13-1.37,28.89,28.89,0,0,0-12.26,2.74A29.53,29.53,0,0,0,267.26,56a39,39,0,0,0-7.07,12.52,50.69,50.69,0,0,0-2.65,17c0,12.05,2.57,21.63,7.63,28.46a24.78,24.78,0,0,0,20.88,10.51,29.1,29.1,0,0,0,11.84-2.37,37.47,37.47,0,0,0,8.28-5.21v32.91h15.21V47.52h-14.1Zm-7.63,10.48A39.15,39.15,0,0,1,306.18,63v39.67a35,35,0,0,1-8.08,5.1,22.6,22.6,0,0,1-9.38,2.08c-5.33,0-9.14-2-11.64-6.13-2.61-4.31-3.94-10.63-3.94-18.8,0-8.33,1.65-14.76,4.9-19.1s7.64-6.35,13.61-6.35A30.68,30.68,0,0,1,299.07,60.35Z"/> <path class="cls-7" d="M380.35,102.49a42.28,42.28,0,0,1-8.46,5.58,20,20,0,0,1-8.88,2.38,15.39,15.39,0,0,1-6.69-1.14,7.82,7.82,0,0,1-3.41-3.45,17.3,17.3,0,0,1-1.75-6.13,88,88,0,0,1-.41-9.41V47.52H335.54V96.1a41.14,41.14,0,0,0,1.8,12.95,24.82,24.82,0,0,0,5.16,9,20.29,20.29,0,0,0,7.89,5.32,27,27,0,0,0,9.45,1.65,26.25,26.25,0,0,0,12-2.73,50.21,50.21,0,0,0,8.54-5.63v6.34h15.21V47.52H380.35v55Z"/> <path class="cls-7" d="M463.82,59.81a19.67,19.67,0,0,0-6.4-8.36A25.86,25.86,0,0,0,447.64,47a59.53,59.53,0,0,0-12.93-1.21A70,70,0,0,0,422,47c-4.24.79-7.54,1.52-9.82,2.18l-1.08.31v15h2.52l0.28-.12A65.57,65.57,0,0,1,425,60.78a45.5,45.5,0,0,1,9.61-1.23,47.4,47.4,0,0,1,6.74.47,12.9,12.9,0,0,1,5.15,1.78,8.09,8.09,0,0,1,3.07,3.44,14.35,14.35,0,0,1,1.14,6.25v0.92c-5.91.35-11.49,0.86-16.62,1.52a51.69,51.69,0,0,0-14.84,4,23.27,23.27,0,0,0-10.73,9,26,26,0,0,0-3.4,13.6,26.31,26.31,0,0,0,1.86,9.81,23.78,23.78,0,0,0,5,7.87,23.46,23.46,0,0,0,16.65,6.87,31.87,31.87,0,0,0,8.91-1,38,38,0,0,0,6.5-2.69,29.78,29.78,0,0,0,5.1-3.32l1.56-1.23v6.2h15.14V71.94A32.05,32.05,0,0,0,463.82,59.81Zm-13.08,25.4V103a44,44,0,0,1-8,5.5,20.44,20.44,0,0,1-9.75,2.32c-4.1,0-7.21-.94-9.25-2.79s-3-4.56-3-8.3c0-3.29.89-5.75,2.73-7.53A18.22,18.22,0,0,1,430.92,88a58.31,58.31,0,0,1,10.47-1.86C445,85.76,448.11,85.46,450.74,85.21Z"/> <rect class="cls-8" x="-604.42" y="-703.27" width="1676" height="1646"/> </svg> </header> <main class="content"> <div class="title"> <h1>Scan Report: </h1> <span>From Local Docker Engine</span> </div> <ul class="tabset"> <li class="tab"> <input type="radio" name="tab" id="tab1" checked> <label for="tab1" onclick="changeTab('tab1')">Risk</label> </li> <li class="tab"> <input type="radio" name="tab" id="tab2"> <label for="tab2" onclick="changeTab('tab2')">Vulnerabilities</label> </li> </ul> <div class="tabs-content"> <div class="tab-content tab1"> <div class="image-status box"> <svg version="1.1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" class="icon-warning-triangle text-alert"> <path d="M30.587 30.447c-0.009 0-0.017 0-0.027 0h-29.259c-0.469 0-0.905-0.248-1.144-0.652-0.24-0.403-0.248-0.904-0.021-1.315l14.629-26.533c0.467-0.847 1.864-0.847 2.331 0l14.516 26.328c0.191 0.229 0.305 0.524 0.305 0.845 0 0.732-0.596 1.327-1.331 1.327zM15.931 5.34l-12.38 22.453h24.76l-12.38-22.453zM15.931 11.873c0.735 0 1.331 0.593 1.331 1.327v6.633c0 0.732-0.596 1.327-1.331 1.327s-1.329-0.595-1.329-1.327v-6.633c0-0.733 0.595-1.327 1.329-1.327zM16.879 22.871c0.239 0.252 0.385 0.597 0.385 0.943s-0.147 0.689-0.399 0.941c-0.24 0.239-0.585 0.385-0.931 0.385-0.36 0-0.692-0.147-0.944-0.385-0.253-0.252-0.387-0.596-0.387-0.941s0.133-0.691 0.387-0.943c0.491-0.491 1.396-0.491 1.888 0z"></path> </svg> <h2 class="text-alert">Image is disallowed</h2> <h5>Image scanned on August 3, 2018 14:59</h5> </div> <div class="image-overview box mt20"> <h4 class="title">Image Overview</h4> <ul class="vuln-nums clearfix"> <li class="vuln"> <span class="square red"></span> <span>6 High</span> </li> <li class="vuln"> <span class="square orange"></span> <span>20 Medium</span> </li> <li class="vuln"> <span class="square yellow"></span> <span>35 Low</span> </li> <li class="vuln"> <span class="square green"></span> <span>2 Negligible</span> </li> </ul> </div> <div class="assurance-checks box mt20"> <h4 class="title">Image Assurance</h4> <ul> <li> <svg version="1.1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" class="icon-warning-triangle text-alert"> <path d="M30.587 30.447c-0.009 0-0.017 0-0.027 0h-29.259c-0.469 0-0.905-0.248-1.144-0.652-0.24-0.403-0.248-0.904-0.021-1.315l14.629-26.533c0.467-0.847 1.864-0.847 2.331 0l14.516 26.328c0.191 0.229 0.305 0.524 0.305 0.845 0 0.732-0.596 1.327-1.331 1.327zM15.931 5.34l-12.38 22.453h24.76l-12.38-22.453zM15.931 11.873c0.735 0 1.331 0.593 1.331 1.327v6.633c0 0.732-0.596 1.327-1.331 1.327s-1.329-0.595-1.329-1.327v-6.633c0-0.733 0.595-1.327 1.329-1.327zM16.879 22.871c0.239 0.252 0.385 0.597 0.385 0.943s-0.147 0.689-0.399 0.941c-0.24 0.239-0.585 0.385-0.931 0.385-0.36 0-0.692-0.147-0.944-0.385-0.253-0.252-0.387-0.596-0.387-0.941s0.133-0.691 0.387-0.943c0.491-0.491 1.396-0.491 1.888 0z"></path> </svg> Image severity <strong>high</strong> exeeds the allowed max severity <strong>high</strong> </li> </ul> </div> </div> <div class="tab-content tab2"> <div class="group-by" style="margin-left: 5px;margin-bottom: 20px;"> <input type="checkbox" id="group" onchange="toggleGroupBy(this)"> <label for="group">Group by resource</label> </div> <div class="wrapper"> <table id="resources" class="hidden table-data resources"> <thead> <tr> <th scope="col">Resource</th> <th scope="col">Type</th> <th scope="col">Version</th> <th scope="col">Format</th> <th scope="col">Arch</th> </tr> </thead> <tbody> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="1"> <span class="chevron">&#9656;</span> setup </a> </td> <td>PACKAGE</td> <td>2.8.71-7.el7</td> <td>rpm</td> <td>noarch</td> </tr> <tr id="show1" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-1113" target="_blank">CVE-2018-1113</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="4"> <span class="chevron">&#9656;</span> glibc </a> </td> <td>PACKAGE</td> <td>2.17-196.el7</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show4" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-11237" target="_blank">CVE-2018-11237</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2017-16997" target="_blank">CVE-2017-16997</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-11236" target="_blank">CVE-2018-11236</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2014-4043" target="_blank">CVE-2014-4043</a></td> <td><span class="severity low">low</span></td> <td><span>1</span></td> <td>None</td> </tr> <tr> <td><a href="https://rhn.redhat.com/errata/RHSA-2018-0805.html" target="_blank">RHSA-2018:0805</a></td> <td><span class="severity high">high</span></td> <td><span>7</span></td> <td>2.17-222.el7</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="6"> <span class="chevron">&#9656;</span> bash </a> </td> <td>PACKAGE</td> <td>4.2.46-29.el7_4</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show6" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2014-6278" target="_blank">CVE-2014-6278</a></td> <td><span class="severity negligible">negligible</span></td> <td><span>10</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2014-6277" target="_blank">CVE-2014-6277</a></td> <td><span class="severity negligible">negligible</span></td> <td><span>10</span></td> <td>None</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="15"> <span class="chevron">&#9656;</span> libgcrypt </a> </td> <td>PACKAGE</td> <td>1.5.3-14.el7</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show15" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-0495" target="_blank">CVE-2018-0495</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2014-3591" target="_blank">CVE-2014-3591</a></td> <td><span class="severity low">low</span></td> <td><span>1.2</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2015-0837" target="_blank">CVE-2015-0837</a></td> <td><span class="severity low">low</span></td> <td><span>1.2</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2014-5270" target="_blank">CVE-2014-5270</a></td> <td><span class="severity medium">medium</span></td> <td><span>1.9</span></td> <td>None</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="18"> <span class="chevron">&#9656;</span> sqlite </a> </td> <td>PACKAGE</td> <td>3.7.17-8.el7</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show18" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-8740" target="_blank">CVE-2018-8740</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="30"> <span class="chevron">&#9656;</span> libidn </a> </td> <td>PACKAGE</td> <td>1.28-4.el7</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show30" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2015-2059" target="_blank">CVE-2015-2059</a></td> <td><span class="severity low">low</span></td> <td><span>2.6</span></td> <td>None</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="44"> <span class="chevron">&#9656;</span> procps-ng </a> </td> <td>PACKAGE</td> <td>3.3.10-16.el7</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show44" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-1122" target="_blank">CVE-2018-1122</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-1123" target="_blank">CVE-2018-1123</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-1125" target="_blank">CVE-2018-1125</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://rhn.redhat.com/errata/RHSA-2018-1700.html" target="_blank">RHSA-2018:1700</a></td> <td><span class="severity high">high</span></td> <td><span>7</span></td> <td>3.3.10-17.el7_5.2</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="46"> <span class="chevron">&#9656;</span> binutils </a> </td> <td>PACKAGE</td> <td>2.25.1-32.base.el7_4.1</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show46" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-9996" target="_blank">CVE-2018-9996</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-9138" target="_blank">CVE-2018-9138</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-10534" target="_blank">CVE-2018-10534</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-10535" target="_blank">CVE-2018-10535</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-10372" target="_blank">CVE-2018-10372</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-10373" target="_blank">CVE-2018-10373</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-12641" target="_blank">CVE-2018-12641</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-13033" target="_blank">CVE-2018-13033</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-12697" target="_blank">CVE-2018-12697</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-12698" target="_blank">CVE-2018-12698</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-12699" target="_blank">CVE-2018-12699</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-12700" target="_blank">CVE-2018-12700</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-12934" target="_blank">CVE-2018-12934</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-7643" target="_blank">CVE-2018-7643</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-7208" target="_blank">CVE-2018-7208</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-8945" target="_blank">CVE-2018-8945</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-7568" target="_blank">CVE-2018-7568</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-7569" target="_blank">CVE-2018-7569</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-7642" target="_blank">CVE-2018-7642</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="47"> <span class="chevron">&#9656;</span> nss </a> </td> <td>PACKAGE</td> <td>3.28.4-15.el7_4</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show47" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-0495" target="_blank">CVE-2018-0495</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2014-3566" target="_blank">CVE-2014-3566</a></td> <td><span class="severity high">high</span></td> <td><span>5</span></td> <td>None</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="49"> <span class="chevron">&#9656;</span> curl </a> </td> <td>PACKAGE</td> <td>7.29.0-42.el7</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show49" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-1000301" target="_blank">CVE-2018-1000301</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-1000007" target="_blank">CVE-2018-1000007</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-1000120" target="_blank">CVE-2018-1000120</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-1000121" target="_blank">CVE-2018-1000121</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-1000122" target="_blank">CVE-2018-1000122</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://rhn.redhat.com/errata/RHSA-2017-3263.html" target="_blank">RHSA-2017:3263</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>7.29.0-42.el7_4.1</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="56"> <span class="chevron">&#9656;</span> dracut </a> </td> <td>PACKAGE</td> <td>033-502.el7</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show56" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2017-5715" target="_blank">CVE-2017-5715</a></td> <td><span class="severity high">high</span></td> <td><span>7</span></td> <td>None</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="57"> <span class="chevron">&#9656;</span> systemd </a> </td> <td>PACKAGE</td> <td>219-42.el7_4.4</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show57" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-6954" target="_blank">CVE-2018-6954</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://rhn.redhat.com/errata/RHSA-2018-0260.html" target="_blank">RHSA-2018:0260</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>219-42.el7_4.7</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="59"> <span class="chevron">&#9656;</span> python </a> </td> <td>PACKAGE</td> <td>2.7.5-58.el7</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show59" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-1060" target="_blank">CVE-2018-1060</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-1061" target="_blank">CVE-2018-1061</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://rhn.redhat.com/errata/RHSA-2018-2123.html" target="_blank">RHSA-2018:2123</a></td> <td><span class="severity medium">medium</span></td> <td><span>4.3</span></td> <td>2.7.5-69.el7_5</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="73"> <span class="chevron">&#9656;</span> yum-utils </a> </td> <td>PACKAGE</td> <td>1.1.31-42.el7</td> <td>rpm</td> <td>noarch</td> </tr> <tr id="show73" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://rhn.redhat.com/errata/RHSA-2018-2285.html" target="_blank">RHSA-2018:2285</a></td> <td><span class="severity high">high</span></td> <td><span>7</span></td> <td>1.1.31-46.el7_5</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="81"> <span class="chevron">&#9656;</span> policycoreutils </a> </td> <td>PACKAGE</td> <td>2.5-17.1.el7</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show81" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://rhn.redhat.com/errata/RHSA-2018-0913.html" target="_blank">RHSA-2018:0913</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>2.5-22.el7</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="84"> <span class="chevron">&#9656;</span> libevent </a> </td> <td>PACKAGE</td> <td>2.0.21-4.el7</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show84" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2015-6525" target="_blank">CVE-2015-6525</a></td> <td><span class="severity medium">medium</span></td> <td><span>5.1</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2014-6272" target="_blank">CVE-2014-6272</a></td> <td><span class="severity medium">medium</span></td> <td><span>5.1</span></td> <td>None</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="124"> <span class="chevron">&#9656;</span> libxml2 </a> </td> <td>PACKAGE</td> <td>2.9.1-6.el7_2.3</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show124" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-14404" target="_blank">CVE-2018-14404</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2017-18258" target="_blank">CVE-2017-18258</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="140"> <span class="chevron">&#9656;</span> ncurses </a> </td> <td>PACKAGE</td> <td>5.9-14.20130511.el7_4</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show140" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-10754" target="_blank">CVE-2018-10754</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> </tbody> </table> </td> </tr> <tr> <td class="pl30"> <a href="#" onclick="toggleOpen(this)" id="176"> <span class="chevron">&#9656;</span> gnupg2 </a> </td> <td>PACKAGE</td> <td>2.0.22-4.el7</td> <td>rpm</td> <td>x86_64</td> </tr> <tr id="show176" class="more-info"> <td colspan="6"> <table style="width:100%"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2018-9234" target="_blank">CVE-2018-9234</a></td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2014-3591" target="_blank">CVE-2014-3591</a></td> <td><span class="severity low">low</span></td> <td><span>1.2</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2015-0837" target="_blank">CVE-2015-0837</a></td> <td><span class="severity low">low</span></td> <td><span>1.2</span></td> <td>None</td> </tr> <tr> <td><a href="https://access.redhat.com/security/cve/CVE-2014-4617" target="_blank">CVE-2014-4617</a></td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td><a href="https://rhn.redhat.com/errata/RHSA-2018-2181.html" target="_blank">RHSA-2018:2181</a></td> <td><span class="severity high">high</span></td> <td><span>7</span></td> <td>2.0.22-5.el7_5</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table id="cves" class="table-data"> <thead> <tr> <th scope="col">Name</th> <th scope="col">Resource</th> <th scope="col">Severity</th> <th scope="col">Score</th> <th scope="col">Fix Version</th> </tr> </thead> <tbody> <tr> <tr> <td> <a href="https://rhn.redhat.com/errata/RHSA-2018-2181.html" target="_blank">RHSA-2018:2181</a> </td> <td>gnupg2</td> <td><span class="severity high">high</span></td> <td><span>7</span></td> <td>2.0.22-5.el7_5</td> </tr> <tr> <td> <a href="https://rhn.redhat.com/errata/RHSA-2018-1700.html" target="_blank">RHSA-2018:1700</a> </td> <td>procps-ng</td> <td><span class="severity high">high</span></td> <td><span>7</span></td> <td>3.3.10-17.el7_5.2</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2017-5715" target="_blank">CVE-2017-5715</a> </td> <td>dracut</td> <td><span class="severity high">high</span></td> <td><span>7</span></td> <td>None</td> </tr> <tr> <td> <a href="https://rhn.redhat.com/errata/RHSA-2018-0805.html" target="_blank">RHSA-2018:0805</a> </td> <td>glibc</td> <td><span class="severity high">high</span></td> <td><span>7</span></td> <td>2.17-222.el7</td> </tr> <tr> <td> <a href="https://rhn.redhat.com/errata/RHSA-2018-2285.html" target="_blank">RHSA-2018:2285</a> </td> <td>yum-utils</td> <td><span class="severity high">high</span></td> <td><span>7</span></td> <td>1.1.31-46.el7_5</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2015-6525" target="_blank">CVE-2015-6525</a> </td> <td>libevent</td> <td><span class="severity medium">medium</span></td> <td><span>5.1</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2014-6272" target="_blank">CVE-2014-6272</a> </td> <td>libevent</td> <td><span class="severity medium">medium</span></td> <td><span>5.1</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-14404" target="_blank">CVE-2018-14404</a> </td> <td>libxml2</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-0495" target="_blank">CVE-2018-0495</a> </td> <td>libgcrypt</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-0495" target="_blank">CVE-2018-0495</a> </td> <td>nss</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-1061" target="_blank">CVE-2018-1061</a> </td> <td>python</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-1122" target="_blank">CVE-2018-1122</a> </td> <td>procps-ng</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://rhn.redhat.com/errata/RHSA-2018-0260.html" target="_blank">RHSA-2018:0260</a> </td> <td>systemd</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>219-42.el7_4.7</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2014-4617" target="_blank">CVE-2014-4617</a> </td> <td>gnupg2</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-11236" target="_blank">CVE-2018-11236</a> </td> <td>glibc</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-6954" target="_blank">CVE-2018-6954</a> </td> <td>systemd</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2017-16997" target="_blank">CVE-2017-16997</a> </td> <td>glibc</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-11237" target="_blank">CVE-2018-11237</a> </td> <td>glibc</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://rhn.redhat.com/errata/RHSA-2017-3263.html" target="_blank">RHSA-2017:3263</a> </td> <td>curl</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>7.29.0-42.el7_4.1</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-1000122" target="_blank">CVE-2018-1000122</a> </td> <td>curl</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-1000120" target="_blank">CVE-2018-1000120</a> </td> <td>curl</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-1000007" target="_blank">CVE-2018-1000007</a> </td> <td>curl</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-1000301" target="_blank">CVE-2018-1000301</a> </td> <td>curl</td> <td><span class="severity medium">medium</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2014-3566" target="_blank">CVE-2014-3566</a> </td> <td>nss</td> <td><span class="severity high">high</span></td> <td><span>5</span></td> <td>None</td> </tr> <tr> <td> <a href="https://rhn.redhat.com/errata/RHSA-2018-2123.html" target="_blank">RHSA-2018:2123</a> </td> <td>python</td> <td><span class="severity medium">medium</span></td> <td><span>4.3</span></td> <td>2.7.5-69.el7_5</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-12641" target="_blank">CVE-2018-12641</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-12697" target="_blank">CVE-2018-12697</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-12698" target="_blank">CVE-2018-12698</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-12699" target="_blank">CVE-2018-12699</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-12700" target="_blank">CVE-2018-12700</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-12934" target="_blank">CVE-2018-12934</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-13033" target="_blank">CVE-2018-13033</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-7208" target="_blank">CVE-2018-7208</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-8945" target="_blank">CVE-2018-8945</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-7568" target="_blank">CVE-2018-7568</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-7569" target="_blank">CVE-2018-7569</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-7642" target="_blank">CVE-2018-7642</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-10373" target="_blank">CVE-2018-10373</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-7643" target="_blank">CVE-2018-7643</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-10372" target="_blank">CVE-2018-10372</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-10535" target="_blank">CVE-2018-10535</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-10534" target="_blank">CVE-2018-10534</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-1000121" target="_blank">CVE-2018-1000121</a> </td> <td>curl</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-9138" target="_blank">CVE-2018-9138</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-9996" target="_blank">CVE-2018-9996</a> </td> <td>binutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-1125" target="_blank">CVE-2018-1125</a> </td> <td>procps-ng</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-1123" target="_blank">CVE-2018-1123</a> </td> <td>procps-ng</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-8740" target="_blank">CVE-2018-8740</a> </td> <td>sqlite</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-1060" target="_blank">CVE-2018-1060</a> </td> <td>python</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2017-18258" target="_blank">CVE-2017-18258</a> </td> <td>libxml2</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-10754" target="_blank">CVE-2018-10754</a> </td> <td>ncurses</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-9234" target="_blank">CVE-2018-9234</a> </td> <td>gnupg2</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://rhn.redhat.com/errata/RHSA-2018-0913.html" target="_blank">RHSA-2018:0913</a> </td> <td>policycoreutils</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>2.5-22.el7</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2018-1113" target="_blank">CVE-2018-1113</a> </td> <td>setup</td> <td><span class="severity low">low</span></td> <td><span>3</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2015-2059" target="_blank">CVE-2015-2059</a> </td> <td>libidn</td> <td><span class="severity low">low</span></td> <td><span>2.6</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2014-5270" target="_blank">CVE-2014-5270</a> </td> <td>libgcrypt</td> <td><span class="severity medium">medium</span></td> <td><span>1.9</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2015-0837" target="_blank">CVE-2015-0837</a> </td> <td>libgcrypt</td> <td><span class="severity low">low</span></td> <td><span>1.2</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2014-3591" target="_blank">CVE-2014-3591</a> </td> <td>libgcrypt</td> <td><span class="severity low">low</span></td> <td><span>1.2</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2014-3591" target="_blank">CVE-2014-3591</a> </td> <td>gnupg2</td> <td><span class="severity low">low</span></td> <td><span>1.2</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2015-0837" target="_blank">CVE-2015-0837</a> </td> <td>gnupg2</td> <td><span class="severity low">low</span></td> <td><span>1.2</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2014-4043" target="_blank">CVE-2014-4043</a> </td> <td>glibc</td> <td><span class="severity low">low</span></td> <td><span>1</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2014-6278" target="_blank">CVE-2014-6278</a> </td> <td>bash</td> <td><span class="severity negligible">negligible</span></td> <td><span>0</span></td> <td>None</td> </tr> <tr> <td> <a href="https://access.redhat.com/security/cve/CVE-2014-6277" target="_blank">CVE-2014-6277</a> </td> <td>bash</td> <td><span class="severity negligible">negligible</span></td> <td><span>0</span></td> <td>None</td> </tr> </tr> </tbody> </table> </div> </div> </div> </main> </body> </html>
81,264
Common Lisp
.l
1,636
32.298289
9,990
0.518243
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
410341537478e3106e8fffb64400d9b9199e8532df0a5aeaec198035608a0711
4,214
[ -1 ]
4,215
report.html
atgreen_red-light-green-light/test/report.html
<?xml version="1.0"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!-- Color mapping Result enumeration Class |t|f|u|e|na|ne| compliance |G|R|B|Y|- |- | inventory |-|-|B|Y|- |- | misc |-|-|B|Y|- |- | patch |R|G|B|Y|- |- | vuln |R|G|B|Y|- |- | R = red G = green B = blue Y = yellow - = grey --> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="content-type" content="text/html; charset=UTF-8" /> <title>OVAL Results</title> <style type="text/css"> table { border: 1px solid #000000; width: 100%; border-spacing: 0px; margin: 2px 0px;} .noborder {border: none;} .nomargin {margin: 0px;} td { padding: 0px 4px 1px 4px;} .SmallLabel { font-family: Geneva, Arial, Helvetica, sans-serif; color: #000000; font-size: 9pt; font-weight: bold; white-space: nowrap;} .SmallText { font-family: Geneva, Arial, Helvetica, sans-serif; color: #000000; font-size: 9pt;} .Label { font-family: Geneva, Arial, Helvetica, sans-serif; color: #000000; font-size: 10pt; font-weight: bold; white-space: nowrap;} .TitleLabel { font-family: Geneva, Arial, Helvetica, sans-serif; color: #ffffff; font-size: 10pt; font-weight: bold; white-space: nowrap;} .Text { font-family: Geneva, Arial, Helvetica, sans-serif; color: #000000; font-size: 10pt;} .Title { color: #FFFFFF; background-color: #706c60; padding: 0px 4px 1px 4px; font-size: 10pt; border-bottom: 1px solid #000000;} .Center { text-align: center;} a { color:#676c63;} a.Hover:hover { color:#7b0e0e; text-decoration:underline;} .LightRow { background-color: #FFFFFF;} .DarkRow { background-color: #DDDDD8;} .resultbadA{background-color: #FFBC8F;} .resultbadB{background-color: #FFE0CC;} .resultgoodA{background-color: #ACD685;} .resultgoodB{background-color: #CBE6B3;} .unknownA{background-color: #AEC8E0;} .unknownB{background-color: #DAE6F1;} .errorA{background-color: #FFDD75;} .errorB{background-color: #FFECB3;} .otherA{background-color: #EEEEEE;} .otherB{background-color: #FFFFFF;} .Classcompliance{background-color: #93C572;} .Classinventory{background-color: #AEC6CF;} .Classmiscellaneous{background-color: #9966CC;} .Classpatch{background-color: #FFDD75;} .Classvulnerability{background-color: #FF9966;} .ColorBox{width: 2px;} </style> </head> <body> <table class="noborder nomargin"> <tr> <td width="50%"> <table border="1"> <tr class="Title"> <td class="TitleLabel" colspan="5">OVAL Results Generator Information</td> </tr> <tr class="DarkRow Center"> <td class="SmallLabel">Schema Version</td> <td class="SmallLabel">Product Name</td> <td class="SmallLabel">Product Version</td> <td class="SmallLabel">Date</td> <td class="SmallLabel">Time</td> </tr> <tr class="LightRow"> <td class="SmallText">5.10</td> <td class="SmallText">cpe:/a:open-scap:oscap</td> <td class="SmallText">1.2.17</td> <td class="SmallText">2018-11-26</td> <td class="SmallText">07:45:13</td> </tr> <tr class="DarkRow Center"> <td class="SmallLabel" style="width: 20%;" title="Non-Compliant/Vulnerable/Unpatched">#✕</td> <td class="SmallLabel" style="width: 20%;" title="Compliant/Non-Vulnerable/Patched">#✓</td> <td class="SmallLabel" style="width: 20%;" title="Error">#Error</td> <td class="SmallLabel" style="width: 20%;" title="Unknown">#Unknown</td> <td class="SmallLabel" style="width: 20%;" title="Inventory/Miscellaneous class, or Not Applicable/Not Evaluated result">#Other</td> </tr> <tr class="LightRow Center" style="height:auto;"> <td class="SmallText resultbadB" title="Non-Compliant/Vulnerable/Unpatched" style="width:20%">2</td> <td class="SmallText resultgoodB" title="Compliant/Non-Vulnerable/Patched" style="width:20%">699</td> <td class="SmallText errorB" title="Error" style="width:20%">0</td> <td class="SmallText unknownB" title="Unknown" style="width:20%">0</td> <td class="SmallText otherB" title="Inventory/Miscellaneous class, or Not Applicable/Not Evaluated result" style="width:20%">0</td> </tr> </table> </td> <td width="50%"> <table border="1"> <tr class="Title"> <td class="TitleLabel" colspan="5">OVAL Definition Generator Information</td> </tr> <tr class="DarkRow Center"> <td class="SmallLabel">Schema Version</td> <td class="SmallLabel">Product Name</td> <td class="SmallLabel">Product Version</td> <td class="SmallLabel">Date</td> <td class="SmallLabel">Time</td> </tr> <tr class="LightRow"> <td class="SmallText">5.10</td> <td class="SmallText">Red Hat OVAL Patch Definition Merger</td> <td class="SmallText">3</td> <td class="SmallText">2018-11-09</td> <td class="SmallText">14:08:13</td> </tr> <tr class="DarkRow Center"> <td class="SmallLabel" style="width: 20%;">#Definitions</td> <td class="SmallLabel" style="width: 20%;">#Tests</td> <td class="SmallLabel" style="width: 20%;">#Objects</td> <td class="SmallLabel" style="width: 20%;">#States</td> <td class="SmallLabel" style="width: 20%;">#Variables</td> </tr> <tr class="LightRow Center"> <td class="SmallText Center">701 Total<br /><table class="noborder"><tr class="Center"><td class="SmallText Classcompliance" title="compliance" style="width:20%">0</td><td class="SmallText Classinventory" title="inventory" style="width:20%">0</td><td class="SmallText Classmiscellaneous" title="miscellaneous" style="width:20%">0</td><td class="SmallText Classpatch" title="patch" style="width:20%">701</td><td class="SmallText Classvulnerability" title="vulnerability" style="width:20%">0</td></tr></table></td> <td class="SmallText Center">10025</td> <td class="SmallText Center">2003</td> <td class="SmallText Center">2248</td> <td class="SmallText Center">0</td> </tr> </table> </td> </tr> </table> <hr /> <a class="Hover" name="a_1" id="a_1" style="text-decoration:none;"></a> <table border="1"> <tr class="Title"> <td class="TitleLabel" colspan="2">System Information</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">Host Name</td> <td class="Text" width="80%">h0.labdroid.net</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">Operating System</td> <td class="Text" width="80%">Linux</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">Operating System Version</td> <td class="Text" width="80%">#1 SMP Thu Oct 4 20:48:51 UTC 2018</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">Architecture</td> <td class="Text" width="80%">x86_64</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">Interfaces</td> <td width="80%"> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">lo</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">127.0.0.1</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">00:00:00:00:00:00</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">enp0s25</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">192.168.1.2</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">54:EE:75:10:78:9A</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">docker0</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">172.17.0.1</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">02:42:22:1D:0F:24</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">tun0</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">10.128.0.1</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">8E:20:D3:C3:7A:6F</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">lo</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">::1</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">00:00:00:00:00:00</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">enp0s25</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::3cf9:d42f:8e38:959</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">54:EE:75:10:78:9A</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">vxlan_sys_4789</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::2477:bff:fe7b:6097</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">26:77:0B:7B:60:97</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">tun0</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::8c20:d3ff:fec3:7a6f</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">8E:20:D3:C3:7A:6F</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth55113e9b</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::5c29:18ff:fed4:131c</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">5E:29:18:D4:13:1C</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth346a0feb</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::2c29:bff:fee3:c2f7</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">2E:29:0B:E3:C2:F7</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth8f39b976</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::9441:cbff:fee7:50db</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">96:41:CB:E7:50:DB</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth9ed4d7e3</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::801f:b0ff:fe9a:f371</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">82:1F:B0:9A:F3:71</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">vethe5d572be</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::406b:54ff:fed1:3d12</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">42:6B:54:D1:3D:12</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">vethe4cd63ef</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::f47a:32ff:fe43:1b0</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">F6:7A:32:43:01:B0</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth6933ae50</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::4c18:39ff:fe4e:b651</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">4E:18:39:4E:B6:51</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth0869c1da</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::84c9:1bff:feb2:3b1c</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">86:C9:1B:B2:3B:1C</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth63608d9a</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::c8a7:c5ff:fee4:b6cc</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">CA:A7:C5:E4:B6:CC</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">vetha3286d0f</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::c811:6bff:fe96:3436</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">CA:11:6B:96:34:36</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">vetha8ed389e</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::1c21:a3ff:fe61:ee0d</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">1E:21:A3:61:EE:0D</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth05912159</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::863:60ff:fed2:e2c4</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">0A:63:60:D2:E2:C4</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">vethd1db64d2</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::20a6:86ff:fef9:6200</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">22:A6:86:F9:62:00</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth28f048a6</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::1464:14ff:fee4:b734</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">16:64:14:E4:B7:34</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth55b4df32</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::4808:c0ff:fe1c:b344</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">4A:08:C0:1C:B3:44</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth7a816eb9</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::b426:5aff:fe23:f9f7</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">B6:26:5A:23:F9:F7</td> </tr> </table> <table border="1"> <tr class="LightRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth0e3ee378</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::f4ac:28ff:fe78:af9e</td> </tr> <tr class="LightRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">F6:AC:28:78:AF:9E</td> </tr> </table> <table border="1"> <tr class="DarkRow"> <td class="Label" width="20%">Interface Name</td> <td class="Text" width="80%">veth941e9f86</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">IP Address</td> <td class="Text" width="80%">fe80::4055:2ff:fedf:c32b</td> </tr> <tr class="DarkRow"> <td class="Label" width="20%">MAC Address</td> <td class="Text" width="80%">42:55:02:DF:C3:2B</td> </tr> </table> </td> </tr> </table> <table border="1"> <tr class="Title"> <td class="TitleLabel" colspan="5">OVAL System Characteristics Generator Information</td> </tr> <tr class="DarkRow Center"> <td class="SmallLabel">Schema Version</td> <td class="SmallLabel">Product Name</td> <td class="SmallLabel">Product Version</td> <td class="SmallLabel">Date</td> <td class="SmallLabel">Time</td> </tr> <tr class="LightRow"> <td class="SmallText">5.10</td> <td class="SmallText">cpe:/a:open-scap:oscap</td> <td class="SmallText">3</td> <td class="SmallText">2018-11-26</td> <td class="SmallText">07:45:12</td> </tr> </table> <table border="1"> <tr class="Title"> <td class="TitleLabel" colspan="5">OVAL Definition Results</td> </tr> <tr class="DarkRow"> <td colspan="5"> <table class="noborder nomargin" style="width:auto;"> <tr> <td> <table border="1"> <tr class="LightRow"> <td class="resultbadA ColorBox"></td> <td class="resultbadB ColorBox"></td> <td class="Text" title="Non-Compliant/Vulnerable/Unpatched">✕</td> </tr> </table> </td> <td> <table border="1"> <tr class="LightRow"> <td class="resultgoodA ColorBox"></td> <td class="resultgoodB ColorBox"></td> <td class="Text" title="Compliant/Non-Vulnerable/Patched">✓</td> </tr> </table> </td> <td> <table border="1"> <tr class="LightRow"> <td class="errorA ColorBox"></td> <td class="errorB ColorBox"></td> <td class="Text">Error</td> </tr> </table> </td> <td> <table border="1"> <tr class="LightRow"> <td class="unknownA ColorBox"></td> <td class="unknownB ColorBox"></td> <td class="Text">Unknown</td> </tr> </table> </td> <td> <table border="1"> <tr class="LightRow"> <td class="DarkRow ColorBox"></td> <td class="LightRow ColorBox"></td> <td class="Text" title="Inventory/Miscellaneous class, or Not Applicable/Not Evaluated result">Other</td> </tr> </table> </td> </tr> </table> </td> </tr> <tr class="TitleLabel"> <td class="Title" align="center">ID</td> <td class="Title" align="center">Result</td> <td class="Title" align="center">Class</td> <td class="Title" align="center">Reference ID</td> <td class="Title" align="center">Title</td> </tr> <tr class="resultbadA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183083</td> <td class="Text" align="center">true</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3083">RHSA-2018:3083-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8830">CVE-2015-8830</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4913">CVE-2016-4913</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0861">CVE-2017-0861</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10661">CVE-2017-10661</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17805">CVE-2017-17805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18208">CVE-2017-18208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18232">CVE-2017-18232</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18344">CVE-2017-18344</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1092">CVE-2018-1092</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1094">CVE-2018-1094</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1118">CVE-2018-1118</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1120">CVE-2018-1120</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1130">CVE-2018-1130</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5344">CVE-2018-5344</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5391">CVE-2018-5391</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5803">CVE-2018-5803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5848">CVE-2018-5848</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7740">CVE-2018-7740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7757">CVE-2018-7757</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8781">CVE-2018-8781</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10322">CVE-2018-10322</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10878">CVE-2018-10878</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10879">CVE-2018-10879</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10881">CVE-2018-10881</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10883">CVE-2018-10883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10902">CVE-2018-10902</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10940">CVE-2018-10940</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-13405">CVE-2018-13405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000026">CVE-2018-1000026</a>]</td> <td class="Text">RHSA-2018:3083: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultbadB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182748</td> <td class="Text" align="center">true</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2748">RHSA-2018:2748-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14634">CVE-2018-14634</a>]</td> <td class="Text">RHSA-2018:2748: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183532</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3532">RHSA-2018:3532-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12389">CVE-2018-12389</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12390">CVE-2018-12390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12392">CVE-2018-12392</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12393">CVE-2018-12393</a>]</td> <td class="Text">RHSA-2018:3532: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183521</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3521">RHSA-2018:3521-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3136">CVE-2018-3136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3139">CVE-2018-3139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3149">CVE-2018-3149</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3150">CVE-2018-3150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3169">CVE-2018-3169</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3180">CVE-2018-3180</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3183">CVE-2018-3183</a>]</td> <td class="Text">RHSA-2018:3521: java-11-openjdk security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183458</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3458">RHSA-2018:3458-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16541">CVE-2017-16541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12376">CVE-2018-12376</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12377">CVE-2018-12377</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12378">CVE-2018-12378</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12379">CVE-2018-12379</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12383">CVE-2018-12383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12385">CVE-2018-12385</a>]</td> <td class="Text">RHSA-2018:3458: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183410</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3410">RHSA-2018:3410-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14665">CVE-2018-14665</a>]</td> <td class="Text">RHSA-2018:3410: xorg-x11-server security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183408</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3408">RHSA-2018:3408-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-17456">CVE-2018-17456</a>]</td> <td class="Text">RHSA-2018:3408: git security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183350</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3350">RHSA-2018:3350-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3136">CVE-2018-3136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3139">CVE-2018-3139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3149">CVE-2018-3149</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3169">CVE-2018-3169</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3180">CVE-2018-3180</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3214">CVE-2018-3214</a>]</td> <td class="Text">RHSA-2018:3350: java-1.7.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183347</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3347">RHSA-2018:3347-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000805">CVE-2018-1000805</a>]</td> <td class="Text">RHSA-2018:3347: python-paramiko security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183335</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3335">RHSA-2018:3335-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4463">CVE-2016-4463</a>]</td> <td class="Text">RHSA-2018:3335: xerces-c security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183327</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3327">RHSA-2018:3327-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14679">CVE-2018-14679</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14680">CVE-2018-14680</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14681">CVE-2018-14681</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14682">CVE-2018-14682</a>]</td> <td class="Text">RHSA-2018:3327: libmspack security update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183324</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3324">RHSA-2018:3324-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10906">CVE-2018-10906</a>]</td> <td class="Text">RHSA-2018:3324: fuse security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183253</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3253">RHSA-2018:3253-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9396">CVE-2016-9396</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000050">CVE-2017-1000050</a>]</td> <td class="Text">RHSA-2018:3253: jasper security update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183249</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3249">RHSA-2018:3249-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1113">CVE-2018-1113</a>]</td> <td class="Text">RHSA-2018:3249: setup security and bug fix update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183246</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3246">RHSA-2018:3246-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18198">CVE-2017-18198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18199">CVE-2017-18199</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18201">CVE-2017-18201</a>]</td> <td class="Text">RHSA-2018:3246: libcdio security update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183242</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3242">RHSA-2018:3242-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10911">CVE-2018-10911</a>]</td> <td class="Text">RHSA-2018:3242: glusterfs security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183229</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3229">RHSA-2018:3229-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7725">CVE-2018-7725</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7726">CVE-2018-7726</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7727">CVE-2018-7727</a>]</td> <td class="Text">RHSA-2018:3229: zziplib security update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183221</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3221">RHSA-2018:3221-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3735">CVE-2017-3735</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0495">CVE-2018-0495</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0732">CVE-2018-0732</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0737">CVE-2018-0737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0739">CVE-2018-0739</a>]</td> <td class="Text">RHSA-2018:3221: openssl security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183158</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3158">RHSA-2018:3158-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10852">CVE-2018-10852</a>]</td> <td class="Text">RHSA-2018:3158: sssd security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183157</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3157">RHSA-2018:3157-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000007">CVE-2018-1000007</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000120">CVE-2018-1000120</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000121">CVE-2018-1000121</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000122">CVE-2018-1000122</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000301">CVE-2018-1000301</a>]</td> <td class="Text">RHSA-2018:3157: curl and nss-pem security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183140</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3140">RHSA-2018:3140-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18267">CVE-2017-18267</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10733">CVE-2018-10733</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10767">CVE-2018-10767</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10768">CVE-2018-10768</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12910">CVE-2018-12910</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-13988">CVE-2018-13988</a>]</td> <td class="Text">RHSA-2018:3140: GNOME security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183127</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3127">RHSA-2018:3127-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14648">CVE-2018-14648</a>]</td> <td class="Text">RHSA-2018:3127: 389-ds-base security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183113</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3113">RHSA-2018:3113-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6764">CVE-2018-6764</a>]</td> <td class="Text">RHSA-2018:3113: libvirt security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183107</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3107">RHSA-2018:3107-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14526">CVE-2018-14526</a>]</td> <td class="Text">RHSA-2018:3107: wpa_supplicant security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183096</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3096">RHSA-2018:3096-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8830">CVE-2015-8830</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4913">CVE-2016-4913</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0861">CVE-2017-0861</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10661">CVE-2017-10661</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17805">CVE-2017-17805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18208">CVE-2017-18208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18232">CVE-2017-18232</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18344">CVE-2017-18344</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1092">CVE-2018-1092</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1094">CVE-2018-1094</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1118">CVE-2018-1118</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1120">CVE-2018-1120</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1130">CVE-2018-1130</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5344">CVE-2018-5344</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5391">CVE-2018-5391</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5803">CVE-2018-5803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5848">CVE-2018-5848</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7740">CVE-2018-7740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7757">CVE-2018-7757</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8781">CVE-2018-8781</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10322">CVE-2018-10322</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10878">CVE-2018-10878</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10879">CVE-2018-10879</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10881">CVE-2018-10881</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10883">CVE-2018-10883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10902">CVE-2018-10902</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10940">CVE-2018-10940</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-13405">CVE-2018-13405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000026">CVE-2018-1000026</a>]</td> <td class="Text">RHSA-2018:3096: kernel-rt security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183092</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3092">RHSA-2018:3092-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16997">CVE-2017-16997</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6485">CVE-2018-6485</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11236">CVE-2018-11236</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11237">CVE-2018-11237</a>]</td> <td class="Text">RHSA-2018:3092: glibc security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183090</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3090">RHSA-2018:3090-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0739">CVE-2018-0739</a>]</td> <td class="Text">RHSA-2018:3090: ovmf security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183073</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3073">RHSA-2018:3073-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-10071">CVE-2014-10071</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-10072">CVE-2014-10072</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18205">CVE-2017-18205</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18206">CVE-2017-18206</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1071">CVE-2018-1071</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1083">CVE-2018-1083</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1100">CVE-2018-1100</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7549">CVE-2018-7549</a>]</td> <td class="Text">RHSA-2018:3073: zsh security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183071</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3071">RHSA-2018:3071-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5729">CVE-2018-5729</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5730">CVE-2018-5730</a>]</td> <td class="Text">RHSA-2018:3071: krb5 security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183065</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3065">RHSA-2018:3065-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5800">CVE-2018-5800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5801">CVE-2018-5801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5802">CVE-2018-5802</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5805">CVE-2018-5805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5806">CVE-2018-5806</a>]</td> <td class="Text">RHSA-2018:3065: libkdcraw security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183062</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3062">RHSA-2018:3062-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15124">CVE-2017-15124</a>]</td> <td class="Text">RHSA-2018:3062: qemu-kvm-ma security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183059</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3059">RHSA-2018:3059-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-9262">CVE-2015-9262</a>]</td> <td class="Text">RHSA-2018:3059: X.org X11 security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183056</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3056">RHSA-2018:3056-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1050">CVE-2018-1050</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1139">CVE-2018-1139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10858">CVE-2018-10858</a>]</td> <td class="Text">RHSA-2018:3056: samba security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183054</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3054">RHSA-2018:3054-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10119">CVE-2018-10119</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10120">CVE-2018-10120</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10583">CVE-2018-10583</a>]</td> <td class="Text">RHSA-2018:3054: libreoffice security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183052</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3052">RHSA-2018:3052-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0494">CVE-2018-0494</a>]</td> <td class="Text">RHSA-2018:3052: wget security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183050</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3050">RHSA-2018:3050-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10844">CVE-2018-10844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10845">CVE-2018-10845</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10846">CVE-2018-10846</a>]</td> <td class="Text">RHSA-2018:3050: gnutls security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183041</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3041">RHSA-2018:3041-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1060">CVE-2018-1060</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1061">CVE-2018-1061</a>]</td> <td class="Text">RHSA-2018:3041: python security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183032</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3032">RHSA-2018:3032-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7208">CVE-2018-7208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7568">CVE-2018-7568</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7569">CVE-2018-7569</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7642">CVE-2018-7642</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7643">CVE-2018-7643</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8945">CVE-2018-8945</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10372">CVE-2018-10372</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10373">CVE-2018-10373</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10534">CVE-2018-10534</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10535">CVE-2018-10535</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-13033">CVE-2018-13033</a>]</td> <td class="Text">RHSA-2018:3032: binutils security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20183005</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3005">RHSA-2018:3005-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12389">CVE-2018-12389</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12390">CVE-2018-12390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12392">CVE-2018-12392</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12393">CVE-2018-12393</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12395">CVE-2018-12395</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12396">CVE-2018-12396</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12397">CVE-2018-12397</a>]</td> <td class="Text">RHSA-2018:3005: firefox security and bug fix update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182942</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2942">RHSA-2018:2942-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3136">CVE-2018-3136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3139">CVE-2018-3139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3149">CVE-2018-3149</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3169">CVE-2018-3169</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3180">CVE-2018-3180</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3183">CVE-2018-3183</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3214">CVE-2018-3214</a>]</td> <td class="Text">RHSA-2018:2942: java-1.8.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182921</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2921">RHSA-2018:2921-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1336">CVE-2018-1336</a>]</td> <td class="Text">RHSA-2018:2921: tomcat security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182918</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2918">RHSA-2018:2918-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10194">CVE-2018-10194</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-15910">CVE-2018-15910</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-16509">CVE-2018-16509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-16542">CVE-2018-16542</a>]</td> <td class="Text">RHSA-2018:2918: ghostscript security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182916</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2916">RHSA-2018:2916-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15705">CVE-2017-15705</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11781">CVE-2018-11781</a>]</td> <td class="Text">RHSA-2018:2916: spamassassin security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182884</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2884">RHSA-2018:2884-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12386">CVE-2018-12386</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12387">CVE-2018-12387</a>]</td> <td class="Text">RHSA-2018:2884: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182835</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2835">RHSA-2018:2835-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12383">CVE-2018-12383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12385">CVE-2018-12385</a>]</td> <td class="Text">RHSA-2018:2835: firefox security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182768</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2768">RHSA-2018:2768-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12384">CVE-2018-12384</a>]</td> <td class="Text">RHSA-2018:2768: nss security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182766</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2766">RHSA-2018:2766-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6560">CVE-2018-6560</a>]</td> <td class="Text">RHSA-2018:2766: flatpak security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182763</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2763">RHSA-2018:2763-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14634">CVE-2018-14634</a>]</td> <td class="Text">RHSA-2018:2763: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182762</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2762">RHSA-2018:2762-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11806">CVE-2018-11806</a>]</td> <td class="Text">RHSA-2018:2762: qemu-kvm-ma security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182757</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2757">RHSA-2018:2757-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10850">CVE-2018-10850</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10935">CVE-2018-10935</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14624">CVE-2018-14624</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14638">CVE-2018-14638</a>]</td> <td class="Text">RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182731</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2731">RHSA-2018:2731-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10873">CVE-2018-10873</a>]</td> <td class="Text">RHSA-2018:2731: spice and spice-gtk security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182692</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2692">RHSA-2018:2692-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16541">CVE-2017-16541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12376">CVE-2018-12376</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12377">CVE-2018-12377</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12378">CVE-2018-12378</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12379">CVE-2018-12379</a>]</td> <td class="Text">RHSA-2018:2692: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182570</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2570">RHSA-2018:2570-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5740">CVE-2018-5740</a>]</td> <td class="Text">RHSA-2018:2570: bind security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182557</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2557">RHSA-2018:2557-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10915">CVE-2018-10915</a>]</td> <td class="Text">RHSA-2018:2557: postgresql security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182526</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2526">RHSA-2018:2526-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14354">CVE-2018-14354</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14357">CVE-2018-14357</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14362">CVE-2018-14362</a>]</td> <td class="Text">RHSA-2018:2526: mutt security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182462</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2462">RHSA-2018:2462-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7550">CVE-2018-7550</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11806">CVE-2018-11806</a>]</td> <td class="Text">RHSA-2018:2462: qemu-kvm security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182439</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2439">RHSA-2018:2439-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3636">CVE-2017-3636</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3641">CVE-2017-3641</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3651">CVE-2017-3651</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3653">CVE-2017-3653</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10268">CVE-2017-10268</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10378">CVE-2017-10378</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10379">CVE-2017-10379</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10384">CVE-2017-10384</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2562">CVE-2018-2562</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2622">CVE-2018-2622</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2640">CVE-2018-2640</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2665">CVE-2018-2665</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2668">CVE-2018-2668</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2755">CVE-2018-2755</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2761">CVE-2018-2761</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2767">CVE-2018-2767</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2771">CVE-2018-2771</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2781">CVE-2018-2781</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2813">CVE-2018-2813</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2817">CVE-2018-2817</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2819">CVE-2018-2819</a>]</td> <td class="Text">RHSA-2018:2439: mariadb security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182395</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2395">RHSA-2018:2395-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13215">CVE-2017-13215</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3620">CVE-2018-3620</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3646">CVE-2018-3646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3693">CVE-2018-3693</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5390">CVE-2018-5390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7566">CVE-2018-7566</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10675">CVE-2018-10675</a>]</td> <td class="Text">RHSA-2018:2395: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182384</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2384">RHSA-2018:2384-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13215">CVE-2017-13215</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3620">CVE-2018-3620</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3646">CVE-2018-3646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3693">CVE-2018-3693</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5390">CVE-2018-5390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7566">CVE-2018-7566</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10675">CVE-2018-10675</a>]</td> <td class="Text">RHSA-2018:2384: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182286</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2286">RHSA-2018:2286-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2952">CVE-2018-2952</a>]</td> <td class="Text">RHSA-2018:2286: java-1.7.0-openjdk security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182285</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2285">RHSA-2018:2285-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10897">CVE-2018-10897</a>]</td> <td class="Text">RHSA-2018:2285: yum-utils security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182252</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2252">RHSA-2018:2252-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5188">CVE-2018-5188</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12359">CVE-2018-12359</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12360">CVE-2018-12360</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12362">CVE-2018-12362</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12363">CVE-2018-12363</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12364">CVE-2018-12364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12365">CVE-2018-12365</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12366">CVE-2018-12366</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12372">CVE-2018-12372</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12373">CVE-2018-12373</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12374">CVE-2018-12374</a>]</td> <td class="Text">RHSA-2018:2252: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182242</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2242">RHSA-2018:2242-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2952">CVE-2018-2952</a>]</td> <td class="Text">RHSA-2018:2242: java-1.8.0-openjdk security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182240</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2240">RHSA-2018:2240-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17833">CVE-2017-17833</a>]</td> <td class="Text">RHSA-2018:2240: openslp security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182181</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2181">RHSA-2018:2181-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12020">CVE-2018-12020</a>]</td> <td class="Text">RHSA-2018:2181: gnupg2 security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182123</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2123">RHSA-2018:2123-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2183">CVE-2016-2183</a>]</td> <td class="Text">RHSA-2018:2123: python security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182113</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2113">RHSA-2018:2113-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7762">CVE-2017-7762</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5156">CVE-2018-5156</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5188">CVE-2018-5188</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6126">CVE-2018-6126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12359">CVE-2018-12359</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12360">CVE-2018-12360</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12362">CVE-2018-12362</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12363">CVE-2018-12363</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12364">CVE-2018-12364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12365">CVE-2018-12365</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12366">CVE-2018-12366</a>]</td> <td class="Text">RHSA-2018:2113: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182003</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2003">RHSA-2018:2003-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11600">CVE-2017-11600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td> <td class="Text">RHSA-2018:2003: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20182001</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2001">RHSA-2018:2001-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td> <td class="Text">RHSA-2018:2001: qemu-kvm security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181997</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1997">RHSA-2018:1997-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td> <td class="Text">RHSA-2018:1997: libvirt security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181979</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1979">RHSA-2018:1979-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1080">CVE-2018-1080</a>]</td> <td class="Text">RHSA-2018:1979: pki-core security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181965</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1965">RHSA-2018:1965-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11600">CVE-2017-11600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td> <td class="Text">RHSA-2018:1965: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181957</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1957">RHSA-2018:1957-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11235">CVE-2018-11235</a>]</td> <td class="Text">RHSA-2018:1957: git security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181944</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1944">RHSA-2018:1944-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3665">CVE-2018-3665</a>]</td> <td class="Text">RHSA-2018:1944: kernel-rt security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181852</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1852">RHSA-2018:1852-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3665">CVE-2018-3665</a>]</td> <td class="Text">RHSA-2018:1852: kernel security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181836</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1836">RHSA-2018:1836-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1002200">CVE-2018-1002200</a>]</td> <td class="Text">RHSA-2018:1836: plexus-archiver security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181780</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1780">RHSA-2018:1780-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5003">CVE-2016-5003</a>]</td> <td class="Text">RHSA-2018:1780: xmlrpc security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181725</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1725">RHSA-2018:1725-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5150">CVE-2018-5150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5154">CVE-2018-5154</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5155">CVE-2018-5155</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5159">CVE-2018-5159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5161">CVE-2018-5161</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5162">CVE-2018-5162</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5168">CVE-2018-5168</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5170">CVE-2018-5170</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5178">CVE-2018-5178</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5183">CVE-2018-5183</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5184">CVE-2018-5184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5185">CVE-2018-5185</a>]</td> <td class="Text">RHSA-2018:1725: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181700</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1700">RHSA-2018:1700-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1124">CVE-2018-1124</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1126">CVE-2018-1126</a>]</td> <td class="Text">RHSA-2018:1700: procps-ng security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181649</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1649">RHSA-2018:1649-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td> <td class="Text">RHSA-2018:1649: java-1.8.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181648</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1648">RHSA-2018:1648-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td> <td class="Text">RHSA-2018:1648: java-1.7.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181633</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1633">RHSA-2018:1633-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td> <td class="Text">RHSA-2018:1633: qemu-kvm security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181632</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1632">RHSA-2018:1632-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td> <td class="Text">RHSA-2018:1632: libvirt security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181630</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1630">RHSA-2018:1630-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td> <td class="Text">RHSA-2018:1630: kernel-rt security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181629</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1629">RHSA-2018:1629-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td> <td class="Text">RHSA-2018:1629: kernel security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181453</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1453">RHSA-2018:1453-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1111">CVE-2018-1111</a>]</td> <td class="Text">RHSA-2018:1453: dhcp security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181416</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1416">RHSA-2018:1416-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7858">CVE-2018-7858</a>]</td> <td class="Text">RHSA-2018:1416: qemu-kvm security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181415</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1415">RHSA-2018:1415-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5150">CVE-2018-5150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5154">CVE-2018-5154</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5155">CVE-2018-5155</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5157">CVE-2018-5157</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5158">CVE-2018-5158</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5159">CVE-2018-5159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5168">CVE-2018-5168</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5178">CVE-2018-5178</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5183">CVE-2018-5183</a>]</td> <td class="Text">RHSA-2018:1415: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181396</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1396">RHSA-2018:1396-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1064">CVE-2018-1064</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5748">CVE-2018-5748</a>]</td> <td class="Text">RHSA-2018:1396: libvirt security and bug fix update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181380</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1380">RHSA-2018:1380-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1089">CVE-2018-1089</a>]</td> <td class="Text">RHSA-2018:1380: 389-ds-base security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181355</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1355">RHSA-2018:1355-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16939">CVE-2017-16939</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1068">CVE-2018-1068</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1087">CVE-2018-1087</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8897">CVE-2018-8897</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000199">CVE-2018-1000199</a>]</td> <td class="Text">RHSA-2018:1355: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181318</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1318">RHSA-2018:1318-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16939">CVE-2017-16939</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1068">CVE-2018-1068</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1087">CVE-2018-1087</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1091">CVE-2018-1091</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8897">CVE-2018-8897</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000199">CVE-2018-1000199</a>]</td> <td class="Text">RHSA-2018:1318: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181278</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1278">RHSA-2018:1278-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2790">CVE-2018-2790</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2794">CVE-2018-2794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2795">CVE-2018-2795</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2796">CVE-2018-2796</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2797">CVE-2018-2797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2798">CVE-2018-2798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2799">CVE-2018-2799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2800">CVE-2018-2800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2814">CVE-2018-2814</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2815">CVE-2018-2815</a>]</td> <td class="Text">RHSA-2018:1278: java-1.7.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181224</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1224">RHSA-2018:1224-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1106">CVE-2018-1106</a>]</td> <td class="Text">RHSA-2018:1224: PackageKit security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181223</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1223">RHSA-2018:1223-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000140">CVE-2018-1000140</a>]</td> <td class="Text">RHSA-2018:1223: librelp security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181200</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1200">RHSA-2018:1200-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000156">CVE-2018-1000156</a>]</td> <td class="Text">RHSA-2018:1200: patch security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181191</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1191">RHSA-2018:1191-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2790">CVE-2018-2790</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2794">CVE-2018-2794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2795">CVE-2018-2795</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2796">CVE-2018-2796</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2797">CVE-2018-2797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2798">CVE-2018-2798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2799">CVE-2018-2799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2800">CVE-2018-2800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2814">CVE-2018-2814</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2815">CVE-2018-2815</a>]</td> <td class="Text">RHSA-2018:1191: java-1.8.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181169</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1169">RHSA-2018:1169-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1084">CVE-2018-1084</a>]</td> <td class="Text">RHSA-2018:1169: corosync security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181099</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1099">RHSA-2018:1099-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5148">CVE-2018-5148</a>]</td> <td class="Text">RHSA-2018:1099: firefox security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181062</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1062">RHSA-2018:1062-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3672">CVE-2016-3672</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7913">CVE-2016-7913</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8633">CVE-2016-8633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7294">CVE-2017-7294</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8824">CVE-2017-8824</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9725">CVE-2017-9725</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12154">CVE-2017-12154</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12190">CVE-2017-12190</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13166">CVE-2017-13166</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13305">CVE-2017-13305</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14140">CVE-2017-14140</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15116">CVE-2017-15116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15121">CVE-2017-15121</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15126">CVE-2017-15126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15127">CVE-2017-15127</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15129">CVE-2017-15129</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15265">CVE-2017-15265</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15274">CVE-2017-15274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17448">CVE-2017-17448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17449">CVE-2017-17449</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17558">CVE-2017-17558</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18017">CVE-2017-18017</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18203">CVE-2017-18203</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18270">CVE-2017-18270</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000252">CVE-2017-1000252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000407">CVE-2017-1000407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000410">CVE-2017-1000410</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5750">CVE-2018-5750</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6927">CVE-2018-6927</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000004">CVE-2018-1000004</a>]</td> <td class="Text">RHSA-2018:1062: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181060</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1060">RHSA-2018:1060-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1079">CVE-2018-1079</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1086">CVE-2018-1086</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000119">CVE-2018-1000119</a>]</td> <td class="Text">RHSA-2018:1060: pcs security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181058</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1058">RHSA-2018:1058-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5146">CVE-2018-5146</a>]</td> <td class="Text">RHSA-2018:1058: libvorbis security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20181055</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1055">RHSA-2018:1055-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7225">CVE-2018-7225</a>]</td> <td class="Text">RHSA-2018:1055: libvncserver security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180998</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0998">RHSA-2018:0998-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3736">CVE-2017-3736</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3737">CVE-2017-3737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3738">CVE-2017-3738</a>]</td> <td class="Text">RHSA-2018:0998: openssl security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180980</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0980">RHSA-2018:0980-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15906">CVE-2017-15906</a>]</td> <td class="Text">RHSA-2018:0980: openssh security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180913</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0913">RHSA-2018:0913-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1063">CVE-2018-1063</a>]</td> <td class="Text">RHSA-2018:0913: policycoreutils security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180878</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0878">RHSA-2018:0878-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15041">CVE-2017-15041</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15042">CVE-2017-15042</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6574">CVE-2018-6574</a>]</td> <td class="Text">RHSA-2018:0878: golang security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180855</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0855">RHSA-2018:0855-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6462">CVE-2017-6462</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6463">CVE-2017-6463</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6464">CVE-2017-6464</a>]</td> <td class="Text">RHSA-2018:0855: ntp security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180849</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0849">RHSA-2018:0849-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11671">CVE-2017-11671</a>]</td> <td class="Text">RHSA-2018:0849: gcc security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180842</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0842">RHSA-2018:0842-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15131">CVE-2017-15131</a>]</td> <td class="Text">RHSA-2018:0842: xdg-user-dirs security and bug fix update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180816</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0816">RHSA-2018:0816-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13672">CVE-2017-13672</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13711">CVE-2017-13711</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15124">CVE-2017-15124</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15268">CVE-2017-15268</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5683">CVE-2018-5683</a>]</td> <td class="Text">RHSA-2018:0816: qemu-kvm security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180805</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0805">RHSA-2018:0805-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9402">CVE-2014-9402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5180">CVE-2015-5180</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12132">CVE-2017-12132</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15670">CVE-2017-15670</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15804">CVE-2017-15804</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000001">CVE-2018-1000001</a>]</td> <td class="Text">RHSA-2018:0805: glibc security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180676</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0676">RHSA-2018:0676-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3672">CVE-2016-3672</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7913">CVE-2016-7913</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8633">CVE-2016-8633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7294">CVE-2017-7294</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8824">CVE-2017-8824</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9725">CVE-2017-9725</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12154">CVE-2017-12154</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12190">CVE-2017-12190</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13166">CVE-2017-13166</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13305">CVE-2017-13305</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14140">CVE-2017-14140</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15116">CVE-2017-15116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15121">CVE-2017-15121</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15126">CVE-2017-15126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15127">CVE-2017-15127</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15129">CVE-2017-15129</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15265">CVE-2017-15265</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15274">CVE-2017-15274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17448">CVE-2017-17448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17449">CVE-2017-17449</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17558">CVE-2017-17558</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18017">CVE-2017-18017</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18203">CVE-2017-18203</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000252">CVE-2017-1000252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000407">CVE-2017-1000407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000410">CVE-2017-1000410</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5750">CVE-2018-5750</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6927">CVE-2018-6927</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000004">CVE-2018-1000004</a>]</td> <td class="Text">RHSA-2018:0676: kernel-rt security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180666</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0666">RHSA-2018:0666-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7562">CVE-2017-7562</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11368">CVE-2017-11368</a>]</td> <td class="Text">RHSA-2018:0666: krb5 security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180648</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0648">RHSA-2018:0648-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5125">CVE-2018-5125</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5127">CVE-2018-5127</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5129">CVE-2018-5129</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5144">CVE-2018-5144</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5145">CVE-2018-5145</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5146">CVE-2018-5146</a>]</td> <td class="Text">RHSA-2018:0648: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180592</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0592">RHSA-2018:0592-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8088">CVE-2018-8088</a>]</td> <td class="Text">RHSA-2018:0592: slf4j security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180549</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0549">RHSA-2018:0549-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5146">CVE-2018-5146</a>]</td> <td class="Text">RHSA-2018:0549: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180527</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0527">RHSA-2018:0527-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5125">CVE-2018-5125</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5127">CVE-2018-5127</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5129">CVE-2018-5129</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5130">CVE-2018-5130</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5131">CVE-2018-5131</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5144">CVE-2018-5144</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5145">CVE-2018-5145</a>]</td> <td class="Text">RHSA-2018:0527: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180505</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0505">RHSA-2018:0505-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5950">CVE-2018-5950</a>]</td> <td class="Text">RHSA-2018:0505: mailman security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180483</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0483">RHSA-2018:0483-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5732">CVE-2018-5732</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5733">CVE-2018-5733</a>]</td> <td class="Text">RHSA-2018:0483: dhcp security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180418</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0418">RHSA-2018:0418-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6871">CVE-2018-6871</a>]</td> <td class="Text">RHSA-2018:0418: libreoffice security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180414</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0414">RHSA-2018:0414-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15135">CVE-2017-15135</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1054">CVE-2018-1054</a>]</td> <td class="Text">RHSA-2018:0414: 389-ds-base security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180412</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0412">RHSA-2018:0412-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7518">CVE-2017-7518</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12188">CVE-2017-12188</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18270">CVE-2017-18270</a>]</td> <td class="Text">RHSA-2018:0412: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180406</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0406">RHSA-2018:0406-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7890">CVE-2017-7890</a>]</td> <td class="Text">RHSA-2018:0406: php security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180395</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0395">RHSA-2018:0395-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7518">CVE-2017-7518</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12188">CVE-2017-12188</a>]</td> <td class="Text">RHSA-2018:0395: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180378</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0378">RHSA-2018:0378-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0898">CVE-2017-0898</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0899">CVE-2017-0899</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0900">CVE-2017-0900</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0901">CVE-2017-0901</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0902">CVE-2017-0902</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0903">CVE-2017-0903</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10784">CVE-2017-10784</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14033">CVE-2017-14033</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14064">CVE-2017-14064</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17405">CVE-2017-17405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17790">CVE-2017-17790</a>]</td> <td class="Text">RHSA-2018:0378: ruby security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180377</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0377">RHSA-2018:0377-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5379">CVE-2018-5379</a>]</td> <td class="Text">RHSA-2018:0377: quagga security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180350</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0350">RHSA-2018:0350-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5345">CVE-2018-5345</a>]</td> <td class="Text">RHSA-2018:0350: gcab security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180349</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0349">RHSA-2018:0349-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2579">CVE-2018-2579</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2588">CVE-2018-2588</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2599">CVE-2018-2599</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2602">CVE-2018-2602</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2603">CVE-2018-2603</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2618">CVE-2018-2618</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2629">CVE-2018-2629</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2633">CVE-2018-2633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2634">CVE-2018-2634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2637">CVE-2018-2637</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2641">CVE-2018-2641</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2663">CVE-2018-2663</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2677">CVE-2018-2677</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2678">CVE-2018-2678</a>]</td> <td class="Text">RHSA-2018:0349: java-1.7.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180262</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0262">RHSA-2018:0262-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5089">CVE-2018-5089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5095">CVE-2018-5095</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5096">CVE-2018-5096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5097">CVE-2018-5097</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5098">CVE-2018-5098</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5099">CVE-2018-5099</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5102">CVE-2018-5102</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5103">CVE-2018-5103</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5104">CVE-2018-5104</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5117">CVE-2018-5117</a>]</td> <td class="Text">RHSA-2018:0262: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180260</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0260">RHSA-2018:0260-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1049">CVE-2018-1049</a>]</td> <td class="Text">RHSA-2018:0260: systemd security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180223</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0223">RHSA-2018:0223-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14604">CVE-2017-14604</a>]</td> <td class="Text">RHSA-2018:0223: nautilus security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180163</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0163">RHSA-2018:0163-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15134">CVE-2017-15134</a>]</td> <td class="Text">RHSA-2018:0163: 389-ds-base security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180158</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0158">RHSA-2018:0158-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3144">CVE-2017-3144</a>]</td> <td class="Text">RHSA-2018:0158: dhcp security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180152</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0152">RHSA-2018:0152-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8539">CVE-2015-8539</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7472">CVE-2017-7472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12192">CVE-2017-12192</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12193">CVE-2017-12193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15649">CVE-2017-15649</a>]</td> <td class="Text">RHSA-2018:0152: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180151</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0151">RHSA-2018:0151-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8539">CVE-2015-8539</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7472">CVE-2017-7472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12192">CVE-2017-12192</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12193">CVE-2017-12193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15649">CVE-2017-15649</a>]</td> <td class="Text">RHSA-2018:0151: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180122</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0122">RHSA-2018:0122-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5089">CVE-2018-5089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5091">CVE-2018-5091</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5095">CVE-2018-5095</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5096">CVE-2018-5096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5097">CVE-2018-5097</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5098">CVE-2018-5098</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5099">CVE-2018-5099</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5102">CVE-2018-5102</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5103">CVE-2018-5103</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5104">CVE-2018-5104</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5117">CVE-2018-5117</a>]</td> <td class="Text">RHSA-2018:0122: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180102</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0102">RHSA-2018:0102-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3145">CVE-2017-3145</a>]</td> <td class="Text">RHSA-2018:0102: bind security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180095</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0095">RHSA-2018:0095-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2579">CVE-2018-2579</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2582">CVE-2018-2582</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2588">CVE-2018-2588</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2599">CVE-2018-2599</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2602">CVE-2018-2602</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2603">CVE-2018-2603</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2618">CVE-2018-2618</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2629">CVE-2018-2629</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2633">CVE-2018-2633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2634">CVE-2018-2634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2637">CVE-2018-2637</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2641">CVE-2018-2641</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2663">CVE-2018-2663</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2677">CVE-2018-2677</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2678">CVE-2018-2678</a>]</td> <td class="Text">RHSA-2018:0095: java-1.8.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180094</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0094">RHSA-2018:0094-01</a>]</td> <td class="Text">RHSA-2018:0094: linux-firmware security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180093</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0093">RHSA-2018:0093-01</a>]</td> <td class="Text">RHSA-2018:0093: microcode_ctl security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180061</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0061">RHSA-2018:0061-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7829">CVE-2017-7829</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7846">CVE-2017-7846</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7847">CVE-2017-7847</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7848">CVE-2017-7848</a>]</td> <td class="Text">RHSA-2018:0061: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180029</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0029">RHSA-2018:0029-03</a>]</td> <td class="Text">RHSA-2018:0029: libvirt security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180023</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0023">RHSA-2018:0023-01</a>]</td> <td class="Text">RHSA-2018:0023: qemu-kvm security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180016</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0016">RHSA-2018:0016-01</a>]</td> <td class="Text">RHSA-2018:0016: kernel-rt security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180014</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0014">RHSA-2018:0014-01</a>]</td> <td class="Text">RHSA-2018:0014: linux-firmware security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180012</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0012">RHSA-2018:0012-01</a>]</td> <td class="Text">RHSA-2018:0012: microcode_ctl security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20180007</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0007">RHSA-2018:0007-01</a>]</td> <td class="Text">RHSA-2018:0007: kernel security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173402</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3402">RHSA-2017:3402-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12172">CVE-2017-12172</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15097">CVE-2017-15097</a>]</td> <td class="Text">RHSA-2017:3402: postgresql security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173392</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3392">RHSA-2017:3392-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10193">CVE-2017-10193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10198">CVE-2017-10198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10274">CVE-2017-10274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10281">CVE-2017-10281</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10285">CVE-2017-10285</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10295">CVE-2017-10295</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10345">CVE-2017-10345</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10346">CVE-2017-10346</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10347">CVE-2017-10347</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10348">CVE-2017-10348</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10349">CVE-2017-10349</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10350">CVE-2017-10350</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10355">CVE-2017-10355</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10356">CVE-2017-10356</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10357">CVE-2017-10357</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10388">CVE-2017-10388</a>]</td> <td class="Text">RHSA-2017:3392: java-1.7.0-openjdk security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173384</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3384">RHSA-2017:3384-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15101">CVE-2017-15101</a>]</td> <td class="Text">RHSA-2017:3384: liblouis security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173382</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3382">RHSA-2017:3382-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7843">CVE-2017-7843</a>]</td> <td class="Text">RHSA-2017:3382: firefox security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173379</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3379">RHSA-2017:3379-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12173">CVE-2017-12173</a>]</td> <td class="Text">RHSA-2017:3379: sssd security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173372</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3372">RHSA-2017:3372-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7826">CVE-2017-7826</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7828">CVE-2017-7828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7830">CVE-2017-7830</a>]</td> <td class="Text">RHSA-2017:3372: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173368</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3368">RHSA-2017:3368-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14167">CVE-2017-14167</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15289">CVE-2017-15289</a>]</td> <td class="Text">RHSA-2017:3368: qemu-kvm security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173322</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3322">RHSA-2017:3322-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000380">CVE-2017-1000380</a>]</td> <td class="Text">RHSA-2017:3322: kernel-rt security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173315</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3315">RHSA-2017:3315-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000380">CVE-2017-1000380</a>]</td> <td class="Text">RHSA-2017:3315: kernel security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173270</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3270">RHSA-2017:3270-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12613">CVE-2017-12613</a>]</td> <td class="Text">RHSA-2017:3270: apr security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173269</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3269">RHSA-2017:3269-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16844">CVE-2017-16844</a>]</td> <td class="Text">RHSA-2017:3269: procmail security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173263</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3263">RHSA-2017:3263-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000257">CVE-2017-1000257</a>]</td> <td class="Text">RHSA-2017:3263: curl security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173260</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3260">RHSA-2017:3260-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14746">CVE-2017-14746</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15275">CVE-2017-15275</a>]</td> <td class="Text">RHSA-2017:3260: samba security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173247</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3247">RHSA-2017:3247-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7826">CVE-2017-7826</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7828">CVE-2017-7828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7830">CVE-2017-7830</a>]</td> <td class="Text">RHSA-2017:3247: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173221</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3221">RHSA-2017:3221-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10167">CVE-2016-10167</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10168">CVE-2016-10168</a>]</td> <td class="Text">RHSA-2017:3221: php security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173111</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3111">RHSA-2017:3111-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8184">CVE-2014-8184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13738">CVE-2017-13738</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13740">CVE-2017-13740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13741">CVE-2017-13741</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13742">CVE-2017-13742</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13743">CVE-2017-13743</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13744">CVE-2017-13744</a>]</td> <td class="Text">RHSA-2017:3111: liblouis security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173081</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3081">RHSA-2017:3081-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5647">CVE-2017-5647</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7674">CVE-2017-7674</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12615">CVE-2017-12615</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12617">CVE-2017-12617</a>]</td> <td class="Text">RHSA-2017:3081: tomcat security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20173075</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3075">RHSA-2017:3075-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13089">CVE-2017-13089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13090">CVE-2017-13090</a>]</td> <td class="Text">RHSA-2017:3075: wget security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172998</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2998">RHSA-2017:2998-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10274">CVE-2017-10274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10281">CVE-2017-10281</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10285">CVE-2017-10285</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10295">CVE-2017-10295</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10345">CVE-2017-10345</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10346">CVE-2017-10346</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10347">CVE-2017-10347</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10348">CVE-2017-10348</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10349">CVE-2017-10349</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10350">CVE-2017-10350</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10355">CVE-2017-10355</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10356">CVE-2017-10356</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10357">CVE-2017-10357</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10388">CVE-2017-10388</a>]</td> <td class="Text">RHSA-2017:2998: java-1.8.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172931</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2931">RHSA-2017:2931-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8399">CVE-2016-8399</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7184">CVE-2017-7184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7541">CVE-2017-7541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7542">CVE-2017-7542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7558">CVE-2017-7558</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11176">CVE-2017-11176</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14106">CVE-2017-14106</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000111">CVE-2017-1000111</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000112">CVE-2017-1000112</a>]</td> <td class="Text">RHSA-2017:2931: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172930</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2930">RHSA-2017:2930-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8399">CVE-2016-8399</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7184">CVE-2017-7184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7541">CVE-2017-7541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7542">CVE-2017-7542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7558">CVE-2017-7558</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11176">CVE-2017-11176</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14106">CVE-2017-14106</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000111">CVE-2017-1000111</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000112">CVE-2017-1000112</a>]</td> <td class="Text">RHSA-2017:2930: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172907</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2907">RHSA-2017:2907-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13077">CVE-2017-13077</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13078">CVE-2017-13078</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13080">CVE-2017-13080</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13082">CVE-2017-13082</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13086">CVE-2017-13086</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13087">CVE-2017-13087</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13088">CVE-2017-13088</a>]</td> <td class="Text">RHSA-2017:2907: wpa_supplicant security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172885</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2885">RHSA-2017:2885-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7793">CVE-2017-7793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7810">CVE-2017-7810</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7814">CVE-2017-7814</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7818">CVE-2017-7818</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7819">CVE-2017-7819</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7823">CVE-2017-7823</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7824">CVE-2017-7824</a>]</td> <td class="Text">RHSA-2017:2885: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172882</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2882">RHSA-2017:2882-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9798">CVE-2017-9798</a>]</td> <td class="Text">RHSA-2017:2882: httpd security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172836</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2836">RHSA-2017:2836-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14491">CVE-2017-14491</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14492">CVE-2017-14492</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14493">CVE-2017-14493</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14494">CVE-2017-14494</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14495">CVE-2017-14495</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14496">CVE-2017-14496</a>]</td> <td class="Text">RHSA-2017:2836: dnsmasq security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172832</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2832">RHSA-2017:2832-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7805">CVE-2017-7805</a>]</td> <td class="Text">RHSA-2017:2832: nss security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172831</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2831">RHSA-2017:2831-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7793">CVE-2017-7793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7810">CVE-2017-7810</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7814">CVE-2017-7814</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7818">CVE-2017-7818</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7819">CVE-2017-7819</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7823">CVE-2017-7823</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7824">CVE-2017-7824</a>]</td> <td class="Text">RHSA-2017:2831: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172790</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2790">RHSA-2017:2790-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12150">CVE-2017-12150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12151">CVE-2017-12151</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12163">CVE-2017-12163</a>]</td> <td class="Text">RHSA-2017:2790: samba security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172788</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2788">RHSA-2017:2788-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7555">CVE-2017-7555</a>]</td> <td class="Text">RHSA-2017:2788: augeas security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172771</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2771">RHSA-2017:2771-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14482">CVE-2017-14482</a>]</td> <td class="Text">RHSA-2017:2771: emacs security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172728</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2728">RHSA-2017:2728-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7546">CVE-2017-7546</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7547">CVE-2017-7547</a>]</td> <td class="Text">RHSA-2017:2728: postgresql security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172704</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2704">RHSA-2017:2704-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000251">CVE-2017-1000251</a>]</td> <td class="Text">RHSA-2017:2704: kernel-rt security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172685</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2685">RHSA-2017:2685-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000250">CVE-2017-1000250</a>]</td> <td class="Text">RHSA-2017:2685: bluez security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172679</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2679">RHSA-2017:2679-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000251">CVE-2017-1000251</a>]</td> <td class="Text">RHSA-2017:2679: kernel security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172585</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2585">RHSA-2017:2585-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7533">CVE-2017-7533</a>]</td> <td class="Text">RHSA-2017:2585: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172569</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2569">RHSA-2017:2569-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7551">CVE-2017-7551</a>]</td> <td class="Text">RHSA-2017:2569: 389-ds-base security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172551</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2551">RHSA-2017:2551-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9775">CVE-2017-9775</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9776">CVE-2017-9776</a>]</td> <td class="Text">RHSA-2017:2551: poppler security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172534</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2534">RHSA-2017:2534-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7753">CVE-2017-7753</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7779">CVE-2017-7779</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7784">CVE-2017-7784</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7785">CVE-2017-7785</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7786">CVE-2017-7786</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7787">CVE-2017-7787</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7791">CVE-2017-7791</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7792">CVE-2017-7792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7800">CVE-2017-7800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7801">CVE-2017-7801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7802">CVE-2017-7802</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7803">CVE-2017-7803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7807">CVE-2017-7807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7809">CVE-2017-7809</a>]</td> <td class="Text">RHSA-2017:2534: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172492</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2492">RHSA-2017:2492-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000061">CVE-2017-1000061</a>]</td> <td class="Text">RHSA-2017:2492: xmlsec1 security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172489</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2489">RHSA-2017:2489-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000115">CVE-2017-1000115</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000116">CVE-2017-1000116</a>]</td> <td class="Text">RHSA-2017:2489: mercurial security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172486</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2486">RHSA-2017:2486-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3253">CVE-2015-3253</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6814">CVE-2016-6814</a>]</td> <td class="Text">RHSA-2017:2486: groovy security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172484</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2484">RHSA-2017:2484-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000117">CVE-2017-1000117</a>]</td> <td class="Text">RHSA-2017:2484: git security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172480</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2480">RHSA-2017:2480-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9800">CVE-2017-9800</a>]</td> <td class="Text">RHSA-2017:2480: subversion security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172479</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2479">RHSA-2017:2479-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3167">CVE-2017-3167</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3169">CVE-2017-3169</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7668">CVE-2017-7668</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7679">CVE-2017-7679</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9788">CVE-2017-9788</a>]</td> <td class="Text">RHSA-2017:2479: httpd security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172473</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2473">RHSA-2017:2473-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7533">CVE-2017-7533</a>]</td> <td class="Text">RHSA-2017:2473: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172471</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2471">RHSA-2017:2471-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7506">CVE-2017-7506</a>]</td> <td class="Text">RHSA-2017:2471: spice security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172459</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2459">RHSA-2017:2459-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2885">CVE-2017-2885</a>]</td> <td class="Text">RHSA-2017:2459: libsoup security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172456</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2456">RHSA-2017:2456-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7753">CVE-2017-7753</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7779">CVE-2017-7779</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7784">CVE-2017-7784</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7785">CVE-2017-7785</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7786">CVE-2017-7786</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7787">CVE-2017-7787</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7791">CVE-2017-7791</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7792">CVE-2017-7792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7798">CVE-2017-7798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7800">CVE-2017-7800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7801">CVE-2017-7801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7802">CVE-2017-7802</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7803">CVE-2017-7803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7807">CVE-2017-7807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7809">CVE-2017-7809</a>]</td> <td class="Text">RHSA-2017:2456: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172445</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2445">RHSA-2017:2445-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10664">CVE-2017-10664</a>]</td> <td class="Text">RHSA-2017:2445: qemu-kvm security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172424</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2424">RHSA-2017:2424-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10053">CVE-2017-10053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10067">CVE-2017-10067</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10074">CVE-2017-10074</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10081">CVE-2017-10081</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10087">CVE-2017-10087</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10089">CVE-2017-10089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10090">CVE-2017-10090</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10096">CVE-2017-10096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10101">CVE-2017-10101</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10102">CVE-2017-10102</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10107">CVE-2017-10107</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10108">CVE-2017-10108</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10109">CVE-2017-10109</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10110">CVE-2017-10110</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10115">CVE-2017-10115</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10116">CVE-2017-10116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10135">CVE-2017-10135</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10243">CVE-2017-10243</a>]</td> <td class="Text">RHSA-2017:2424: java-1.7.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172423</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2423">RHSA-2017:2423-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5645">CVE-2017-5645</a>]</td> <td class="Text">RHSA-2017:2423: log4j security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172389</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2389">RHSA-2017:2389-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10978">CVE-2017-10978</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10983">CVE-2017-10983</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10984">CVE-2017-10984</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10985">CVE-2017-10985</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10986">CVE-2017-10986</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10987">CVE-2017-10987</a>]</td> <td class="Text">RHSA-2017:2389: freeradius security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172388</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2388">RHSA-2017:2388-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000083">CVE-2017-1000083</a>]</td> <td class="Text">RHSA-2017:2388: evince security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172335</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2335">RHSA-2017:2335-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7537">CVE-2017-7537</a>]</td> <td class="Text">RHSA-2017:2335: pki-core security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172299</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2299">RHSA-2017:2299-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0553">CVE-2017-0553</a>]</td> <td class="Text">RHSA-2017:2299: NetworkManager and libnl3 security, bug fix and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172292</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2292">RHSA-2017:2292-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7444">CVE-2016-7444</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5334">CVE-2017-5334</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5335">CVE-2017-5335</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5336">CVE-2017-5336</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5337">CVE-2017-5337</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7507">CVE-2017-7507</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7869">CVE-2017-7869</a>]</td> <td class="Text">RHSA-2017:2292: gnutls security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172285</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2285">RHSA-2017:2285-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7488">CVE-2017-7488</a>]</td> <td class="Text">RHSA-2017:2285: authconfig security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172258</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2258">RHSA-2017:2258-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5884">CVE-2017-5884</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5885">CVE-2017-5885</a>]</td> <td class="Text">RHSA-2017:2258: gtk-vnc security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172247</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2247">RHSA-2017:2247-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0762">CVE-2016-0762</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5018">CVE-2016-5018</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6794">CVE-2016-6794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6796">CVE-2016-6796</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6797">CVE-2016-6797</a>]</td> <td class="Text">RHSA-2017:2247: tomcat security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172192</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2192">RHSA-2017:2192-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5483">CVE-2016-5483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5617">CVE-2016-5617</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6664">CVE-2016-6664</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3238">CVE-2017-3238</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3243">CVE-2017-3243</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3244">CVE-2017-3244</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3258">CVE-2017-3258</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3265">CVE-2017-3265</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3291">CVE-2017-3291</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3302">CVE-2017-3302</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3308">CVE-2017-3308</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3309">CVE-2017-3309</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3312">CVE-2017-3312</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3313">CVE-2017-3313</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3317">CVE-2017-3317</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3318">CVE-2017-3318</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3453">CVE-2017-3453</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3456">CVE-2017-3456</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3464">CVE-2017-3464</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3600">CVE-2017-3600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3651">CVE-2017-3651</a>]</td> <td class="Text">RHSA-2017:2192: mariadb security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172180</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2180">RHSA-2017:2180-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7207">CVE-2017-7207</a>]</td> <td class="Text">RHSA-2017:2180: ghostscript security and bug fix update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172128</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2128">RHSA-2017:2128-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7496">CVE-2015-7496</a>]</td> <td class="Text">RHSA-2017:2128: gdm and gnome-session security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172077</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2077">RHSA-2017:2077-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7970">CVE-2014-7970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7975">CVE-2014-7975</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8839">CVE-2015-8839</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8970">CVE-2015-8970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6213">CVE-2016-6213</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7042">CVE-2016-7042</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7097">CVE-2016-7097</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8645">CVE-2016-8645</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9576">CVE-2016-9576</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9588">CVE-2016-9588</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9604">CVE-2016-9604</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9685">CVE-2016-9685</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9806">CVE-2016-9806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10088">CVE-2016-10088</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10147">CVE-2016-10147</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10200">CVE-2016-10200</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2596">CVE-2017-2596</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2647">CVE-2017-2647</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2671">CVE-2017-2671</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5551">CVE-2017-5551</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5970">CVE-2017-5970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6001">CVE-2017-6001</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6951">CVE-2017-6951</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7187">CVE-2017-7187</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7495">CVE-2017-7495</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7616">CVE-2017-7616</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7889">CVE-2017-7889</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8797">CVE-2017-8797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8890">CVE-2017-8890</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9074">CVE-2017-9074</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9075">CVE-2017-9075</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9076">CVE-2017-9076</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9077">CVE-2017-9077</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9242">CVE-2017-9242</a>]</td> <td class="Text">RHSA-2017:2077: kernel-rt security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172060</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2060">RHSA-2017:2060-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9446">CVE-2016-9446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9810">CVE-2016-9810</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9811">CVE-2016-9811</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10198">CVE-2016-10198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10199">CVE-2016-10199</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5837">CVE-2017-5837</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5838">CVE-2017-5838</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5839">CVE-2017-5839</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5840">CVE-2017-5840</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5841">CVE-2017-5841</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5842">CVE-2017-5842</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5843">CVE-2017-5843</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5844">CVE-2017-5844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5845">CVE-2017-5845</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5848">CVE-2017-5848</a>]</td> <td class="Text">RHSA-2017:2060: GStreamer security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172029</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2029">RHSA-2017:2029-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6210">CVE-2016-6210</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6515">CVE-2016-6515</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10009">CVE-2016-10009</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10011">CVE-2016-10011</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10012">CVE-2016-10012</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10708">CVE-2016-10708</a>]</td> <td class="Text">RHSA-2017:2029: openssh security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172016</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2016">RHSA-2017:2016-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7167">CVE-2016-7167</a>]</td> <td class="Text">RHSA-2017:2016: curl security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172004</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2004">RHSA-2017:2004-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9938">CVE-2014-9938</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8386">CVE-2017-8386</a>]</td> <td class="Text">RHSA-2017:2004: git security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20172000</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2000">RHSA-2017:2000-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10207">CVE-2016-10207</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5581">CVE-2017-5581</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7392">CVE-2017-7392</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7393">CVE-2017-7393</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7394">CVE-2017-7394</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7395">CVE-2017-7395</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7396">CVE-2017-7396</a>]</td> <td class="Text">RHSA-2017:2000: tigervnc and fltk security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171983</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1983">RHSA-2017:1983-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7484">CVE-2017-7484</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7486">CVE-2017-7486</a>]</td> <td class="Text">RHSA-2017:1983: postgresql security and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171975</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1975">RHSA-2017:1975-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7870">CVE-2017-7870</a>]</td> <td class="Text">RHSA-2017:1975: libreoffice security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171950</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1950">RHSA-2017:1950-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9461">CVE-2017-9461</a>]</td> <td class="Text">RHSA-2017:1950: samba security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171931</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1931">RHSA-2017:1931-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0634">CVE-2016-0634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7543">CVE-2016-7543</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9401">CVE-2016-9401</a>]</td> <td class="Text">RHSA-2017:1931: bash security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171916</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1916">RHSA-2017:1916-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9761">CVE-2014-9761</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8776">CVE-2015-8776</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8777">CVE-2015-8777</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8778">CVE-2015-8778</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8779">CVE-2015-8779</a>]</td> <td class="Text">RHSA-2017:1916: glibc security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171871</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1871">RHSA-2017:1871-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0261">CVE-2015-0261</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2153">CVE-2015-2153</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2154">CVE-2015-2154</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2155">CVE-2015-2155</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7922">CVE-2016-7922</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7923">CVE-2016-7923</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7924">CVE-2016-7924</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7925">CVE-2016-7925</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7926">CVE-2016-7926</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7927">CVE-2016-7927</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7928">CVE-2016-7928</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7929">CVE-2016-7929</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7930">CVE-2016-7930</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7931">CVE-2016-7931</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7932">CVE-2016-7932</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7933">CVE-2016-7933</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7934">CVE-2016-7934</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7935">CVE-2016-7935</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7936">CVE-2016-7936</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7937">CVE-2016-7937</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7938">CVE-2016-7938</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7939">CVE-2016-7939</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7940">CVE-2016-7940</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7973">CVE-2016-7973</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7974">CVE-2016-7974</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7975">CVE-2016-7975</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7983">CVE-2016-7983</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7984">CVE-2016-7984</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7985">CVE-2016-7985</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7986">CVE-2016-7986</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7992">CVE-2016-7992</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7993">CVE-2016-7993</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8574">CVE-2016-8574</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8575">CVE-2016-8575</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5202">CVE-2017-5202</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5203">CVE-2017-5203</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5204">CVE-2017-5204</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5205">CVE-2017-5205</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5341">CVE-2017-5341</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5342">CVE-2017-5342</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5482">CVE-2017-5482</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5483">CVE-2017-5483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5484">CVE-2017-5484</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5485">CVE-2017-5485</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5486">CVE-2017-5486</a>]</td> <td class="Text">RHSA-2017:1871: tcpdump security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171868</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1868">RHSA-2017:1868-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9365">CVE-2014-9365</a>]</td> <td class="Text">RHSA-2017:1868: python security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171865</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1865">RHSA-2017:1865-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10164">CVE-2016-10164</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2625">CVE-2017-2625</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2626">CVE-2017-2626</a>]</td> <td class="Text">RHSA-2017:1865: X.org X11 libraries security, bug fix and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171860</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1860">RHSA-2017:1860-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2806">CVE-2015-2806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3622">CVE-2015-3622</a>]</td> <td class="Text">RHSA-2017:1860: libtasn1 security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171859</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1859">RHSA-2017:1859-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8932">CVE-2017-8932</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000098">CVE-2017-1000098</a>]</td> <td class="Text">RHSA-2017:1859: golang security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171856</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1856">RHSA-2017:1856-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4020">CVE-2016-4020</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2633">CVE-2017-2633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5898">CVE-2017-5898</a>]</td> <td class="Text">RHSA-2017:1856: qemu-kvm security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171854</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1854">RHSA-2017:1854-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3694">CVE-2014-3694</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3695">CVE-2014-3695</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3696">CVE-2014-3696</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3698">CVE-2014-3698</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2640">CVE-2017-2640</a>]</td> <td class="Text">RHSA-2017:1854: pidgin security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171852</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1852">RHSA-2017:1852-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9287">CVE-2017-9287</a>]</td> <td class="Text">RHSA-2017:1852: openldap security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171842</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1842">RHSA-2017:1842-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7970">CVE-2014-7970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7975">CVE-2014-7975</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8839">CVE-2015-8839</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8970">CVE-2015-8970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6213">CVE-2016-6213</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7042">CVE-2016-7042</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7097">CVE-2016-7097</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8645">CVE-2016-8645</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9576">CVE-2016-9576</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9588">CVE-2016-9588</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9604">CVE-2016-9604</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9685">CVE-2016-9685</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9806">CVE-2016-9806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10088">CVE-2016-10088</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10147">CVE-2016-10147</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10200">CVE-2016-10200</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2596">CVE-2017-2596</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2647">CVE-2017-2647</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2671">CVE-2017-2671</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5551">CVE-2017-5551</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5970">CVE-2017-5970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6001">CVE-2017-6001</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6951">CVE-2017-6951</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7187">CVE-2017-7187</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7495">CVE-2017-7495</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7616">CVE-2017-7616</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7889">CVE-2017-7889</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8797">CVE-2017-8797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8890">CVE-2017-8890</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9074">CVE-2017-9074</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9075">CVE-2017-9075</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9076">CVE-2017-9076</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9077">CVE-2017-9077</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9242">CVE-2017-9242</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000379">CVE-2017-1000379</a>]</td> <td class="Text">RHSA-2017:1842: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171809</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1809">RHSA-2017:1809-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5648">CVE-2017-5648</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5664">CVE-2017-5664</a>]</td> <td class="Text">RHSA-2017:1809: tomcat security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171793</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1793">RHSA-2017:1793-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7771">CVE-2017-7771</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7772">CVE-2017-7772</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7773">CVE-2017-7773</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7774">CVE-2017-7774</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7775">CVE-2017-7775</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7776">CVE-2017-7776</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7777">CVE-2017-7777</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7778">CVE-2017-7778</a>]</td> <td class="Text">RHSA-2017:1793: graphite2 security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171789</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1789">RHSA-2017:1789-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10053">CVE-2017-10053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10067">CVE-2017-10067</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10074">CVE-2017-10074</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10078">CVE-2017-10078</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10081">CVE-2017-10081</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10087">CVE-2017-10087</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10089">CVE-2017-10089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10090">CVE-2017-10090</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10096">CVE-2017-10096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10101">CVE-2017-10101</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10102">CVE-2017-10102</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10107">CVE-2017-10107</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10108">CVE-2017-10108</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10109">CVE-2017-10109</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10110">CVE-2017-10110</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10111">CVE-2017-10111</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10115">CVE-2017-10115</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10116">CVE-2017-10116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10135">CVE-2017-10135</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10193">CVE-2017-10193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10198">CVE-2017-10198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10243">CVE-2017-10243</a>]</td> <td class="Text">RHSA-2017:1789: java-1.8.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171681</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1681">RHSA-2017:1681-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9524">CVE-2017-9524</a>]</td> <td class="Text">RHSA-2017:1681: qemu-kvm security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171680</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1680">RHSA-2017:1680-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3142">CVE-2017-3142</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3143">CVE-2017-3143</a>]</td> <td class="Text">RHSA-2017:1680: bind security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171616</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1616">RHSA-2017:1616-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2583">CVE-2017-2583</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6214">CVE-2017-6214</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7477">CVE-2017-7477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7645">CVE-2017-7645</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7895">CVE-2017-7895</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000364">CVE-2017-1000364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000379">CVE-2017-1000379</a>]</td> <td class="Text">RHSA-2017:1616: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171615</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1615">RHSA-2017:1615-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2583">CVE-2017-2583</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6214">CVE-2017-6214</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7477">CVE-2017-7477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7645">CVE-2017-7645</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7895">CVE-2017-7895</a>]</td> <td class="Text">RHSA-2017:1615: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171581</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1581">RHSA-2017:1581-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9148">CVE-2017-9148</a>]</td> <td class="Text">RHSA-2017:1581: freeradius security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171576</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1576">RHSA-2017:1576-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9462">CVE-2017-9462</a>]</td> <td class="Text">RHSA-2017:1576: mercurial security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171574</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1574">RHSA-2017:1574-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000368">CVE-2017-1000368</a>]</td> <td class="Text">RHSA-2017:1574: sudo security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171561</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1561">RHSA-2017:1561-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5470">CVE-2017-5470</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5472">CVE-2017-5472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7749">CVE-2017-7749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7750">CVE-2017-7750</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7751">CVE-2017-7751</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7752">CVE-2017-7752</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7754">CVE-2017-7754</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7756">CVE-2017-7756</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7757">CVE-2017-7757</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7758">CVE-2017-7758</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7764">CVE-2017-7764</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7771">CVE-2017-7771</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7772">CVE-2017-7772</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7773">CVE-2017-7773</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7774">CVE-2017-7774</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7775">CVE-2017-7775</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7776">CVE-2017-7776</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7777">CVE-2017-7777</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7778">CVE-2017-7778</a>]</td> <td class="Text">RHSA-2017:1561: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171484</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1484">RHSA-2017:1484-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000364">CVE-2017-1000364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000379">CVE-2017-1000379</a>]</td> <td class="Text">RHSA-2017:1484: kernel security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171481</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1481">RHSA-2017:1481-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000366">CVE-2017-1000366</a>]</td> <td class="Text">RHSA-2017:1481: glibc security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171440</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1440">RHSA-2017:1440-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5470">CVE-2017-5470</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5472">CVE-2017-5472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7749">CVE-2017-7749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7750">CVE-2017-7750</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7751">CVE-2017-7751</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7752">CVE-2017-7752</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7754">CVE-2017-7754</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7756">CVE-2017-7756</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7757">CVE-2017-7757</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7758">CVE-2017-7758</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7764">CVE-2017-7764</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7771">CVE-2017-7771</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7772">CVE-2017-7772</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7773">CVE-2017-7773</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7774">CVE-2017-7774</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7775">CVE-2017-7775</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7776">CVE-2017-7776</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7777">CVE-2017-7777</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7778">CVE-2017-7778</a>]</td> <td class="Text">RHSA-2017:1440: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171430</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1430">RHSA-2017:1430-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7718">CVE-2017-7718</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7980">CVE-2017-7980</a>]</td> <td class="Text">RHSA-2017:1430: qemu-kvm security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171382</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1382">RHSA-2017:1382-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000367">CVE-2017-1000367</a>]</td> <td class="Text">RHSA-2017:1382: sudo security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171365</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1365">RHSA-2017:1365-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7502">CVE-2017-7502</a>]</td> <td class="Text">RHSA-2017:1365: nss security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171308</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1308">RHSA-2017:1308-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7910">CVE-2016-7910</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8646">CVE-2016-8646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10208">CVE-2016-10208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5986">CVE-2017-5986</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7308">CVE-2017-7308</a>]</td> <td class="Text">RHSA-2017:1308: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171298</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1298">RHSA-2017:1298-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7910">CVE-2016-7910</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8646">CVE-2016-8646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10208">CVE-2016-10208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7308">CVE-2017-7308</a>]</td> <td class="Text">RHSA-2017:1298: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171270</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1270">RHSA-2017:1270-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7494">CVE-2017-7494</a>]</td> <td class="Text">RHSA-2017:1270: samba security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171265</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1265">RHSA-2017:1265-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2125">CVE-2016-2125</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2126">CVE-2016-2126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2619">CVE-2017-2619</a>]</td> <td class="Text">RHSA-2017:1265: samba security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171264</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1264">RHSA-2017:1264-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8422">CVE-2017-8422</a>]</td> <td class="Text">RHSA-2017:1264: kdelibs security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171263</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1263">RHSA-2017:1263-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8779">CVE-2017-8779</a>]</td> <td class="Text">RHSA-2017:1263: libtirpc security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171262</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1262">RHSA-2017:1262-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8779">CVE-2017-8779</a>]</td> <td class="Text">RHSA-2017:1262: rpcbind security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171230</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1230">RHSA-2017:1230-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8291">CVE-2017-8291</a>]</td> <td class="Text">RHSA-2017:1230: ghostscript security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171208</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1208">RHSA-2017:1208-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5203">CVE-2015-5203</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5221">CVE-2015-5221</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1577">CVE-2016-1577</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1867">CVE-2016-1867</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2089">CVE-2016-2089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2116">CVE-2016-2116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8654">CVE-2016-8654</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8690">CVE-2016-8690</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8691">CVE-2016-8691</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8692">CVE-2016-8692</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8693">CVE-2016-8693</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8883">CVE-2016-8883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8884">CVE-2016-8884</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8885">CVE-2016-8885</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9262">CVE-2016-9262</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9387">CVE-2016-9387</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9388">CVE-2016-9388</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9389">CVE-2016-9389</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9390">CVE-2016-9390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9391">CVE-2016-9391</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9392">CVE-2016-9392</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9393">CVE-2016-9393</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9394">CVE-2016-9394</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9560">CVE-2016-9560</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9583">CVE-2016-9583</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9591">CVE-2016-9591</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9600">CVE-2016-9600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10248">CVE-2016-10248</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10249">CVE-2016-10249</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10251">CVE-2016-10251</a>]</td> <td class="Text">RHSA-2017:1208: jasper security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171204</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1204">RHSA-2017:1204-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3509">CVE-2017-3509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3511">CVE-2017-3511</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3526">CVE-2017-3526</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3533">CVE-2017-3533</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3539">CVE-2017-3539</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3544">CVE-2017-3544</a>]</td> <td class="Text">RHSA-2017:1204: java-1.7.0-openjdk security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171201</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1201">RHSA-2017:1201-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10195">CVE-2016-10195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10196">CVE-2016-10196</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10197">CVE-2016-10197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5429">CVE-2017-5429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5432">CVE-2017-5432</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5433">CVE-2017-5433</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5434">CVE-2017-5434</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5435">CVE-2017-5435</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5436">CVE-2017-5436</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5438">CVE-2017-5438</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5439">CVE-2017-5439</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5440">CVE-2017-5440</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5441">CVE-2017-5441</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5442">CVE-2017-5442</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5443">CVE-2017-5443</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5444">CVE-2017-5444</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5445">CVE-2017-5445</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5446">CVE-2017-5446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5447">CVE-2017-5447</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5449">CVE-2017-5449</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5451">CVE-2017-5451</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5454">CVE-2017-5454</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5459">CVE-2017-5459</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5460">CVE-2017-5460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5464">CVE-2017-5464</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5465">CVE-2017-5465</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5466">CVE-2017-5466</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5467">CVE-2017-5467</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5469">CVE-2017-5469</a>]</td> <td class="Text">RHSA-2017:1201: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171108</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1108">RHSA-2017:1108-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3509">CVE-2017-3509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3511">CVE-2017-3511</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3526">CVE-2017-3526</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3533">CVE-2017-3533</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3539">CVE-2017-3539</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3544">CVE-2017-3544</a>]</td> <td class="Text">RHSA-2017:1108: java-1.8.0-openjdk security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171106</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1106">RHSA-2017:1106-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10195">CVE-2016-10195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10196">CVE-2016-10196</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10197">CVE-2016-10197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5429">CVE-2017-5429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5430">CVE-2017-5430</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5432">CVE-2017-5432</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5433">CVE-2017-5433</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5434">CVE-2017-5434</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5435">CVE-2017-5435</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5436">CVE-2017-5436</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5438">CVE-2017-5438</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5439">CVE-2017-5439</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5440">CVE-2017-5440</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5441">CVE-2017-5441</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5442">CVE-2017-5442</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5443">CVE-2017-5443</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5444">CVE-2017-5444</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5445">CVE-2017-5445</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5446">CVE-2017-5446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5447">CVE-2017-5447</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5448">CVE-2017-5448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5449">CVE-2017-5449</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5451">CVE-2017-5451</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5454">CVE-2017-5454</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5455">CVE-2017-5455</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5456">CVE-2017-5456</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5459">CVE-2017-5459</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5460">CVE-2017-5460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5464">CVE-2017-5464</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5465">CVE-2017-5465</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5466">CVE-2017-5466</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5467">CVE-2017-5467</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5469">CVE-2017-5469</a>]</td> <td class="Text">RHSA-2017:1106: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171100</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1100">RHSA-2017:1100-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5461">CVE-2017-5461</a>]</td> <td class="Text">RHSA-2017:1100: nss and nss-util security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20171095</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1095">RHSA-2017:1095-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3136">CVE-2017-3136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3137">CVE-2017-3137</a>]</td> <td class="Text">RHSA-2017:1095: bind security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170987</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0987">RHSA-2017:0987-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9603">CVE-2016-9603</a>]</td> <td class="Text">RHSA-2017:0987: qemu-kvm security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170935</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0935">RHSA-2017:0935-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6816">CVE-2016-6816</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8745">CVE-2016-8745</a>]</td> <td class="Text">RHSA-2017:0935: tomcat security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170933</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0933">RHSA-2017:0933-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8650">CVE-2016-8650</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9793">CVE-2016-9793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2618">CVE-2017-2618</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2636">CVE-2017-2636</a>]</td> <td class="Text">RHSA-2017:0933: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170931</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0931">RHSA-2017:0931-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8650">CVE-2016-8650</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9793">CVE-2016-9793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2618">CVE-2017-2618</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2636">CVE-2017-2636</a>]</td> <td class="Text">RHSA-2017:0931: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170920</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0920">RHSA-2017:0920-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2668">CVE-2017-2668</a>]</td> <td class="Text">RHSA-2017:0920: 389-ds-base security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170914</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0914">RHSA-2017:0914-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3157">CVE-2017-3157</a>]</td> <td class="Text">RHSA-2017:0914: libreoffice security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170907</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0907">RHSA-2017:0907-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2616">CVE-2017-2616</a>]</td> <td class="Text">RHSA-2017:0907: util-linux security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170906</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0906">RHSA-2017:0906-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0736">CVE-2016-0736</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2161">CVE-2016-2161</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8743">CVE-2016-8743</a>]</td> <td class="Text">RHSA-2017:0906: httpd security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170838</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0838">RHSA-2017:0838-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5139">CVE-2016-5139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5158">CVE-2016-5158</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5159">CVE-2016-5159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7163">CVE-2016-7163</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9573">CVE-2016-9573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9675">CVE-2016-9675</a>]</td> <td class="Text">RHSA-2017:0838: openjpeg security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170837</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0837">RHSA-2017:0837-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5208">CVE-2017-5208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5332">CVE-2017-5332</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5333">CVE-2017-5333</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6009">CVE-2017-6009</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6010">CVE-2017-6010</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6011">CVE-2017-6011</a>]</td> <td class="Text">RHSA-2017:0837: icoutils security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170558</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0558">RHSA-2017:0558-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5428">CVE-2017-5428</a>]</td> <td class="Text">RHSA-2017:0558: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170498</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0498">RHSA-2017:0498-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5398">CVE-2017-5398</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5400">CVE-2017-5400</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5401">CVE-2017-5401</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5402">CVE-2017-5402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5404">CVE-2017-5404</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5405">CVE-2017-5405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5407">CVE-2017-5407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5408">CVE-2017-5408</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5410">CVE-2017-5410</a>]</td> <td class="Text">RHSA-2017:0498: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170461</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0461">RHSA-2017:0461-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5398">CVE-2017-5398</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5400">CVE-2017-5400</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5401">CVE-2017-5401</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5402">CVE-2017-5402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5404">CVE-2017-5404</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5405">CVE-2017-5405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5407">CVE-2017-5407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5408">CVE-2017-5408</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5410">CVE-2017-5410</a>]</td> <td class="Text">RHSA-2017:0461: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170396</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0396">RHSA-2017:0396-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2615">CVE-2017-2615</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2620">CVE-2017-2620</a>]</td> <td class="Text">RHSA-2017:0396: qemu-kvm security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170388</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0388">RHSA-2017:0388-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2590">CVE-2017-2590</a>]</td> <td class="Text">RHSA-2017:0388: ipa security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170387</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0387">RHSA-2017:0387-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8630">CVE-2016-8630</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8655">CVE-2016-8655</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9083">CVE-2016-9083</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9084">CVE-2016-9084</a>]</td> <td class="Text">RHSA-2017:0387: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170386</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0386">RHSA-2017:0386-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8630">CVE-2016-8630</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8655">CVE-2016-8655</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9083">CVE-2016-9083</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9084">CVE-2016-9084</a>]</td> <td class="Text">RHSA-2017:0386: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170372</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0372">RHSA-2017:0372-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5195">CVE-2016-5195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7039">CVE-2016-7039</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8666">CVE-2016-8666</a>]</td> <td class="Text">RHSA-2017:0372: kernel-aarch64 security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170295</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0295">RHSA-2017:0295-09</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6074">CVE-2017-6074</a>]</td> <td class="Text">RHSA-2017:0295: kernel-rt security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170294</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0294">RHSA-2017:0294-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6074">CVE-2017-6074</a>]</td> <td class="Text">RHSA-2017:0294: kernel security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170286</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0286">RHSA-2017:0286-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8610">CVE-2016-8610</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3731">CVE-2017-3731</a>]</td> <td class="Text">RHSA-2017:0286: openssl security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170276</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0276">RHSA-2017:0276-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3135">CVE-2017-3135</a>]</td> <td class="Text">RHSA-2017:0276: bind security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170269</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0269">RHSA-2017:0269-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5546">CVE-2016-5546</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5547">CVE-2016-5547</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5548">CVE-2016-5548</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5552">CVE-2016-5552</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3231">CVE-2017-3231</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3241">CVE-2017-3241</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3252">CVE-2017-3252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3253">CVE-2017-3253</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3261">CVE-2017-3261</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3272">CVE-2017-3272</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3289">CVE-2017-3289</a>]</td> <td class="Text">RHSA-2017:0269: java-1.7.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170254</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0254">RHSA-2017:0254-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9577">CVE-2016-9577</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9578">CVE-2016-9578</a>]</td> <td class="Text">RHSA-2017:0254: spice security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170252</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0252">RHSA-2017:0252-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7426">CVE-2016-7426</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7429">CVE-2016-7429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7433">CVE-2016-7433</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9310">CVE-2016-9310</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9311">CVE-2016-9311</a>]</td> <td class="Text">RHSA-2017:0252: ntp security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170238</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0238">RHSA-2017:0238-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5373">CVE-2017-5373</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5375">CVE-2017-5375</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5376">CVE-2017-5376</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5378">CVE-2017-5378</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5380">CVE-2017-5380</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5383">CVE-2017-5383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5390">CVE-2017-5390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5396">CVE-2017-5396</a>]</td> <td class="Text">RHSA-2017:0238: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170225</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0225">RHSA-2017:0225-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8870">CVE-2015-8870</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5652">CVE-2016-5652</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9533">CVE-2016-9533</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9534">CVE-2016-9534</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9535">CVE-2016-9535</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9536">CVE-2016-9536</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9537">CVE-2016-9537</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9540">CVE-2016-9540</a>]</td> <td class="Text">RHSA-2017:0225: libtiff security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170190</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0190">RHSA-2017:0190-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5373">CVE-2017-5373</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5375">CVE-2017-5375</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5376">CVE-2017-5376</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5378">CVE-2017-5378</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5380">CVE-2017-5380</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5383">CVE-2017-5383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5386">CVE-2017-5386</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5390">CVE-2017-5390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5396">CVE-2017-5396</a>]</td> <td class="Text">RHSA-2017:0190: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170182</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0182">RHSA-2017:0182-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10002">CVE-2016-10002</a>]</td> <td class="Text">RHSA-2017:0182: squid security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170180</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0180">RHSA-2017:0180-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5546">CVE-2016-5546</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5547">CVE-2016-5547</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5548">CVE-2016-5548</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5552">CVE-2016-5552</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3231">CVE-2017-3231</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3241">CVE-2017-3241</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3252">CVE-2017-3252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3253">CVE-2017-3253</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3261">CVE-2017-3261</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3272">CVE-2017-3272</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3289">CVE-2017-3289</a>]</td> <td class="Text">RHSA-2017:0180: java-1.8.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170091</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0091">RHSA-2017:0091-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6828">CVE-2016-6828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7117">CVE-2016-7117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9555">CVE-2016-9555</a>]</td> <td class="Text">RHSA-2017:0091: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170086</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0086">RHSA-2017:0086-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6828">CVE-2016-6828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7117">CVE-2016-7117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9555">CVE-2016-9555</a>]</td> <td class="Text">RHSA-2017:0086: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170083</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0083">RHSA-2017:0083-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2857">CVE-2016-2857</a>]</td> <td class="Text">RHSA-2017:0083: qemu-kvm security and bug fix update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170062</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0062">RHSA-2017:0062-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9131">CVE-2016-9131</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9147">CVE-2016-9147</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9444">CVE-2016-9444</a>]</td> <td class="Text">RHSA-2017:0062: bind security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170061</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0061">RHSA-2017:0061-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5542">CVE-2016-5542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5554">CVE-2016-5554</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5573">CVE-2016-5573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5582">CVE-2016-5582</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5597">CVE-2016-5597</a>]</td> <td class="Text">RHSA-2017:0061: java-1.6.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170021</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0021">RHSA-2017:0021-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9445">CVE-2016-9445</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9809">CVE-2016-9809</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9812">CVE-2016-9812</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9813">CVE-2016-9813</a>]</td> <td class="Text">RHSA-2017:0021: gstreamer1-plugins-bad-free security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170020</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0020">RHSA-2017:0020-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9634">CVE-2016-9634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9635">CVE-2016-9635</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9636">CVE-2016-9636</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9807">CVE-2016-9807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9808">CVE-2016-9808</a>]</td> <td class="Text">RHSA-2017:0020: gstreamer1-plugins-good security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170019</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0019">RHSA-2017:0019-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9634">CVE-2016-9634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9635">CVE-2016-9635</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9636">CVE-2016-9636</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9807">CVE-2016-9807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9808">CVE-2016-9808</a>]</td> <td class="Text">RHSA-2017:0019: gstreamer-plugins-good security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170018</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0018">RHSA-2017:0018-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9445">CVE-2016-9445</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9447">CVE-2016-9447</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9809">CVE-2016-9809</a>]</td> <td class="Text">RHSA-2017:0018: gstreamer-plugins-bad-free security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170013</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0013">RHSA-2017:0013-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-5653">CVE-2013-5653</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7977">CVE-2016-7977</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7978">CVE-2016-7978</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7979">CVE-2016-7979</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8602">CVE-2016-8602</a>]</td> <td class="Text">RHSA-2017:0013: ghostscript security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20170001</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0001">RHSA-2017:0001-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7030">CVE-2016-7030</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9575">CVE-2016-9575</a>]</td> <td class="Text">RHSA-2017:0001: ipa security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162973</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2973">RHSA-2016:2973-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9893">CVE-2016-9893</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9895">CVE-2016-9895</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9899">CVE-2016-9899</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9900">CVE-2016-9900</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9901">CVE-2016-9901</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9902">CVE-2016-9902</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9905">CVE-2016-9905</a>]</td> <td class="Text">RHSA-2016:2973: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162972</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2972">RHSA-2016:2972-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1248">CVE-2016-1248</a>]</td> <td class="Text">RHSA-2016:2972: vim security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162946</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2946">RHSA-2016:2946-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9893">CVE-2016-9893</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9895">CVE-2016-9895</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9897">CVE-2016-9897</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9898">CVE-2016-9898</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9899">CVE-2016-9899</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9900">CVE-2016-9900</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9901">CVE-2016-9901</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9902">CVE-2016-9902</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9904">CVE-2016-9904</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9905">CVE-2016-9905</a>]</td> <td class="Text">RHSA-2016:2946: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162872</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2872">RHSA-2016:2872-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7032">CVE-2016-7032</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7076">CVE-2016-7076</a>]</td> <td class="Text">RHSA-2016:2872: sudo security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162850</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2850">RHSA-2016:2850-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9079">CVE-2016-9079</a>]</td> <td class="Text">RHSA-2016:2850: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162843</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2843">RHSA-2016:2843-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9079">CVE-2016-9079</a>]</td> <td class="Text">RHSA-2016:2843: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162825</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2825">RHSA-2016:2825-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5290">CVE-2016-5290</a>]</td> <td class="Text">RHSA-2016:2825: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162824</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2824">RHSA-2016:2824-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0718">CVE-2016-0718</a>]</td> <td class="Text">RHSA-2016:2824: expat security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162819</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2819">RHSA-2016:2819-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8704">CVE-2016-8704</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8705">CVE-2016-8705</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8706">CVE-2016-8706</a>]</td> <td class="Text">RHSA-2016:2819: memcached security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162809</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2809">RHSA-2016:2809-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8638">CVE-2016-8638</a>]</td> <td class="Text">RHSA-2016:2809: ipsilon security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162780</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2780">RHSA-2016:2780-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5290">CVE-2016-5290</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5291">CVE-2016-5291</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5296">CVE-2016-5296</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5297">CVE-2016-5297</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9064">CVE-2016-9064</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9066">CVE-2016-9066</a>]</td> <td class="Text">RHSA-2016:2780: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162779</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2779">RHSA-2016:2779-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2834">CVE-2016-2834</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5285">CVE-2016-5285</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8635">CVE-2016-8635</a>]</td> <td class="Text">RHSA-2016:2779: nss and nss-util security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162702</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2702">RHSA-2016:2702-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7545">CVE-2016-7545</a>]</td> <td class="Text">RHSA-2016:2702: policycoreutils security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162674</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2674">RHSA-2016:2674-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6313">CVE-2016-6313</a>]</td> <td class="Text">RHSA-2016:2674: libgcrypt security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162658</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2658">RHSA-2016:2658-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5542">CVE-2016-5542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5554">CVE-2016-5554</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5573">CVE-2016-5573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5582">CVE-2016-5582</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5597">CVE-2016-5597</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10165">CVE-2016-10165</a>]</td> <td class="Text">RHSA-2016:2658: java-1.7.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162615</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2615">RHSA-2016:2615-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8864">CVE-2016-8864</a>]</td> <td class="Text">RHSA-2016:2615: bind security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162614</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2614">RHSA-2016:2614-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7035">CVE-2016-7035</a>]</td> <td class="Text">RHSA-2016:2614: pacemaker security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162610</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2610">RHSA-2016:2610-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7795">CVE-2016-7795</a>]</td> <td class="Text">RHSA-2016:2610: systemd security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162607</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2607">RHSA-2016:2607-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8165">CVE-2014-8165</a>]</td> <td class="Text">RHSA-2016:2607: powerpc-utils-python security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162606</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2606">RHSA-2016:2606-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5423">CVE-2016-5423</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5424">CVE-2016-5424</a>]</td> <td class="Text">RHSA-2016:2606: postgresql security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162605</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2605">RHSA-2016:2605-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5011">CVE-2016-5011</a>]</td> <td class="Text">RHSA-2016:2605: util-linux security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162604</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2604">RHSA-2016:2604-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7050">CVE-2016-7050</a>]</td> <td class="Text">RHSA-2016:2604: resteasy-base security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162603</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2603">RHSA-2016:2603-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5361">CVE-2016-5361</a>]</td> <td class="Text">RHSA-2016:2603: libreswan security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162602</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2602">RHSA-2016:2602-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3099">CVE-2016-3099</a>]</td> <td class="Text">RHSA-2016:2602: mod_nss security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162601</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2601">RHSA-2016:2601-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5384">CVE-2016-5384</a>]</td> <td class="Text">RHSA-2016:2601: fontconfig security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162600</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2600">RHSA-2016:2600-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2569">CVE-2016-2569</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2570">CVE-2016-2570</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2571">CVE-2016-2571</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2572">CVE-2016-2572</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3948">CVE-2016-3948</a>]</td> <td class="Text">RHSA-2016:2600: squid security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162599</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2599">RHSA-2016:2599-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0230">CVE-2014-0230</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5174">CVE-2015-5174</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5345">CVE-2015-5345</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5351">CVE-2015-5351</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0706">CVE-2016-0706</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0714">CVE-2016-0714</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0763">CVE-2016-0763</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3092">CVE-2016-3092</a>]</td> <td class="Text">RHSA-2016:2599: tomcat security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162598</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2598">RHSA-2016:2598-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5399">CVE-2016-5399</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5766">CVE-2016-5766</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5767">CVE-2016-5767</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5768">CVE-2016-5768</a>]</td> <td class="Text">RHSA-2016:2598: php security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162597</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2597">RHSA-2016:2597-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5410">CVE-2016-5410</a>]</td> <td class="Text">RHSA-2016:2597: firewalld security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162596</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2596">RHSA-2016:2596-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0720">CVE-2016-0720</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0721">CVE-2016-0721</a>]</td> <td class="Text">RHSA-2016:2596: pcs security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162595</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2595">RHSA-2016:2595-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3492">CVE-2016-3492</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5612">CVE-2016-5612</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5616">CVE-2016-5616</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5624">CVE-2016-5624</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5626">CVE-2016-5626</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5629">CVE-2016-5629</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6662">CVE-2016-6662</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6663">CVE-2016-6663</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8283">CVE-2016-8283</a>]</td> <td class="Text">RHSA-2016:2595: mariadb security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162594</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2594">RHSA-2016:2594-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4992">CVE-2016-4992</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5405">CVE-2016-5405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5416">CVE-2016-5416</a>]</td> <td class="Text">RHSA-2016:2594: 389-ds-base security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162593</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2593">RHSA-2016:2593-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7091">CVE-2016-7091</a>]</td> <td class="Text">RHSA-2016:2593: sudo security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162592</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2592">RHSA-2016:2592-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4455">CVE-2016-4455</a>]</td> <td class="Text">RHSA-2016:2592: subscription-manager security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162591</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2591">RHSA-2016:2591-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3119">CVE-2016-3119</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3120">CVE-2016-3120</a>]</td> <td class="Text">RHSA-2016:2591: krb5 security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162590</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2590">RHSA-2016:2590-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2774">CVE-2016-2774</a>]</td> <td class="Text">RHSA-2016:2590: dhcp security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162589</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2589">RHSA-2016:2589-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4994">CVE-2016-4994</a>]</td> <td class="Text">RHSA-2016:2589: gimp security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162588</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2588">RHSA-2016:2588-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8325">CVE-2015-8325</a>]</td> <td class="Text">RHSA-2016:2588: openssh security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162587</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2587">RHSA-2016:2587-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4971">CVE-2016-4971</a>]</td> <td class="Text">RHSA-2016:2587: wget security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162586</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2586">RHSA-2016:2586-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5636">CVE-2016-5636</a>]</td> <td class="Text">RHSA-2016:2586: python security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162585</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2585">RHSA-2016:2585-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1981">CVE-2016-1981</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3712">CVE-2016-3712</a>]</td> <td class="Text">RHSA-2016:2585: qemu-kvm security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162584</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2584">RHSA-2016:2584-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4312">CVE-2013-4312</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8374">CVE-2015-8374</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8543">CVE-2015-8543</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8746">CVE-2015-8746</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8812">CVE-2015-8812</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8844">CVE-2015-8844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8845">CVE-2015-8845</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8956">CVE-2015-8956</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2053">CVE-2016-2053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2069">CVE-2016-2069</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2117">CVE-2016-2117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2384">CVE-2016-2384</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2847">CVE-2016-2847</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3070">CVE-2016-3070</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3156">CVE-2016-3156</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3699">CVE-2016-3699</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3841">CVE-2016-3841</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4569">CVE-2016-4569</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4578">CVE-2016-4578</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4581">CVE-2016-4581</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4794">CVE-2016-4794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5829">CVE-2016-5829</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6136">CVE-2016-6136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6198">CVE-2016-6198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6327">CVE-2016-6327</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6480">CVE-2016-6480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13167">CVE-2017-13167</a>]</td> <td class="Text">RHSA-2016:2584: kernel-rt security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162583</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2583">RHSA-2016:2583-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5194">CVE-2015-5194</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5195">CVE-2015-5195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5196">CVE-2015-5196</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5219">CVE-2015-5219</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7691">CVE-2015-7691</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7692">CVE-2015-7692</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7701">CVE-2015-7701</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7702">CVE-2015-7702</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7703">CVE-2015-7703</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7852">CVE-2015-7852</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7974">CVE-2015-7974</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7977">CVE-2015-7977</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7978">CVE-2015-7978</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7979">CVE-2015-7979</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8158">CVE-2015-8158</a>]</td> <td class="Text">RHSA-2016:2583: ntp security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162582</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2582">RHSA-2016:2582-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8803">CVE-2015-8803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8804">CVE-2015-8804</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8805">CVE-2015-8805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6489">CVE-2016-6489</a>]</td> <td class="Text">RHSA-2016:2582: nettle security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162581</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2581">RHSA-2016:2581-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0764">CVE-2016-0764</a>]</td> <td class="Text">RHSA-2016:2581: NetworkManager security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162580</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2580">RHSA-2016:2580-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8868">CVE-2015-8868</a>]</td> <td class="Text">RHSA-2016:2580: poppler security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162579</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2579">RHSA-2016:2579-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0794">CVE-2016-0794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0795">CVE-2016-0795</a>]</td> <td class="Text">RHSA-2016:2579: libreoffice security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162578</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2578">RHSA-2016:2578-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7797">CVE-2016-7797</a>]</td> <td class="Text">RHSA-2016:2578: pacemaker security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162577</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2577">RHSA-2016:2577-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5160">CVE-2015-5160</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5313">CVE-2015-5313</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5008">CVE-2016-5008</a>]</td> <td class="Text">RHSA-2016:2577: libvirt security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162576</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2576">RHSA-2016:2576-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8869">CVE-2015-8869</a>]</td> <td class="Text">RHSA-2016:2576: libguestfs and virt-p2v security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162575</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2575">RHSA-2016:2575-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5419">CVE-2016-5419</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5420">CVE-2016-5420</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7141">CVE-2016-7141</a>]</td> <td class="Text">RHSA-2016:2575: curl security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162574</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2574">RHSA-2016:2574-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4312">CVE-2013-4312</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8374">CVE-2015-8374</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8543">CVE-2015-8543</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8746">CVE-2015-8746</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8812">CVE-2015-8812</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8844">CVE-2015-8844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8845">CVE-2015-8845</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8956">CVE-2015-8956</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2053">CVE-2016-2053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2069">CVE-2016-2069</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2117">CVE-2016-2117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2384">CVE-2016-2384</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2847">CVE-2016-2847</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3044">CVE-2016-3044</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3070">CVE-2016-3070</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3156">CVE-2016-3156</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3699">CVE-2016-3699</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3841">CVE-2016-3841</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4569">CVE-2016-4569</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4578">CVE-2016-4578</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4581">CVE-2016-4581</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4794">CVE-2016-4794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5412">CVE-2016-5412</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5828">CVE-2016-5828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5829">CVE-2016-5829</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6136">CVE-2016-6136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6198">CVE-2016-6198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6327">CVE-2016-6327</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6480">CVE-2016-6480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7914">CVE-2016-7914</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7915">CVE-2016-7915</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9794">CVE-2016-9794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13167">CVE-2017-13167</a>]</td> <td class="Text">RHSA-2016:2574: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162573</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2573">RHSA-2016:2573-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3075">CVE-2016-3075</a>]</td> <td class="Text">RHSA-2016:2573: glibc security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162110</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2110">RHSA-2016:2110-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5195">CVE-2016-5195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7039">CVE-2016-7039</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8666">CVE-2016-8666</a>]</td> <td class="Text">RHSA-2016:2110: kernel-rt security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162098</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2098">RHSA-2016:2098-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5195">CVE-2016-5195</a>]</td> <td class="Text">RHSA-2016:2098: kernel security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162079</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2079">RHSA-2016:2079-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5542">CVE-2016-5542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5554">CVE-2016-5554</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5573">CVE-2016-5573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5582">CVE-2016-5582</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5597">CVE-2016-5597</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10165">CVE-2016-10165</a>]</td> <td class="Text">RHSA-2016:2079: java-1.8.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162047</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2047">RHSA-2016:2047-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7039">CVE-2016-7039</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8666">CVE-2016-8666</a>]</td> <td class="Text">RHSA-2016:2047: kernel security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20162046</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2046">RHSA-2016:2046-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7810">CVE-2014-7810</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5346">CVE-2015-5346</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5388">CVE-2016-5388</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5425">CVE-2016-5425</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6325">CVE-2016-6325</a>]</td> <td class="Text">RHSA-2016:2046: tomcat security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161985</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1985">RHSA-2016:1985-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5257">CVE-2016-5257</a>]</td> <td class="Text">RHSA-2016:1985: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161978</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1978">RHSA-2016:1978-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1000111">CVE-2016-1000111</a>]</td> <td class="Text">RHSA-2016:1978: python-twisted-web security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161944</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1944">RHSA-2016:1944-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2776">CVE-2016-2776</a>]</td> <td class="Text">RHSA-2016:1944: bind security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161940</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1940">RHSA-2016:1940-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2177">CVE-2016-2177</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2178">CVE-2016-2178</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2179">CVE-2016-2179</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2180">CVE-2016-2180</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2181">CVE-2016-2181</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2182">CVE-2016-2182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6302">CVE-2016-6302</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6304">CVE-2016-6304</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6306">CVE-2016-6306</a>]</td> <td class="Text">RHSA-2016:1940: openssl security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161912</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1912">RHSA-2016:1912-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5250">CVE-2016-5250</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5257">CVE-2016-5257</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5261">CVE-2016-5261</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5270">CVE-2016-5270</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5272">CVE-2016-5272</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5274">CVE-2016-5274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5276">CVE-2016-5276</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5277">CVE-2016-5277</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5278">CVE-2016-5278</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5280">CVE-2016-5280</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5281">CVE-2016-5281</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5284">CVE-2016-5284</a>]</td> <td class="Text">RHSA-2016:1912: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161875</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1875">RHSA-2016:1875-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3134">CVE-2016-3134</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4997">CVE-2016-4997</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4998">CVE-2016-4998</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6197">CVE-2016-6197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6198">CVE-2016-6198</a>]</td> <td class="Text">RHSA-2016:1875: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161847</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1847">RHSA-2016:1847-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3134">CVE-2016-3134</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4997">CVE-2016-4997</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4998">CVE-2016-4998</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6197">CVE-2016-6197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6198">CVE-2016-6198</a>]</td> <td class="Text">RHSA-2016:1847: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161844</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1844">RHSA-2016:1844-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8916">CVE-2015-8916</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8917">CVE-2015-8917</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8919">CVE-2015-8919</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8920">CVE-2015-8920</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8921">CVE-2015-8921</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8922">CVE-2015-8922</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8923">CVE-2015-8923</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8924">CVE-2015-8924</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8925">CVE-2015-8925</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8926">CVE-2015-8926</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8928">CVE-2015-8928</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8930">CVE-2015-8930</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8931">CVE-2015-8931</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8932">CVE-2015-8932</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8934">CVE-2015-8934</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1541">CVE-2016-1541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4300">CVE-2016-4300</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4302">CVE-2016-4302</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4809">CVE-2016-4809</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5418">CVE-2016-5418</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5844">CVE-2016-5844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6250">CVE-2016-6250</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7166">CVE-2016-7166</a>]</td> <td class="Text">RHSA-2016:1844: libarchive security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161809</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1809">RHSA-2016:1809-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2836">CVE-2016-2836</a>]</td> <td class="Text">RHSA-2016:1809: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161797</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1797">RHSA-2016:1797-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5404">CVE-2016-5404</a>]</td> <td class="Text">RHSA-2016:1797: ipa security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161776</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1776">RHSA-2016:1776-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3458">CVE-2016-3458</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3500">CVE-2016-3500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3508">CVE-2016-3508</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3550">CVE-2016-3550</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3606">CVE-2016-3606</a>]</td> <td class="Text">RHSA-2016:1776: java-1.6.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161633</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1633">RHSA-2016:1633-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5696">CVE-2016-5696</a>]</td> <td class="Text">RHSA-2016:1633: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161632</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1632">RHSA-2016:1632-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5696">CVE-2016-5696</a>]</td> <td class="Text">RHSA-2016:1632: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161626</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1626">RHSA-2016:1626-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0772">CVE-2016-0772</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5699">CVE-2016-5699</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1000110">CVE-2016-1000110</a>]</td> <td class="Text">RHSA-2016:1626: python security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161613</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1613">RHSA-2016:1613-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5385">CVE-2016-5385</a>]</td> <td class="Text">RHSA-2016:1613: php security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161606</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1606">RHSA-2016:1606-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5126">CVE-2016-5126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5403">CVE-2016-5403</a>]</td> <td class="Text">RHSA-2016:1606: qemu-kvm security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161602</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1602">RHSA-2016:1602-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0640">CVE-2016-0640</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0641">CVE-2016-0641</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0643">CVE-2016-0643</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0644">CVE-2016-0644</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0646">CVE-2016-0646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0647">CVE-2016-0647</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0648">CVE-2016-0648</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0649">CVE-2016-0649</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0650">CVE-2016-0650</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0666">CVE-2016-0666</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3452">CVE-2016-3452</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3477">CVE-2016-3477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3521">CVE-2016-3521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3615">CVE-2016-3615</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5440">CVE-2016-5440</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5444">CVE-2016-5444</a>]</td> <td class="Text">RHSA-2016:1602: mariadb security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161551</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1551">RHSA-2016:1551-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2830">CVE-2016-2830</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2836">CVE-2016-2836</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2837">CVE-2016-2837</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2838">CVE-2016-2838</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5252">CVE-2016-5252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5254">CVE-2016-5254</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5258">CVE-2016-5258</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5259">CVE-2016-5259</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5262">CVE-2016-5262</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5263">CVE-2016-5263</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5264">CVE-2016-5264</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5265">CVE-2016-5265</a>]</td> <td class="Text">RHSA-2016:1551: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161546</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1546">RHSA-2016:1546-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8127">CVE-2014-8127</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8129">CVE-2014-8129</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8130">CVE-2014-8130</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9330">CVE-2014-9330</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9655">CVE-2014-9655</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1547">CVE-2015-1547</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7554">CVE-2015-7554</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8665">CVE-2015-8665</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8668">CVE-2015-8668</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8683">CVE-2015-8683</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8781">CVE-2015-8781</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8782">CVE-2015-8782</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8783">CVE-2015-8783</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8784">CVE-2015-8784</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3632">CVE-2016-3632</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3945">CVE-2016-3945</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3990">CVE-2016-3990</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3991">CVE-2016-3991</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5320">CVE-2016-5320</a>]</td> <td class="Text">RHSA-2016:1546: libtiff security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161541</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1541">RHSA-2016:1541-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8660">CVE-2015-8660</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4470">CVE-2016-4470</a>]</td> <td class="Text">RHSA-2016:1541: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161539</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1539">RHSA-2016:1539-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8660">CVE-2015-8660</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2143">CVE-2016-2143</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4470">CVE-2016-4470</a>]</td> <td class="Text">RHSA-2016:1539: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161538</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1538">RHSA-2016:1538-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5739">CVE-2015-5739</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5740">CVE-2015-5740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5741">CVE-2015-5741</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3959">CVE-2016-3959</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5386">CVE-2016-5386</a>]</td> <td class="Text">RHSA-2016:1538: golang security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161504</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1504">RHSA-2016:1504-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3458">CVE-2016-3458</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3500">CVE-2016-3500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3508">CVE-2016-3508</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3550">CVE-2016-3550</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3598">CVE-2016-3598</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3606">CVE-2016-3606</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3610">CVE-2016-3610</a>]</td> <td class="Text">RHSA-2016:1504: java-1.7.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161486</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1486">RHSA-2016:1486-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2119">CVE-2016-2119</a>]</td> <td class="Text">RHSA-2016:1486: samba security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161458</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1458">RHSA-2016:1458-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3458">CVE-2016-3458</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3500">CVE-2016-3500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3508">CVE-2016-3508</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3550">CVE-2016-3550</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3587">CVE-2016-3587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3598">CVE-2016-3598</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3606">CVE-2016-3606</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3610">CVE-2016-3610</a>]</td> <td class="Text">RHSA-2016:1458: java-1.8.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161422</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1422">RHSA-2016:1422-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5387">CVE-2016-5387</a>]</td> <td class="Text">RHSA-2016:1422: httpd security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161392</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1392">RHSA-2016:1392-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2818">CVE-2016-2818</a>]</td> <td class="Text">RHSA-2016:1392: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161301</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1301">RHSA-2016:1301-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8767">CVE-2015-8767</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3707">CVE-2016-3707</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4565">CVE-2016-4565</a>]</td> <td class="Text">RHSA-2016:1301: kernel-rt security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161296</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1296">RHSA-2016:1296-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8869">CVE-2015-8869</a>]</td> <td class="Text">RHSA-2016:1296: ocaml security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161293</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1293">RHSA-2016:1293-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4444">CVE-2016-4444</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4446">CVE-2016-4446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4989">CVE-2016-4989</a>]</td> <td class="Text">RHSA-2016:1293: setroubleshoot and setroubleshoot-plugins security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161292</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1292">RHSA-2016:1292-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1762">CVE-2016-1762</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1833">CVE-2016-1833</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1834">CVE-2016-1834</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1835">CVE-2016-1835</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1836">CVE-2016-1836</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1837">CVE-2016-1837</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1838">CVE-2016-1838</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1839">CVE-2016-1839</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1840">CVE-2016-1840</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3627">CVE-2016-3627</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3705">CVE-2016-3705</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4447">CVE-2016-4447</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4448">CVE-2016-4448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4449">CVE-2016-4449</a>]</td> <td class="Text">RHSA-2016:1292: libxml2 security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161277</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1277">RHSA-2016:1277-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8767">CVE-2015-8767</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4565">CVE-2016-4565</a>]</td> <td class="Text">RHSA-2016:1277: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161237</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1237">RHSA-2016:1237-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8895">CVE-2015-8895</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8896">CVE-2015-8896</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8897">CVE-2015-8897</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8898">CVE-2015-8898</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5118">CVE-2016-5118</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5239">CVE-2016-5239</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5240">CVE-2016-5240</a>]</td> <td class="Text">RHSA-2016:1237: ImageMagick security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161217</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1217">RHSA-2016:1217-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2818">CVE-2016-2818</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2819">CVE-2016-2819</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2821">CVE-2016-2821</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2822">CVE-2016-2822</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2828">CVE-2016-2828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2831">CVE-2016-2831</a>]</td> <td class="Text">RHSA-2016:1217: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161205</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1205">RHSA-2016:1205-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0749">CVE-2016-0749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2150">CVE-2016-2150</a>]</td> <td class="Text">RHSA-2016:1205: spice security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161141</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1141">RHSA-2016:1141-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7979">CVE-2015-7979</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1547">CVE-2016-1547</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1548">CVE-2016-1548</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1550">CVE-2016-1550</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2518">CVE-2016-2518</a>]</td> <td class="Text">RHSA-2016:1141: ntp security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161139</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1139">RHSA-2016:1139-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4051">CVE-2016-4051</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4052">CVE-2016-4052</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4053">CVE-2016-4053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4054">CVE-2016-4054</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4553">CVE-2016-4553</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4554">CVE-2016-4554</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4555">CVE-2016-4555</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4556">CVE-2016-4556</a>]</td> <td class="Text">RHSA-2016:1139: squid security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161086</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1086">RHSA-2016:1086-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3698">CVE-2016-3698</a>]</td> <td class="Text">RHSA-2016:1086: libndp security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161051</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1051">RHSA-2016:1051-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0758">CVE-2016-0758</a>]</td> <td class="Text">RHSA-2016:1051: kernel-rt security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161041</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1041">RHSA-2016:1041-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2805">CVE-2016-2805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2807">CVE-2016-2807</a>]</td> <td class="Text">RHSA-2016:1041: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161033</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1033">RHSA-2016:1033-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0758">CVE-2016-0758</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3044">CVE-2016-3044</a>]</td> <td class="Text">RHSA-2016:1033: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20161025</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1025">RHSA-2016:1025-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2328">CVE-2015-2328</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3217">CVE-2015-3217</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5073">CVE-2015-5073</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8385">CVE-2015-8385</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8386">CVE-2015-8386</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8388">CVE-2015-8388</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8391">CVE-2015-8391</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3191">CVE-2016-3191</a>]</td> <td class="Text">RHSA-2016:1025: pcre security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160726</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0726">RHSA-2016:0726-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3714">CVE-2016-3714</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3715">CVE-2016-3715</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3716">CVE-2016-3716</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3717">CVE-2016-3717</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3718">CVE-2016-3718</a>]</td> <td class="Text">RHSA-2016:0726: ImageMagick security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160724</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0724">RHSA-2016:0724-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3710">CVE-2016-3710</a>]</td> <td class="Text">RHSA-2016:0724: qemu-kvm security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160723</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0723">RHSA-2016:0723-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0686">CVE-2016-0686</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0687">CVE-2016-0687</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0695">CVE-2016-0695</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3425">CVE-2016-3425</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3427">CVE-2016-3427</a>]</td> <td class="Text">RHSA-2016:0723: java-1.6.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160722</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0722">RHSA-2016:0722-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0799">CVE-2016-0799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2105">CVE-2016-2105</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2106">CVE-2016-2106</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2107">CVE-2016-2107</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2108">CVE-2016-2108</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2109">CVE-2016-2109</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2842">CVE-2016-2842</a>]</td> <td class="Text">RHSA-2016:0722: openssl security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160706</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0706">RHSA-2016:0706-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3068">CVE-2016-3068</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3069">CVE-2016-3069</a>]</td> <td class="Text">RHSA-2016:0706: mercurial security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160695</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0695">RHSA-2016:0695-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1526">CVE-2016-1526</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2805">CVE-2016-2805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2806">CVE-2016-2806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2807">CVE-2016-2807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2808">CVE-2016-2808</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2814">CVE-2016-2814</a>]</td> <td class="Text">RHSA-2016:0695: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160685</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0685">RHSA-2016:0685-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1978">CVE-2016-1978</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1979">CVE-2016-1979</a>]</td> <td class="Text">RHSA-2016:0685: nss, nspr, nss-softokn, and nss-util security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160676</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0676">RHSA-2016:0676-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0686">CVE-2016-0686</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0687">CVE-2016-0687</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0695">CVE-2016-0695</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3425">CVE-2016-3425</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3427">CVE-2016-3427</a>]</td> <td class="Text">RHSA-2016:0676: java-1.7.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160650</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0650">RHSA-2016:0650-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0686">CVE-2016-0686</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0687">CVE-2016-0687</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0695">CVE-2016-0695</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3425">CVE-2016-3425</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3426">CVE-2016-3426</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3427">CVE-2016-3427</a>]</td> <td class="Text">RHSA-2016:0650: java-1.8.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160612</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0612">RHSA-2016:0612-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5370">CVE-2015-5370</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2110">CVE-2016-2110</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2111">CVE-2016-2111</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2112">CVE-2016-2112</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2113">CVE-2016-2113</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2114">CVE-2016-2114</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2115">CVE-2016-2115</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2118">CVE-2016-2118</a>]</td> <td class="Text">RHSA-2016:0612: samba and samba4 security, bug fix, and enhancement update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160594</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0594">RHSA-2016:0594-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1521">CVE-2016-1521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1522">CVE-2016-1522</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1523">CVE-2016-1523</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1526">CVE-2016-1526</a>]</td> <td class="Text">RHSA-2016:0594: graphite2 security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160534</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0534">RHSA-2016:0534-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4792">CVE-2015-4792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4802">CVE-2015-4802</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4815">CVE-2015-4815</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4816">CVE-2015-4816</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4819">CVE-2015-4819</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4826">CVE-2015-4826</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4830">CVE-2015-4830</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4836">CVE-2015-4836</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4858">CVE-2015-4858</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4861">CVE-2015-4861</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4870">CVE-2015-4870</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4879">CVE-2015-4879</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4913">CVE-2015-4913</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0505">CVE-2016-0505</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0546">CVE-2016-0546</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0596">CVE-2016-0596</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0597">CVE-2016-0597</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0598">CVE-2016-0598</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0600">CVE-2016-0600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0606">CVE-2016-0606</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0608">CVE-2016-0608</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0609">CVE-2016-0609</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0616">CVE-2016-0616</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0642">CVE-2016-0642</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0651">CVE-2016-0651</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2047">CVE-2016-2047</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3471">CVE-2016-3471</a>]</td> <td class="Text">RHSA-2016:0534: mariadb security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160532</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0532">RHSA-2016:0532-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8629">CVE-2015-8629</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8630">CVE-2015-8630</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8631">CVE-2015-8631</a>]</td> <td class="Text">RHSA-2016:0532: krb5 security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160513</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0513">RHSA-2016:0513-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0636">CVE-2016-0636</a>]</td> <td class="Text">RHSA-2016:0513: java-1.8.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160512</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0512">RHSA-2016:0512-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0636">CVE-2016-0636</a>]</td> <td class="Text">RHSA-2016:0512: java-1.7.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160496</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0496">RHSA-2016:0496-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2315">CVE-2016-2315</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2324">CVE-2016-2324</a>]</td> <td class="Text">RHSA-2016:0496: git security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160465</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0465">RHSA-2016:0465-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1908">CVE-2016-1908</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3115">CVE-2016-3115</a>]</td> <td class="Text">RHSA-2016:0465: openssh security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160460</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0460">RHSA-2016:0460-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1952">CVE-2016-1952</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1954">CVE-2016-1954</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1957">CVE-2016-1957</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1960">CVE-2016-1960</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1961">CVE-2016-1961</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1964">CVE-2016-1964</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1966">CVE-2016-1966</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1974">CVE-2016-1974</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1977">CVE-2016-1977</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2790">CVE-2016-2790</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2791">CVE-2016-2791</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2792">CVE-2016-2792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2793">CVE-2016-2793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2794">CVE-2016-2794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2795">CVE-2016-2795</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2796">CVE-2016-2796</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2797">CVE-2016-2797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2798">CVE-2016-2798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2799">CVE-2016-2799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2800">CVE-2016-2800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2801">CVE-2016-2801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2802">CVE-2016-2802</a>]</td> <td class="Text">RHSA-2016:0460: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160459</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0459">RHSA-2016:0459-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1285">CVE-2016-1285</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1286">CVE-2016-1286</a>]</td> <td class="Text">RHSA-2016:0459: bind security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160448</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0448">RHSA-2016:0448-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7560">CVE-2015-7560</a>]</td> <td class="Text">RHSA-2016:0448: samba security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160430</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0430">RHSA-2016:0430-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0729">CVE-2016-0729</a>]</td> <td class="Text">RHSA-2016:0430: xerces-c security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160428</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0428">RHSA-2016:0428-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0787">CVE-2016-0787</a>]</td> <td class="Text">RHSA-2016:0428: libssh2 security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160373</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0373">RHSA-2016:0373-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1952">CVE-2016-1952</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1954">CVE-2016-1954</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1957">CVE-2016-1957</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1958">CVE-2016-1958</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1960">CVE-2016-1960</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1961">CVE-2016-1961</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1962">CVE-2016-1962</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1964">CVE-2016-1964</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1965">CVE-2016-1965</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1966">CVE-2016-1966</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1973">CVE-2016-1973</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1974">CVE-2016-1974</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1977">CVE-2016-1977</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2790">CVE-2016-2790</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2791">CVE-2016-2791</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2792">CVE-2016-2792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2793">CVE-2016-2793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2794">CVE-2016-2794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2795">CVE-2016-2795</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2796">CVE-2016-2796</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2797">CVE-2016-2797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2798">CVE-2016-2798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2799">CVE-2016-2799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2800">CVE-2016-2800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2801">CVE-2016-2801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2802">CVE-2016-2802</a>]</td> <td class="Text">RHSA-2016:0373: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160372</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0372">RHSA-2016:0372-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0293">CVE-2015-0293</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3197">CVE-2015-3197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0703">CVE-2016-0703</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0704">CVE-2016-0704</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0800">CVE-2016-0800</a>]</td> <td class="Text">RHSA-2016:0372: openssl098e security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160370</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0370">RHSA-2016:0370-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1950">CVE-2016-1950</a>]</td> <td class="Text">RHSA-2016:0370: nss-util security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160346</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0346">RHSA-2016:0346-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0773">CVE-2016-0773</a>]</td> <td class="Text">RHSA-2016:0346: postgresql security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160301</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0301">RHSA-2016:0301-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3197">CVE-2015-3197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0702">CVE-2016-0702</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0705">CVE-2016-0705</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0797">CVE-2016-0797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0800">CVE-2016-0800</a>]</td> <td class="Text">RHSA-2016:0301: openssl security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160258</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0258">RHSA-2016:0258-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1521">CVE-2016-1521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1522">CVE-2016-1522</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1523">CVE-2016-1523</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1930">CVE-2016-1930</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1935">CVE-2016-1935</a>]</td> <td class="Text">RHSA-2016:0258: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160212</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0212">RHSA-2016:0212-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5157">CVE-2015-5157</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7872">CVE-2015-7872</a>]</td> <td class="Text">RHSA-2016:0212: kernel-rt security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160204</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0204">RHSA-2016:0204-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0741">CVE-2016-0741</a>]</td> <td class="Text">RHSA-2016:0204: 389-ds-base security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160197</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0197">RHSA-2016:0197-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1521">CVE-2016-1521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1522">CVE-2016-1522</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1523">CVE-2016-1523</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1969">CVE-2016-1969</a>]</td> <td class="Text">RHSA-2016:0197: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160189</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0189">RHSA-2016:0189-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3256">CVE-2015-3256</a>]</td> <td class="Text">RHSA-2016:0189: polkit security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160188</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0188">RHSA-2016:0188-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7529">CVE-2015-7529</a>]</td> <td class="Text">RHSA-2016:0188: sos security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160185</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0185">RHSA-2016:0185-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5157">CVE-2015-5157</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7872">CVE-2015-7872</a>]</td> <td class="Text">RHSA-2016:0185: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160176</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0176">RHSA-2016:0176-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5229">CVE-2015-5229</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7547">CVE-2015-7547</a>]</td> <td class="Text">RHSA-2016:0176: glibc security and bug fix update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160083</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0083">RHSA-2016:0083-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1714">CVE-2016-1714</a>]</td> <td class="Text">RHSA-2016:0083: qemu-kvm security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160073</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0073">RHSA-2016:0073-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8704">CVE-2015-8704</a>]</td> <td class="Text">RHSA-2016:0073: bind security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160071</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0071">RHSA-2016:0071-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1930">CVE-2016-1930</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1935">CVE-2016-1935</a>]</td> <td class="Text">RHSA-2016:0071: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160067</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0067">RHSA-2016:0067-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0402">CVE-2016-0402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0448">CVE-2016-0448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0466">CVE-2016-0466</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0483">CVE-2016-0483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0494">CVE-2016-0494</a>]</td> <td class="Text">RHSA-2016:0067: java-1.6.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160065</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0065">RHSA-2016:0065-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0728">CVE-2016-0728</a>]</td> <td class="Text">RHSA-2016:0065: kernel-rt security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160064</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0064">RHSA-2016:0064-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0728">CVE-2016-0728</a>]</td> <td class="Text">RHSA-2016:0064: kernel security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160063</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0063">RHSA-2016:0063-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8138">CVE-2015-8138</a>]</td> <td class="Text">RHSA-2016:0063: ntp security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160054</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0054">RHSA-2016:0054-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4871">CVE-2015-4871</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7575">CVE-2015-7575</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0402">CVE-2016-0402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0448">CVE-2016-0448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0466">CVE-2016-0466</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0483">CVE-2016-0483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0494">CVE-2016-0494</a>]</td> <td class="Text">RHSA-2016:0054: java-1.7.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160049</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0049">RHSA-2016:0049-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7575">CVE-2015-7575</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0402">CVE-2016-0402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0448">CVE-2016-0448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0466">CVE-2016-0466</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0475">CVE-2016-0475</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0483">CVE-2016-0483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0494">CVE-2016-0494</a>]</td> <td class="Text">RHSA-2016:0049: java-1.8.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160043</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0043">RHSA-2016:0043-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0777">CVE-2016-0777</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0778">CVE-2016-0778</a>]</td> <td class="Text">RHSA-2016:0043: openssh security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160012</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0012">RHSA-2016:0012-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7575">CVE-2015-7575</a>]</td> <td class="Text">RHSA-2016:0012: gnutls security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160009</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0009">RHSA-2016:0009-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3223">CVE-2015-3223</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5330">CVE-2015-5330</a>]</td> <td class="Text">RHSA-2016:0009: libldb security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160008</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0008">RHSA-2016:0008-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7575">CVE-2015-7575</a>]</td> <td class="Text">RHSA-2016:0008: openssl security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160007</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0007">RHSA-2016:0007-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7575">CVE-2015-7575</a>]</td> <td class="Text">RHSA-2016:0007: nss security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160006</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0006">RHSA-2016:0006-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5252">CVE-2015-5252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5296">CVE-2015-5296</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5299">CVE-2015-5299</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5330">CVE-2015-5330</a>]</td> <td class="Text">RHSA-2016:0006: samba security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160005</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0005">RHSA-2016:0005-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7236">CVE-2015-7236</a>]</td> <td class="Text">RHSA-2016:0005: rpcbind security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20160001</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0001">RHSA-2016:0001-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7201">CVE-2015-7201</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7205">CVE-2015-7205</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7212">CVE-2015-7212</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7213">CVE-2015-7213</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7214">CVE-2015-7214</a>]</td> <td class="Text">RHSA-2016:0001: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152657</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2657">RHSA-2015:2657-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7201">CVE-2015-7201</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7205">CVE-2015-7205</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7210">CVE-2015-7210</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7212">CVE-2015-7212</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7213">CVE-2015-7213</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7214">CVE-2015-7214</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7222">CVE-2015-7222</a>]</td> <td class="Text">RHSA-2015:2657: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152655</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2655">RHSA-2015:2655-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8000">CVE-2015-8000</a>]</td> <td class="Text">RHSA-2015:2655: bind security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152623</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2623">RHSA-2015:2623-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8370">CVE-2015-8370</a>]</td> <td class="Text">RHSA-2015:2623: grub2 security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152619</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2619">RHSA-2015:2619-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4551">CVE-2015-4551</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5212">CVE-2015-5212</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5213">CVE-2015-5213</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5214">CVE-2015-5214</a>]</td> <td class="Text">RHSA-2015:2619: libreoffice security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152617</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2617">RHSA-2015:2617-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3194">CVE-2015-3194</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3195">CVE-2015-3195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3196">CVE-2015-3196</a>]</td> <td class="Text">RHSA-2015:2617: openssl security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152596</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2596">RHSA-2015:2596-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8126">CVE-2015-8126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8472">CVE-2015-8472</a>]</td> <td class="Text">RHSA-2015:2596: libpng security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152595</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2595">RHSA-2015:2595-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7981">CVE-2015-7981</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8126">CVE-2015-8126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8472">CVE-2015-8472</a>]</td> <td class="Text">RHSA-2015:2595: libpng12 security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152561</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2561">RHSA-2015:2561-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7545">CVE-2015-7545</a>]</td> <td class="Text">RHSA-2015:2561: git security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152552</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2552">RHSA-2015:2552-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5307">CVE-2015-5307</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8104">CVE-2015-8104</a>]</td> <td class="Text">RHSA-2015:2552: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152550</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2550">RHSA-2015:2550-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1819">CVE-2015-1819</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5312">CVE-2015-5312</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7497">CVE-2015-7497</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7498">CVE-2015-7498</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7499">CVE-2015-7499</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7500">CVE-2015-7500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7941">CVE-2015-7941</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7942">CVE-2015-7942</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8241">CVE-2015-8241</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8242">CVE-2015-8242</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8317">CVE-2015-8317</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8710">CVE-2015-8710</a>]</td> <td class="Text">RHSA-2015:2550: libxml2 security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152522</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2522">RHSA-2015:2522-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7501">CVE-2015-7501</a>]</td> <td class="Text">RHSA-2015:2522: apache-commons-collections security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152519</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2519">RHSA-2015:2519-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4513">CVE-2015-4513</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7189">CVE-2015-7189</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7193">CVE-2015-7193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7197">CVE-2015-7197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7198">CVE-2015-7198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7199">CVE-2015-7199</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7200">CVE-2015-7200</a>]</td> <td class="Text">RHSA-2015:2519: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152505</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2505">RHSA-2015:2505-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5273">CVE-2015-5273</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5287">CVE-2015-5287</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5302">CVE-2015-5302</a>]</td> <td class="Text">RHSA-2015:2505: abrt and libreport security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152455</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2455">RHSA-2015:2455-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8602">CVE-2014-8602</a>]</td> <td class="Text">RHSA-2015:2455: unbound security and bug fix update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152417</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2417">RHSA-2015:2417-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8169">CVE-2014-8169</a>]</td> <td class="Text">RHSA-2015:2417: autofs security, bug fix and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152411</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2411">RHSA-2015:2411-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-7421">CVE-2013-7421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8171">CVE-2014-8171</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9419">CVE-2014-9419</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9644">CVE-2014-9644</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2925">CVE-2015-2925</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3339">CVE-2015-3339</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4170">CVE-2015-4170</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5283">CVE-2015-5283</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7613">CVE-2015-7613</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7837">CVE-2015-7837</a>]</td> <td class="Text">RHSA-2015:2411: kernel-rt security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152401</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2401">RHSA-2015:2401-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5281">CVE-2015-5281</a>]</td> <td class="Text">RHSA-2015:2401: grub2 security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152393</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2393">RHSA-2015:2393-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8710">CVE-2014-8710</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8711">CVE-2014-8711</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8712">CVE-2014-8712</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8713">CVE-2014-8713</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8714">CVE-2014-8714</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0562">CVE-2015-0562</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0563">CVE-2015-0563</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0564">CVE-2015-0564</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2188">CVE-2015-2188</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2189">CVE-2015-2189</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2191">CVE-2015-2191</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3182">CVE-2015-3182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3810">CVE-2015-3810</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3811">CVE-2015-3811</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3812">CVE-2015-3812</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3813">CVE-2015-3813</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6243">CVE-2015-6243</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6244">CVE-2015-6244</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6245">CVE-2015-6245</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6246">CVE-2015-6246</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6248">CVE-2015-6248</a>]</td> <td class="Text">RHSA-2015:2393: wireshark security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152383</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2383">RHSA-2015:2383-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1867">CVE-2015-1867</a>]</td> <td class="Text">RHSA-2015:2383: pacemaker security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152378</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2378">RHSA-2015:2378-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3455">CVE-2015-3455</a>]</td> <td class="Text">RHSA-2015:2378: squid security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152369</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2369">RHSA-2015:2369-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3248">CVE-2015-3248</a>]</td> <td class="Text">RHSA-2015:2369: openhpi security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152360</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2360">RHSA-2015:2360-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3258">CVE-2015-3258</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3279">CVE-2015-3279</a>]</td> <td class="Text">RHSA-2015:2360: cups-filters security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152355</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2355">RHSA-2015:2355-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5292">CVE-2015-5292</a>]</td> <td class="Text">RHSA-2015:2355: sssd security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152345</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2345">RHSA-2015:2345-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3565">CVE-2014-3565</a>]</td> <td class="Text">RHSA-2015:2345: net-snmp security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152315</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2315">RHSA-2015:2315-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0272">CVE-2015-0272</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2924">CVE-2015-2924</a>]</td> <td class="Text">RHSA-2015:2315: NetworkManager security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152290</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2290">RHSA-2015:2290-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3225">CVE-2015-3225</a>]</td> <td class="Text">RHSA-2015:2290: pcs security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152248</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2248">RHSA-2015:2248-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8119">CVE-2014-8119</a>]</td> <td class="Text">RHSA-2015:2248: netcf security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152241</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2241">RHSA-2015:2241-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1821">CVE-2015-1821</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1822">CVE-2015-1822</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1853">CVE-2015-1853</a>]</td> <td class="Text">RHSA-2015:2241: chrony security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152237</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2237">RHSA-2015:2237-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2675">CVE-2015-2675</a>]</td> <td class="Text">RHSA-2015:2237: rest security update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152233</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2233">RHSA-2015:2233-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8240">CVE-2014-8240</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8241">CVE-2014-8241</a>]</td> <td class="Text">RHSA-2015:2233: tigervnc security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152231</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2231">RHSA-2015:2231-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9297">CVE-2014-9297</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9298">CVE-2014-9298</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9750">CVE-2014-9750</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9751">CVE-2014-9751</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1798">CVE-2015-1798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1799">CVE-2015-1799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3405">CVE-2015-3405</a>]</td> <td class="Text">RHSA-2015:2231: ntp security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152199</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2199">RHSA-2015:2199-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-7423">CVE-2013-7423</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1472">CVE-2015-1472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1473">CVE-2015-1473</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1781">CVE-2015-1781</a>]</td> <td class="Text">RHSA-2015:2199: glibc security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152184</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2184">RHSA-2015:2184-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2704">CVE-2015-2704</a>]</td> <td class="Text">RHSA-2015:2184: realmd security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152180</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2180">RHSA-2015:2180-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-0334">CVE-2013-0334</a>]</td> <td class="Text">RHSA-2015:2180: rubygem-bundler and rubygem-thor security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152172</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2172">RHSA-2015:2172-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5277">CVE-2015-5277</a>]</td> <td class="Text">RHSA-2015:2172: glibc security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152159</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2159">RHSA-2015:2159-06</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3613">CVE-2014-3613</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3707">CVE-2014-3707</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8150">CVE-2014-8150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3143">CVE-2015-3143</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3148">CVE-2015-3148</a>]</td> <td class="Text">RHSA-2015:2159: curl security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152155</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2155">RHSA-2015:2155-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0207">CVE-2014-0207</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0237">CVE-2014-0237</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0238">CVE-2014-0238</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3478">CVE-2014-3478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3479">CVE-2014-3479</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3480">CVE-2014-3480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3487">CVE-2014-3487</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3538">CVE-2014-3538</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3587">CVE-2014-3587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3710">CVE-2014-3710</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8116">CVE-2014-8116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8117">CVE-2014-8117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9652">CVE-2014-9652</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9653">CVE-2014-9653</a>]</td> <td class="Text">RHSA-2015:2155: file security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152154</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2154">RHSA-2015:2154-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5355">CVE-2014-5355</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2694">CVE-2015-2694</a>]</td> <td class="Text">RHSA-2015:2154: krb5 security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152152</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2152">RHSA-2015:2152-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2010-5313">CVE-2010-5313</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-7421">CVE-2013-7421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3647">CVE-2014-3647</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7842">CVE-2014-7842</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8171">CVE-2014-8171</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9419">CVE-2014-9419</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9644">CVE-2014-9644</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0239">CVE-2015-0239</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2925">CVE-2015-2925</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3288">CVE-2015-3288</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3339">CVE-2015-3339</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4170">CVE-2015-4170</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5283">CVE-2015-5283</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6526">CVE-2015-6526</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7553">CVE-2015-7553</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7613">CVE-2015-7613</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7837">CVE-2015-7837</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8215">CVE-2015-8215</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0774">CVE-2016-0774</a>]</td> <td class="Text">RHSA-2015:2152: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152151</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2151">RHSA-2015:2151-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2012-2150">CVE-2012-2150</a>]</td> <td class="Text">RHSA-2015:2151: xfsprogs security, bug fix and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152140</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2140">RHSA-2015:2140-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1782">CVE-2015-1782</a>]</td> <td class="Text">RHSA-2015:2140: libssh2 security and bug fix update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152131</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2131">RHSA-2015:2131-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8182">CVE-2014-8182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3276">CVE-2015-3276</a>]</td> <td class="Text">RHSA-2015:2131: openldap security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152111</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2111">RHSA-2015:2111-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1345">CVE-2015-1345</a>]</td> <td class="Text">RHSA-2015:2111: grep security and bug fix update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152108</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2108">RHSA-2015:2108-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9112">CVE-2014-9112</a>]</td> <td class="Text">RHSA-2015:2108: cpio security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152101</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2101">RHSA-2015:2101-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-1752">CVE-2013-1752</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-1753">CVE-2013-1753</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4616">CVE-2014-4616</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4650">CVE-2014-4650</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7185">CVE-2014-7185</a>]</td> <td class="Text">RHSA-2015:2101: python security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152088</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2088">RHSA-2015:2088-06</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5600">CVE-2015-5600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6563">CVE-2015-6563</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6564">CVE-2015-6564</a>]</td> <td class="Text">RHSA-2015:2088: openssh security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152086</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2086">RHSA-2015:2086-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4734">CVE-2015-4734</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4803">CVE-2015-4803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4805">CVE-2015-4805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4806">CVE-2015-4806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4835">CVE-2015-4835</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4842">CVE-2015-4842</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4843">CVE-2015-4843</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4844">CVE-2015-4844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4860">CVE-2015-4860</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4872">CVE-2015-4872</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4881">CVE-2015-4881</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4882">CVE-2015-4882</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4883">CVE-2015-4883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4893">CVE-2015-4893</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4903">CVE-2015-4903</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4911">CVE-2015-4911</a>]</td> <td class="Text">RHSA-2015:2086: java-1.6.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152079</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2079">RHSA-2015:2079-09</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8484">CVE-2014-8484</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8485">CVE-2014-8485</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8501">CVE-2014-8501</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8502">CVE-2014-8502</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8503">CVE-2014-8503</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8504">CVE-2014-8504</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8737">CVE-2014-8737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8738">CVE-2014-8738</a>]</td> <td class="Text">RHSA-2015:2079: binutils security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20152078</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2078">RHSA-2015:2078-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5288">CVE-2015-5288</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5289">CVE-2015-5289</a>]</td> <td class="Text">RHSA-2015:2078: postgresql security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151982</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1982">RHSA-2015:1982-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4513">CVE-2015-4513</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7188">CVE-2015-7188</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7189">CVE-2015-7189</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7193">CVE-2015-7193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7194">CVE-2015-7194</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7196">CVE-2015-7196</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7197">CVE-2015-7197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7198">CVE-2015-7198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7199">CVE-2015-7199</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7200">CVE-2015-7200</a>]</td> <td class="Text">RHSA-2015:1982: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151981</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1981">RHSA-2015:1981-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7181">CVE-2015-7181</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7182">CVE-2015-7182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7183">CVE-2015-7183</a>]</td> <td class="Text">RHSA-2015:1981: nss, nss-util, and nspr security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151979</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1979">RHSA-2015:1979-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3240">CVE-2015-3240</a>]</td> <td class="Text">RHSA-2015:1979: libreswan security and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151978</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1978">RHSA-2015:1978-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8559">CVE-2014-8559</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5156">CVE-2015-5156</a>]</td> <td class="Text">RHSA-2015:1978: kernel security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151977</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1977">RHSA-2015:1977-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8559">CVE-2014-8559</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5156">CVE-2015-5156</a>]</td> <td class="Text">RHSA-2015:1977: kernel-rt security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151943</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1943">RHSA-2015:1943-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1779">CVE-2015-1779</a>]</td> <td class="Text">RHSA-2015:1943: qemu-kvm security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151930</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1930">RHSA-2015:1930-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5300">CVE-2015-5300</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7704">CVE-2015-7704</a>]</td> <td class="Text">RHSA-2015:1930: ntp security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151920</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1920">RHSA-2015:1920-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4734">CVE-2015-4734</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4803">CVE-2015-4803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4805">CVE-2015-4805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4806">CVE-2015-4806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4835">CVE-2015-4835</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4840">CVE-2015-4840</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4842">CVE-2015-4842</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4843">CVE-2015-4843</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4844">CVE-2015-4844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4860">CVE-2015-4860</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4872">CVE-2015-4872</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4881">CVE-2015-4881</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4882">CVE-2015-4882</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4883">CVE-2015-4883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4893">CVE-2015-4893</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4903">CVE-2015-4903</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4911">CVE-2015-4911</a>]</td> <td class="Text">RHSA-2015:1920: java-1.7.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151919</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1919">RHSA-2015:1919-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4734">CVE-2015-4734</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4803">CVE-2015-4803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4805">CVE-2015-4805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4806">CVE-2015-4806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4835">CVE-2015-4835</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4840">CVE-2015-4840</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4842">CVE-2015-4842</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4843">CVE-2015-4843</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4844">CVE-2015-4844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4860">CVE-2015-4860</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4868">CVE-2015-4868</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4872">CVE-2015-4872</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4881">CVE-2015-4881</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4882">CVE-2015-4882</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4883">CVE-2015-4883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4893">CVE-2015-4893</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4903">CVE-2015-4903</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4911">CVE-2015-4911</a>]</td> <td class="Text">RHSA-2015:1919: java-1.8.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151917</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1917">RHSA-2015:1917-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0848">CVE-2015-0848</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4588">CVE-2015-4588</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4695">CVE-2015-4695</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4696">CVE-2015-4696</a>]</td> <td class="Text">RHSA-2015:1917: libwmf security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151890</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1890">RHSA-2015:1890-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5260">CVE-2015-5260</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5261">CVE-2015-5261</a>]</td> <td class="Text">RHSA-2015:1890: spice security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151852</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1852">RHSA-2015:1852-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4500">CVE-2015-4500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4509">CVE-2015-4509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4517">CVE-2015-4517</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4519">CVE-2015-4519</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4520">CVE-2015-4520</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4521">CVE-2015-4521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4522">CVE-2015-4522</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7174">CVE-2015-7174</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7175">CVE-2015-7175</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7176">CVE-2015-7176</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7177">CVE-2015-7177</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7180">CVE-2015-7180</a>]</td> <td class="Text">RHSA-2015:1852: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151840</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1840">RHSA-2015:1840-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6908">CVE-2015-6908</a>]</td> <td class="Text">RHSA-2015:1840: openldap security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151834</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1834">RHSA-2015:1834-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4500">CVE-2015-4500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4506">CVE-2015-4506</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4509">CVE-2015-4509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4511">CVE-2015-4511</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4517">CVE-2015-4517</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4519">CVE-2015-4519</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4520">CVE-2015-4520</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4521">CVE-2015-4521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4522">CVE-2015-4522</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7174">CVE-2015-7174</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7175">CVE-2015-7175</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7176">CVE-2015-7176</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7177">CVE-2015-7177</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7180">CVE-2015-7180</a>]</td> <td class="Text">RHSA-2015:1834: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151793</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1793">RHSA-2015:1793-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5165">CVE-2015-5165</a>]</td> <td class="Text">RHSA-2015:1793: qemu-kvm security fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151788</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1788">RHSA-2015:1788-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9585">CVE-2014-9585</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0275">CVE-2015-0275</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1333">CVE-2015-1333</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3212">CVE-2015-3212</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4700">CVE-2015-4700</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5364">CVE-2015-5364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5366">CVE-2015-5366</a>]</td> <td class="Text">RHSA-2015:1788: kernel-rt security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151778</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1778">RHSA-2015:1778-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9585">CVE-2014-9585</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0275">CVE-2015-0275</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1333">CVE-2015-1333</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3212">CVE-2015-3212</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4700">CVE-2015-4700</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5364">CVE-2015-5364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5366">CVE-2015-5366</a>]</td> <td class="Text">RHSA-2015:1778: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151742</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1742">RHSA-2015:1742-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0248">CVE-2015-0248</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0251">CVE-2015-0251</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3184">CVE-2015-3184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3187">CVE-2015-3187</a>]</td> <td class="Text">RHSA-2015:1742: subversion security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151741</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1741">RHSA-2015:1741-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3281">CVE-2015-3281</a>]</td> <td class="Text">RHSA-2015:1741: haproxy security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151714</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1714">RHSA-2015:1714-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3247">CVE-2015-3247</a>]</td> <td class="Text">RHSA-2015:1714: spice security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151708</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1708">RHSA-2015:1708-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1802">CVE-2015-1802</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1803">CVE-2015-1803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1804">CVE-2015-1804</a>]</td> <td class="Text">RHSA-2015:1708: libXfont security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151705</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1705">RHSA-2015:1705-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5722">CVE-2015-5722</a>]</td> <td class="Text">RHSA-2015:1705: bind security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151700</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1700">RHSA-2015:1700-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5189">CVE-2015-5189</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5190">CVE-2015-5190</a>]</td> <td class="Text">RHSA-2015:1700: pcs security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151699</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1699">RHSA-2015:1699-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2730">CVE-2015-2730</a>]</td> <td class="Text">RHSA-2015:1699: nss-softokn security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151695</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1695">RHSA-2015:1695-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0254">CVE-2015-0254</a>]</td> <td class="Text">RHSA-2015:1695: jakarta-taglibs-standard security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151694</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1694">RHSA-2015:1694-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4491">CVE-2015-4491</a>]</td> <td class="Text">RHSA-2015:1694: gdk-pixbuf2 security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151693</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1693">RHSA-2015:1693-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4497">CVE-2015-4497</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4498">CVE-2015-4498</a>]</td> <td class="Text">RHSA-2015:1693: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151682</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1682">RHSA-2015:1682-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4473">CVE-2015-4473</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4487">CVE-2015-4487</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4488">CVE-2015-4488</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4489">CVE-2015-4489</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4491">CVE-2015-4491</a>]</td> <td class="Text">RHSA-2015:1682: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151667</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1667">RHSA-2015:1667-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3183">CVE-2015-3183</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3185">CVE-2015-3185</a>]</td> <td class="Text">RHSA-2015:1667: httpd security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151665</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1665">RHSA-2015:1665-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0433">CVE-2015-0433</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0441">CVE-2015-0441</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0499">CVE-2015-0499</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0501">CVE-2015-0501</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0505">CVE-2015-0505</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2568">CVE-2015-2568</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2571">CVE-2015-2571</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2573">CVE-2015-2573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2582">CVE-2015-2582</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2620">CVE-2015-2620</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2643">CVE-2015-2643</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2648">CVE-2015-2648</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3152">CVE-2015-3152</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4737">CVE-2015-4737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4752">CVE-2015-4752</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4757">CVE-2015-4757</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4864">CVE-2015-4864</a>]</td> <td class="Text">RHSA-2015:1665: mariadb security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151640</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1640">RHSA-2015:1640-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3238">CVE-2015-3238</a>]</td> <td class="Text">RHSA-2015:1640: pam security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151636</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1636">RHSA-2015:1636-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5621">CVE-2015-5621</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000116">CVE-2018-1000116</a>]</td> <td class="Text">RHSA-2015:1636: net-snmp security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151635</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1635">RHSA-2015:1635-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3414">CVE-2015-3414</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3415">CVE-2015-3415</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3416">CVE-2015-3416</a>]</td> <td class="Text">RHSA-2015:1635: sqlite security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151586</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1586">RHSA-2015:1586-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4473">CVE-2015-4473</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4475">CVE-2015-4475</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4478">CVE-2015-4478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4479">CVE-2015-4479</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4480">CVE-2015-4480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4484">CVE-2015-4484</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4485">CVE-2015-4485</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4486">CVE-2015-4486</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4487">CVE-2015-4487</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4488">CVE-2015-4488</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4489">CVE-2015-4489</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4491">CVE-2015-4491</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4492">CVE-2015-4492</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4493">CVE-2015-4493</a>]</td> <td class="Text">RHSA-2015:1586: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151581</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1581">RHSA-2015:1581-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4495">CVE-2015-4495</a>]</td> <td class="Text">RHSA-2015:1581: firefox security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151565</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1565">RHSA-2015:1565-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9715">CVE-2014-9715</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2666">CVE-2015-2666</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2922">CVE-2015-2922</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3636">CVE-2015-3636</a>]</td> <td class="Text">RHSA-2015:1565: kernel-rt security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151534</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1534">RHSA-2015:1534-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9715">CVE-2014-9715</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2666">CVE-2015-2666</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2922">CVE-2015-2922</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3636">CVE-2015-3636</a>]</td> <td class="Text">RHSA-2015:1534: kernel security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151526</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1526">RHSA-2015:1526-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2590">CVE-2015-2590</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2601">CVE-2015-2601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2621">CVE-2015-2621</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2625">CVE-2015-2625</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2628">CVE-2015-2628</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2632">CVE-2015-2632</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2808">CVE-2015-2808</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4000">CVE-2015-4000</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4731">CVE-2015-4731</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4732">CVE-2015-4732</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4733">CVE-2015-4733</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4748">CVE-2015-4748</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4749">CVE-2015-4749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4760">CVE-2015-4760</a>]</td> <td class="Text">RHSA-2015:1526: java-1.6.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151513</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1513">RHSA-2015:1513-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5477">CVE-2015-5477</a>]</td> <td class="Text">RHSA-2015:1513: bind security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151510</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1510">RHSA-2015:1510-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3213">CVE-2015-3213</a>]</td> <td class="Text">RHSA-2015:1510: clutter security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151507</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1507">RHSA-2015:1507-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3214">CVE-2015-3214</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5154">CVE-2015-5154</a>]</td> <td class="Text">RHSA-2015:1507: qemu-kvm security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151483</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1483">RHSA-2015:1483-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3245">CVE-2015-3245</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3246">CVE-2015-3246</a>]</td> <td class="Text">RHSA-2015:1483: libuser security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151455</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1455">RHSA-2015:1455-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2724">CVE-2015-2724</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2725">CVE-2015-2725</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2731">CVE-2015-2731</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2734">CVE-2015-2734</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2735">CVE-2015-2735</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2736">CVE-2015-2736</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2737">CVE-2015-2737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2738">CVE-2015-2738</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2739">CVE-2015-2739</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2740">CVE-2015-2740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2741">CVE-2015-2741</a>]</td> <td class="Text">RHSA-2015:1455: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151443</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1443">RHSA-2015:1443-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4620">CVE-2015-4620</a>]</td> <td class="Text">RHSA-2015:1443: bind security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151229</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1229">RHSA-2015:1229-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2590">CVE-2015-2590</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2601">CVE-2015-2601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2621">CVE-2015-2621</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2625">CVE-2015-2625</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2628">CVE-2015-2628</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2632">CVE-2015-2632</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2808">CVE-2015-2808</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4000">CVE-2015-4000</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4731">CVE-2015-4731</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4732">CVE-2015-4732</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4733">CVE-2015-4733</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4748">CVE-2015-4748</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4749">CVE-2015-4749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4760">CVE-2015-4760</a>]</td> <td class="Text">RHSA-2015:1229: java-1.7.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151228</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1228">RHSA-2015:1228-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2590">CVE-2015-2590</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2601">CVE-2015-2601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2621">CVE-2015-2621</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2625">CVE-2015-2625</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2628">CVE-2015-2628</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2632">CVE-2015-2632</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2659">CVE-2015-2659</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2808">CVE-2015-2808</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3149">CVE-2015-3149</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4000">CVE-2015-4000</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4731">CVE-2015-4731</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4732">CVE-2015-4732</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4733">CVE-2015-4733</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4748">CVE-2015-4748</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4749">CVE-2015-4749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4760">CVE-2015-4760</a>]</td> <td class="Text">RHSA-2015:1228: java-1.8.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151207</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1207">RHSA-2015:1207-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2722">CVE-2015-2722</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2724">CVE-2015-2724</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2725">CVE-2015-2725</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2727">CVE-2015-2727</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2728">CVE-2015-2728</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2729">CVE-2015-2729</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2731">CVE-2015-2731</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2733">CVE-2015-2733</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2734">CVE-2015-2734</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2735">CVE-2015-2735</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2736">CVE-2015-2736</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2737">CVE-2015-2737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2738">CVE-2015-2738</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2739">CVE-2015-2739</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2740">CVE-2015-2740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2741">CVE-2015-2741</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2743">CVE-2015-2743</a>]</td> <td class="Text">RHSA-2015:1207: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151194</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1194">RHSA-2015:1194-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3165">CVE-2015-3165</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3166">CVE-2015-3166</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3167">CVE-2015-3167</a>]</td> <td class="Text">RHSA-2015:1194: postgresql security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151193</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1193">RHSA-2015:1193-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0252">CVE-2015-0252</a>]</td> <td class="Text">RHSA-2015:1193: xerces-c security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151185</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1185">RHSA-2015:1185-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2721">CVE-2015-2721</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4000">CVE-2015-4000</a>]</td> <td class="Text">RHSA-2015:1185: nss security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151154</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1154">RHSA-2015:1154-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3204">CVE-2015-3204</a>]</td> <td class="Text">RHSA-2015:1154: libreswan security, bug fix and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151153</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1153">RHSA-2015:1153-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2775">CVE-2015-2775</a>]</td> <td class="Text">RHSA-2015:1153: mailman security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151139</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1139">RHSA-2015:1139-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9420">CVE-2014-9420</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9529">CVE-2014-9529</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9584">CVE-2014-9584</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1573">CVE-2015-1573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1593">CVE-2015-1593</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1805">CVE-2015-1805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2830">CVE-2015-2830</a>]</td> <td class="Text">RHSA-2015:1139: kernel-rt security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151137</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1137">RHSA-2015:1137-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9420">CVE-2014-9420</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9529">CVE-2014-9529</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9584">CVE-2014-9584</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1573">CVE-2015-1573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1593">CVE-2015-1593</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1805">CVE-2015-1805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2830">CVE-2015-2830</a>]</td> <td class="Text">RHSA-2015:1137: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151135</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1135">RHSA-2015:1135-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8142">CVE-2014-8142</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9652">CVE-2014-9652</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9705">CVE-2014-9705</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9709">CVE-2014-9709</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0231">CVE-2015-0231</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0232">CVE-2015-0232</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0273">CVE-2015-0273</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2301">CVE-2015-2301</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2348">CVE-2015-2348</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2783">CVE-2015-2783</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2787">CVE-2015-2787</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3307">CVE-2015-3307</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3329">CVE-2015-3329</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3330">CVE-2015-3330</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3411">CVE-2015-3411</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3412">CVE-2015-3412</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4021">CVE-2015-4021</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4022">CVE-2015-4022</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4024">CVE-2015-4024</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4025">CVE-2015-4025</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4026">CVE-2015-4026</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4147">CVE-2015-4147</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4148">CVE-2015-4148</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4598">CVE-2015-4598</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4599">CVE-2015-4599</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4600">CVE-2015-4600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4601">CVE-2015-4601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4602">CVE-2015-4602</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4603">CVE-2015-4603</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4604">CVE-2015-4604</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4605">CVE-2015-4605</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4643">CVE-2015-4643</a>]</td> <td class="Text">RHSA-2015:1135: php security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151123</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1123">RHSA-2015:1123-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9679">CVE-2014-9679</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1158">CVE-2015-1158</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1159">CVE-2015-1159</a>]</td> <td class="Text">RHSA-2015:1123: cups security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151115</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1115">RHSA-2015:1115-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8176">CVE-2014-8176</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1789">CVE-2015-1789</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1790">CVE-2015-1790</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1791">CVE-2015-1791</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1792">CVE-2015-1792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3216">CVE-2015-3216</a>]</td> <td class="Text">RHSA-2015:1115: openssl security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151090</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1090">RHSA-2015:1090-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1863">CVE-2015-1863</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4142">CVE-2015-4142</a>]</td> <td class="Text">RHSA-2015:1090: wpa_supplicant security and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151083</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1083">RHSA-2015:1083-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1869">CVE-2015-1869</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1870">CVE-2015-1870</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3142">CVE-2015-3142</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3147">CVE-2015-3147</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3150">CVE-2015-3150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3151">CVE-2015-3151</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3159">CVE-2015-3159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3315">CVE-2015-3315</a>]</td> <td class="Text">RHSA-2015:1083: abrt security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151072</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1072">RHSA-2015:1072-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4000">CVE-2015-4000</a>]</td> <td class="Text">RHSA-2015:1072: openssl security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20151012</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1012">RHSA-2015:1012-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2708">CVE-2015-2708</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2710">CVE-2015-2710</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2713">CVE-2015-2713</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2716">CVE-2015-2716</a>]</td> <td class="Text">RHSA-2015:1012: thunderbird security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150999</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0999">RHSA-2015:0999-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3456">CVE-2015-3456</a>]</td> <td class="Text">RHSA-2015:0999: qemu-kvm security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150988</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0988">RHSA-2015:0988-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0797">CVE-2015-0797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2708">CVE-2015-2708</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2710">CVE-2015-2710</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2713">CVE-2015-2713</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2716">CVE-2015-2716</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4496">CVE-2015-4496</a>]</td> <td class="Text">RHSA-2015:0988: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150987</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0987">RHSA-2015:0987-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3331">CVE-2015-3331</a>]</td> <td class="Text">RHSA-2015:0987: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150986</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0986">RHSA-2015:0986-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0267">CVE-2015-0267</a>]</td> <td class="Text">RHSA-2015:0986: kexec-tools security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150983</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0983">RHSA-2015:0983-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0227">CVE-2014-0227</a>]</td> <td class="Text">RHSA-2015:0983: tomcat security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150981</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0981">RHSA-2015:0981-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3331">CVE-2015-3331</a>]</td> <td class="Text">RHSA-2015:0981: kernel-rt security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150980</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0980">RHSA-2015:0980-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1848">CVE-2015-1848</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3983">CVE-2015-3983</a>]</td> <td class="Text">RHSA-2015:0980: pcs security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150895</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0895">RHSA-2015:0895-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1854">CVE-2015-1854</a>]</td> <td class="Text">RHSA-2015:0895: 389-ds-base security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150809</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0809">RHSA-2015:0809-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2005-1080">CVE-2005-1080</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0460">CVE-2015-0460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0469">CVE-2015-0469</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0470">CVE-2015-0470</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0477">CVE-2015-0477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0478">CVE-2015-0478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0480">CVE-2015-0480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0488">CVE-2015-0488</a>]</td> <td class="Text">RHSA-2015:0809: java-1.8.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150808</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0808">RHSA-2015:0808-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2005-1080">CVE-2005-1080</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0460">CVE-2015-0460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0469">CVE-2015-0469</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0477">CVE-2015-0477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0478">CVE-2015-0478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0480">CVE-2015-0480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0488">CVE-2015-0488</a>]</td> <td class="Text">RHSA-2015:0808: java-1.6.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150806</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0806">RHSA-2015:0806-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2005-1080">CVE-2005-1080</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0460">CVE-2015-0460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0469">CVE-2015-0469</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0477">CVE-2015-0477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0478">CVE-2015-0478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0480">CVE-2015-0480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0488">CVE-2015-0488</a>]</td> <td class="Text">RHSA-2015:0806: java-1.7.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150797</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0797">RHSA-2015:0797-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0255">CVE-2015-0255</a>]</td> <td class="Text">RHSA-2015:0797: xorg-x11-server security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150771</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0771">RHSA-2015:0771-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0801">CVE-2015-0801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0807">CVE-2015-0807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0813">CVE-2015-0813</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0815">CVE-2015-0815</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0816">CVE-2015-0816</a>]</td> <td class="Text">RHSA-2015:0771: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150767</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0767">RHSA-2015:0767-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8962">CVE-2014-8962</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9028">CVE-2014-9028</a>]</td> <td class="Text">RHSA-2015:0767: flac security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150766</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0766">RHSA-2015:0766-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0801">CVE-2015-0801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0807">CVE-2015-0807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0813">CVE-2015-0813</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0815">CVE-2015-0815</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0816">CVE-2015-0816</a>]</td> <td class="Text">RHSA-2015:0766: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150750</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0750">RHSA-2015:0750-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8161">CVE-2014-8161</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0241">CVE-2015-0241</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0243">CVE-2015-0243</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0244">CVE-2015-0244</a>]</td> <td class="Text">RHSA-2015:0750: postgresql security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150749</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0749">RHSA-2015:0749-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0191">CVE-2014-0191</a>]</td> <td class="Text">RHSA-2015:0749: libxml2 security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150729</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0729">RHSA-2015:0729-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1815">CVE-2015-1815</a>]</td> <td class="Text">RHSA-2015:0729: setroubleshoot security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150728</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0728">RHSA-2015:0728-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0283">CVE-2015-0283</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1827">CVE-2015-1827</a>]</td> <td class="Text">RHSA-2015:0728: ipa and slapi-nis security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150727</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0727">RHSA-2015:0727-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8159">CVE-2014-8159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1421">CVE-2015-1421</a>]</td> <td class="Text">RHSA-2015:0727: kernel-rt security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150726</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0726">RHSA-2015:0726-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8159">CVE-2014-8159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1421">CVE-2015-1421</a>]</td> <td class="Text">RHSA-2015:0726: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150718</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0718">RHSA-2015:0718-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0817">CVE-2015-0817</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0818">CVE-2015-0818</a>]</td> <td class="Text">RHSA-2015:0718: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150716</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0716">RHSA-2015:0716-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0209">CVE-2015-0209</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0286">CVE-2015-0286</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0287">CVE-2015-0287</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0288">CVE-2015-0288</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0289">CVE-2015-0289</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0292">CVE-2015-0292</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0293">CVE-2015-0293</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0703">CVE-2016-0703</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0704">CVE-2016-0704</a>]</td> <td class="Text">RHSA-2015:0716: openssl security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150700</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0700">RHSA-2015:0700-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8139">CVE-2014-8139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8140">CVE-2014-8140</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8141">CVE-2014-8141</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9636">CVE-2014-9636</a>]</td> <td class="Text">RHSA-2015:0700: unzip security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150696</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0696">RHSA-2015:0696-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9657">CVE-2014-9657</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9658">CVE-2014-9658</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9660">CVE-2014-9660</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9661">CVE-2014-9661</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9663">CVE-2014-9663</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9664">CVE-2014-9664</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9667">CVE-2014-9667</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9669">CVE-2014-9669</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9670">CVE-2014-9670</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9671">CVE-2014-9671</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9673">CVE-2014-9673</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9674">CVE-2014-9674</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9675">CVE-2014-9675</a>]</td> <td class="Text">RHSA-2015:0696: freetype security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150672</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0672">RHSA-2015:0672-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1349">CVE-2015-1349</a>]</td> <td class="Text">RHSA-2015:0672: bind security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150642</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0642">RHSA-2015:0642-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0822">CVE-2015-0822</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0827">CVE-2015-0827</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0831">CVE-2015-0831</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0836">CVE-2015-0836</a>]</td> <td class="Text">RHSA-2015:0642: thunderbird security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150535</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0535">RHSA-2015:0535-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7300">CVE-2014-7300</a>]</td> <td class="Text">RHSA-2015:0535: GNOME Shell security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150442</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0442">RHSA-2015:0442-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2010-5312">CVE-2010-5312</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2012-6662">CVE-2012-6662</a>]</td> <td class="Text">RHSA-2015:0442: ipa security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150439</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0439">RHSA-2015:0439-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4341">CVE-2014-4341</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4342">CVE-2014-4342</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4343">CVE-2014-4343</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4344">CVE-2014-4344</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4345">CVE-2014-4345</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5352">CVE-2014-5352</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5353">CVE-2014-5353</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9421">CVE-2014-9421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9422">CVE-2014-9422</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9423">CVE-2014-9423</a>]</td> <td class="Text">RHSA-2015:0439: krb5 security, bug fix and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150430</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0430">RHSA-2015:0430-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0189">CVE-2014-0189</a>]</td> <td class="Text">RHSA-2015:0430: virt-who security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150425</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0425">RHSA-2015:0425-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2653">CVE-2014-2653</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9278">CVE-2014-9278</a>]</td> <td class="Text">RHSA-2015:0425: openssh security, bug fix and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150416</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0416">RHSA-2015:0416-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8105">CVE-2014-8105</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8112">CVE-2014-8112</a>]</td> <td class="Text">RHSA-2015:0416: 389-ds-base security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150384</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0384">RHSA-2015:0384-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4040">CVE-2014-4040</a>]</td> <td class="Text">RHSA-2015:0384: powerpc-utils security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150383</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0383">RHSA-2015:0383-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4038">CVE-2014-4038</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4039">CVE-2014-4039</a>]</td> <td class="Text">RHSA-2015:0383: ppc64-diag security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150377</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0377">RHSA-2015:0377-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0247">CVE-2014-0247</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3575">CVE-2014-3575</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3693">CVE-2014-3693</a>]</td> <td class="Text">RHSA-2015:0377: libreoffice security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150349</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0349">RHSA-2015:0349-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3640">CVE-2014-3640</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7815">CVE-2014-7815</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7840">CVE-2014-7840</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8106">CVE-2014-8106</a>]</td> <td class="Text">RHSA-2015:0349: qemu-kvm security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150330</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0330">RHSA-2015:0330-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8964">CVE-2014-8964</a>]</td> <td class="Text">RHSA-2015:0330: pcre security and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150327</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0327">RHSA-2015:0327-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6040">CVE-2014-6040</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8121">CVE-2014-8121</a>]</td> <td class="Text">RHSA-2015:0327: glibc security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150325</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0325">RHSA-2015:0325-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-5704">CVE-2013-5704</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3581">CVE-2014-3581</a>]</td> <td class="Text">RHSA-2015:0325: httpd security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150323</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0323">RHSA-2015:0323-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8136">CVE-2014-8136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0236">CVE-2015-0236</a>]</td> <td class="Text">RHSA-2015:0323: libvirt security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150301</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0301">RHSA-2015:0301-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9273">CVE-2014-9273</a>]</td> <td class="Text">RHSA-2015:0301: hivex security, bug fix, and enhancement update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150290</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0290">RHSA-2015:0290-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3690">CVE-2014-3690</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3940">CVE-2014-3940</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7825">CVE-2014-7825</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7826">CVE-2014-7826</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8086">CVE-2014-8086</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8160">CVE-2014-8160</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8172">CVE-2014-8172</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8173">CVE-2014-8173</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8709">CVE-2014-8709</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8884">CVE-2014-8884</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0274">CVE-2015-0274</a>]</td> <td class="Text">RHSA-2015:0290: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150265</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0265">RHSA-2015:0265-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0822">CVE-2015-0822</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0827">CVE-2015-0827</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0831">CVE-2015-0831</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0836">CVE-2015-0836</a>]</td> <td class="Text">RHSA-2015:0265: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150252</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0252">RHSA-2015:0252-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0240">CVE-2015-0240</a>]</td> <td class="Text">RHSA-2015:0252: samba security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150166</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0166">RHSA-2015:0166-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3528">CVE-2014-3528</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3580">CVE-2014-3580</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8108">CVE-2014-8108</a>]</td> <td class="Text">RHSA-2015:0166: subversion security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150118</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0118">RHSA-2015:0118-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6568">CVE-2014-6568</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0374">CVE-2015-0374</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0381">CVE-2015-0381</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0382">CVE-2015-0382</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0391">CVE-2015-0391</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0411">CVE-2015-0411</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0432">CVE-2015-0432</a>]</td> <td class="Text">RHSA-2015:0118: mariadb security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150102</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0102">RHSA-2015:0102-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4171">CVE-2014-4171</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5471">CVE-2014-5471</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5472">CVE-2014-5472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7145">CVE-2014-7145</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7822">CVE-2014-7822</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7841">CVE-2014-7841</a>]</td> <td class="Text">RHSA-2015:0102: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150100</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0100">RHSA-2015:0100-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9130">CVE-2014-9130</a>]</td> <td class="Text">RHSA-2015:0100: libyaml security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150092</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0092">RHSA-2015:0092-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0235">CVE-2015-0235</a>]</td> <td class="Text">RHSA-2015:0092: glibc security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150085</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0085">RHSA-2015:0085-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3566">CVE-2014-3566</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6585">CVE-2014-6585</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6587">CVE-2014-6587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6591">CVE-2014-6591</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6593">CVE-2014-6593</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6601">CVE-2014-6601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0383">CVE-2015-0383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0395">CVE-2015-0395</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0407">CVE-2015-0407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0408">CVE-2015-0408</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0410">CVE-2015-0410</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0412">CVE-2015-0412</a>]</td> <td class="Text">RHSA-2015:0085: java-1.6.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150074</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0074">RHSA-2015:0074-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8157">CVE-2014-8157</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8158">CVE-2014-8158</a>]</td> <td class="Text">RHSA-2015:0074: jasper security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150067</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0067">RHSA-2015:0067-05</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3566">CVE-2014-3566</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6585">CVE-2014-6585</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6587">CVE-2014-6587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6591">CVE-2014-6591</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6593">CVE-2014-6593</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6601">CVE-2014-6601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0383">CVE-2015-0383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0395">CVE-2015-0395</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0407">CVE-2015-0407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0408">CVE-2015-0408</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0410">CVE-2015-0410</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0412">CVE-2015-0412</a>]</td> <td class="Text">RHSA-2015:0067: java-1.7.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150066</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0066">RHSA-2015:0066-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3570">CVE-2014-3570</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3571">CVE-2014-3571</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3572">CVE-2014-3572</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8275">CVE-2014-8275</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0204">CVE-2015-0204</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0205">CVE-2015-0205</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0206">CVE-2015-0206</a>]</td> <td class="Text">RHSA-2015:0066: openssl security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150046</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0046">RHSA-2015:0046-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8634">CVE-2014-8634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8638">CVE-2014-8638</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8639">CVE-2014-8639</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8641">CVE-2014-8641</a>]</td> <td class="Text">RHSA-2015:0046: firefox security and bug fix update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20150008</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0008">RHSA-2015:0008-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7823">CVE-2014-7823</a>]</td> <td class="Text">RHSA-2015:0008: libvirt security and bug fix update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20142024</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:2024">RHSA-2014:2024-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9293">CVE-2014-9293</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9294">CVE-2014-9294</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9295">CVE-2014-9295</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9296">CVE-2014-9296</a>]</td> <td class="Text">RHSA-2014:2024: ntp security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20142023</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:2023">RHSA-2014:2023-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7817">CVE-2014-7817</a>]</td> <td class="Text">RHSA-2014:2023: glibc security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20142021</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:2021">RHSA-2014:2021-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8137">CVE-2014-8137</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8138">CVE-2014-8138</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9029">CVE-2014-9029</a>]</td> <td class="Text">RHSA-2014:2021: jasper security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20142010</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:2010">RHSA-2014:2010-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9322">CVE-2014-9322</a>]</td> <td class="Text">RHSA-2014:2010: kernel security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141999</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1999">RHSA-2014:1999-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2004-2771">CVE-2004-2771</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7844">CVE-2014-7844</a>]</td> <td class="Text">RHSA-2014:1999: mailx security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141984</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1984">RHSA-2014:1984-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8500">CVE-2014-8500</a>]</td> <td class="Text">RHSA-2014:1984: bind security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141983</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1983">RHSA-2014:1983-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8091">CVE-2014-8091</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8092">CVE-2014-8092</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8093">CVE-2014-8093</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8094">CVE-2014-8094</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8095">CVE-2014-8095</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8096">CVE-2014-8096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8097">CVE-2014-8097</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8098">CVE-2014-8098</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8099">CVE-2014-8099</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8100">CVE-2014-8100</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8101">CVE-2014-8101</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8102">CVE-2014-8102</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8103">CVE-2014-8103</a>]</td> <td class="Text">RHSA-2014:1983: xorg-x11-server security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141976</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1976">RHSA-2014:1976-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-6435">CVE-2013-6435</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8118">CVE-2014-8118</a>]</td> <td class="Text">RHSA-2014:1976: rpm security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141971</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1971">RHSA-2014:1971-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-2929">CVE-2013-2929</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1739">CVE-2014-1739</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3181">CVE-2014-3181</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3182">CVE-2014-3182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3184">CVE-2014-3184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3185">CVE-2014-3185</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3186">CVE-2014-3186</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3631">CVE-2014-3631</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3673">CVE-2014-3673</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3687">CVE-2014-3687</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3688">CVE-2014-3688</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4027">CVE-2014-4027</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4652">CVE-2014-4652</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4654">CVE-2014-4654</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4655">CVE-2014-4655</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4656">CVE-2014-4656</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5045">CVE-2014-5045</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6410">CVE-2014-6410</a>]</td> <td class="Text">RHSA-2014:1971: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141956</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1956">RHSA-2014:1956-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3686">CVE-2014-3686</a>]</td> <td class="Text">RHSA-2014:1956: wpa_supplicant security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141948</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1948">RHSA-2014:1948-02</a>]</td> <td class="Text">RHSA-2014:1948: nss, nss-util, and nss-softokn security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141919</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1919">RHSA-2014:1919-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1587">CVE-2014-1587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1590">CVE-2014-1590</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1592">CVE-2014-1592</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1593">CVE-2014-1593</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1594">CVE-2014-1594</a>]</td> <td class="Text">RHSA-2014:1919: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141912</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1912">RHSA-2014:1912-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4975">CVE-2014-4975</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8080">CVE-2014-8080</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8090">CVE-2014-8090</a>]</td> <td class="Text">RHSA-2014:1912: ruby security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141870</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1870">RHSA-2014:1870-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0209">CVE-2014-0209</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0210">CVE-2014-0210</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0211">CVE-2014-0211</a>]</td> <td class="Text">RHSA-2014:1870: libXfont security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141861</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1861">RHSA-2014:1861-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2012-5615">CVE-2012-5615</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2494">CVE-2014-2494</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4207">CVE-2014-4207</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4243">CVE-2014-4243</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4258">CVE-2014-4258</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4260">CVE-2014-4260</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4274">CVE-2014-4274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4287">CVE-2014-4287</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6463">CVE-2014-6463</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6464">CVE-2014-6464</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6469">CVE-2014-6469</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6484">CVE-2014-6484</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6505">CVE-2014-6505</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6507">CVE-2014-6507</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6520">CVE-2014-6520</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6530">CVE-2014-6530</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6551">CVE-2014-6551</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6555">CVE-2014-6555</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6559">CVE-2014-6559</a>]</td> <td class="Text">RHSA-2014:1861: mariadb security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141846</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1846">RHSA-2014:1846-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8564">CVE-2014-8564</a>]</td> <td class="Text">RHSA-2014:1846: gnutls security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141827</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1827">RHSA-2014:1827-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6053">CVE-2014-6053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6054">CVE-2014-6054</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6055">CVE-2014-6055</a>]</td> <td class="Text">RHSA-2014:1827: kdenetwork security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141826</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1826">RHSA-2014:1826-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6051">CVE-2014-6051</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6052">CVE-2014-6052</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6053">CVE-2014-6053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6054">CVE-2014-6054</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6055">CVE-2014-6055</a>]</td> <td class="Text">RHSA-2014:1826: libvncserver security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141801</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1801">RHSA-2014:1801-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3675">CVE-2014-3675</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3676">CVE-2014-3676</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3677">CVE-2014-3677</a>]</td> <td class="Text">RHSA-2014:1801: shim security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141795</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1795">RHSA-2014:1795-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4337">CVE-2014-4337</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4338">CVE-2014-4338</a>]</td> <td class="Text">RHSA-2014:1795: cups-filters security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141767</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1767">RHSA-2014:1767-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3668">CVE-2014-3668</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3669">CVE-2014-3669</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3670">CVE-2014-3670</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3710">CVE-2014-3710</a>]</td> <td class="Text">RHSA-2014:1767: php security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141764</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1764">RHSA-2014:1764-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4877">CVE-2014-4877</a>]</td> <td class="Text">RHSA-2014:1764: wget security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141724</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1724">RHSA-2014:1724-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3611">CVE-2014-3611</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3645">CVE-2014-3645</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3646">CVE-2014-3646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4653">CVE-2014-4653</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5077">CVE-2014-5077</a>]</td> <td class="Text">RHSA-2014:1724: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141676</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1676">RHSA-2014:1676-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6421">CVE-2014-6421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6422">CVE-2014-6422</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6423">CVE-2014-6423</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6424">CVE-2014-6424</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6425">CVE-2014-6425</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6426">CVE-2014-6426</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6427">CVE-2014-6427</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6428">CVE-2014-6428</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6429">CVE-2014-6429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6430">CVE-2014-6430</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6431">CVE-2014-6431</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6432">CVE-2014-6432</a>]</td> <td class="Text">RHSA-2014:1676: wireshark security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141669</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1669">RHSA-2014:1669-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3615">CVE-2014-3615</a>]</td> <td class="Text">RHSA-2014:1669: qemu-kvm security and bug fix update (Low)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141655</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1655">RHSA-2014:1655-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3660">CVE-2014-3660</a>]</td> <td class="Text">RHSA-2014:1655: libxml2 security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141652</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1652">RHSA-2014:1652-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3513">CVE-2014-3513</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3567">CVE-2014-3567</a>]</td> <td class="Text">RHSA-2014:1652: openssl security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141635</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1635">RHSA-2014:1635-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1574">CVE-2014-1574</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1576">CVE-2014-1576</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1577">CVE-2014-1577</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1578">CVE-2014-1578</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1581">CVE-2014-1581</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1583">CVE-2014-1583</a>]</td> <td class="Text">RHSA-2014:1635: firefox security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141634</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1634">RHSA-2014:1634-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6457">CVE-2014-6457</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6502">CVE-2014-6502</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6504">CVE-2014-6504</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6506">CVE-2014-6506</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6511">CVE-2014-6511</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6512">CVE-2014-6512</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6517">CVE-2014-6517</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6519">CVE-2014-6519</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6531">CVE-2014-6531</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6558">CVE-2014-6558</a>]</td> <td class="Text">RHSA-2014:1634: java-1.6.0-openjdk security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141620</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1620">RHSA-2014:1620-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6457">CVE-2014-6457</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6502">CVE-2014-6502</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6504">CVE-2014-6504</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6506">CVE-2014-6506</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6511">CVE-2014-6511</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6512">CVE-2014-6512</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6517">CVE-2014-6517</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6519">CVE-2014-6519</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6531">CVE-2014-6531</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6558">CVE-2014-6558</a>]</td> <td class="Text">RHSA-2014:1620: java-1.7.0-openjdk security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141397</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1397">RHSA-2014:1397-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3634">CVE-2014-3634</a>]</td> <td class="Text">RHSA-2014:1397: rsyslog security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141359</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1359">RHSA-2014:1359-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5033">CVE-2014-5033</a>]</td> <td class="Text">RHSA-2014:1359: polkit-qt security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141352</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1352">RHSA-2014:1352-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3633">CVE-2014-3633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3657">CVE-2014-3657</a>]</td> <td class="Text">RHSA-2014:1352: libvirt security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141327</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1327">RHSA-2014:1327-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2497">CVE-2014-2497</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3478">CVE-2014-3478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3538">CVE-2014-3538</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3587">CVE-2014-3587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3597">CVE-2014-3597</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4670">CVE-2014-4670</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4698">CVE-2014-4698</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5120">CVE-2014-5120</a>]</td> <td class="Text">RHSA-2014:1327: php security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141319</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1319">RHSA-2014:1319-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4002">CVE-2013-4002</a>]</td> <td class="Text">RHSA-2014:1319: xerces-j2 security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141307</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1307">RHSA-2014:1307-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1568">CVE-2014-1568</a>]</td> <td class="Text">RHSA-2014:1307: nss security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141306</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1306">RHSA-2014:1306-06</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7169">CVE-2014-7169</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7186">CVE-2014-7186</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7187">CVE-2014-7187</a>]</td> <td class="Text">RHSA-2014:1306: bash security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141293</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1293">RHSA-2014:1293-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6271">CVE-2014-6271</a>]</td> <td class="Text">RHSA-2014:1293: bash security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141292</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1292">RHSA-2014:1292-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6269">CVE-2014-6269</a>]</td> <td class="Text">RHSA-2014:1292: haproxy security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141281</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1281">RHSA-2014:1281-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3917">CVE-2014-3917</a>]</td> <td class="Text">RHSA-2014:1281: kernel security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141172</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1172">RHSA-2014:1172-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3618">CVE-2014-3618</a>]</td> <td class="Text">RHSA-2014:1172: procmail security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141166</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1166">RHSA-2014:1166-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3577">CVE-2014-3577</a>]</td> <td class="Text">RHSA-2014:1166: jakarta-commons-httpclient security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141147</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1147">RHSA-2014:1147-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3609">CVE-2014-3609</a>]</td> <td class="Text">RHSA-2014:1147: squid security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141146</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1146">RHSA-2014:1146-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3577">CVE-2014-3577</a>]</td> <td class="Text">RHSA-2014:1146: httpcomponents-client security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141144</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1144">RHSA-2014:1144-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1562">CVE-2014-1562</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1567">CVE-2014-1567</a>]</td> <td class="Text">RHSA-2014:1144: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141110</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1110">RHSA-2014:1110-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0475">CVE-2014-0475</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5119">CVE-2014-5119</a>]</td> <td class="Text">RHSA-2014:1110: glibc security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141091</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1091">RHSA-2014:1091-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0240">CVE-2014-0240</a>]</td> <td class="Text">RHSA-2014:1091: mod_wsgi security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141073</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1073">RHSA-2014:1073-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1492">CVE-2014-1492</a>]</td> <td class="Text">RHSA-2014:1073: nss, nss-util, nss-softokn security, bug fix, and enhancement update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141052</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1052">RHSA-2014:1052-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3505">CVE-2014-3505</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3506">CVE-2014-3506</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3507">CVE-2014-3507</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3508">CVE-2014-3508</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3509">CVE-2014-3509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3510">CVE-2014-3510</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3511">CVE-2014-3511</a>]</td> <td class="Text">RHSA-2014:1052: openssl security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141034</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1034">RHSA-2014:1034-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0119">CVE-2014-0119</a>]</td> <td class="Text">RHSA-2014:1034: tomcat security update (Low)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141031</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1031">RHSA-2014:1031-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3562">CVE-2014-3562</a>]</td> <td class="Text">RHSA-2014:1031: 389-ds-base security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141023</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1023">RHSA-2014:1023-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0181">CVE-2014-0181</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2672">CVE-2014-2672</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2673">CVE-2014-2673</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2706">CVE-2014-2706</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3534">CVE-2014-3534</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4667">CVE-2014-4667</a>]</td> <td class="Text">RHSA-2014:1023: kernel security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141013</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1013">RHSA-2014:1013-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-7345">CVE-2013-7345</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0207">CVE-2014-0207</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0237">CVE-2014-0237</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0238">CVE-2014-0238</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3479">CVE-2014-3479</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3480">CVE-2014-3480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3487">CVE-2014-3487</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3515">CVE-2014-3515</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4049">CVE-2014-4049</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4721">CVE-2014-4721</a>]</td> <td class="Text">RHSA-2014:1013: php security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141011</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1011">RHSA-2014:1011-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3490">CVE-2014-3490</a>]</td> <td class="Text">RHSA-2014:1011: resteasy-base security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20141008</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1008">RHSA-2014:1008-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3560">CVE-2014-3560</a>]</td> <td class="Text">RHSA-2014:1008: samba security and bug fix update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140927</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0927">RHSA-2014:0927-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4148">CVE-2013-4148</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4149">CVE-2013-4149</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4150">CVE-2013-4150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4151">CVE-2013-4151</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4527">CVE-2013-4527</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4529">CVE-2013-4529</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4535">CVE-2013-4535</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4536">CVE-2013-4536</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4541">CVE-2013-4541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4542">CVE-2013-4542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-6399">CVE-2013-6399</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0182">CVE-2014-0182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0222">CVE-2014-0222</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0223">CVE-2014-0223</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3461">CVE-2014-3461</a>]</td> <td class="Text">RHSA-2014:0927: qemu-kvm security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140923</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0923">RHSA-2014:0923-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4699">CVE-2014-4699</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4943">CVE-2014-4943</a>]</td> <td class="Text">RHSA-2014:0923: kernel security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140921</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0921">RHSA-2014:0921-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4352">CVE-2013-4352</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0117">CVE-2014-0117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0118">CVE-2014-0118</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0226">CVE-2014-0226</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0231">CVE-2014-0231</a>]</td> <td class="Text">RHSA-2014:0921: httpd security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140919</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0919">RHSA-2014:0919-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1547">CVE-2014-1547</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1555">CVE-2014-1555</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1556">CVE-2014-1556</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1557">CVE-2014-1557</a>]</td> <td class="Text">RHSA-2014:0919: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140916</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0916">RHSA-2014:0916-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1544">CVE-2014-1544</a>]</td> <td class="Text">RHSA-2014:0916: nss and nspr security update (Critical)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140914</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0914">RHSA-2014:0914-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0179">CVE-2014-0179</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5177">CVE-2014-5177</a>]</td> <td class="Text">RHSA-2014:0914: libvirt security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140907</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0907">RHSA-2014:0907-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2490">CVE-2014-2490</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4209">CVE-2014-4209</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4216">CVE-2014-4216</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4218">CVE-2014-4218</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4219">CVE-2014-4219</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4244">CVE-2014-4244</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4252">CVE-2014-4252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4262">CVE-2014-4262</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4263">CVE-2014-4263</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4266">CVE-2014-4266</a>]</td> <td class="Text">RHSA-2014:0907: java-1.6.0-openjdk security and bug fix update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140889</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0889">RHSA-2014:0889-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2483">CVE-2014-2483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2490">CVE-2014-2490</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4209">CVE-2014-4209</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4216">CVE-2014-4216</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4218">CVE-2014-4218</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4219">CVE-2014-4219</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4221">CVE-2014-4221</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4223">CVE-2014-4223</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4244">CVE-2014-4244</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4252">CVE-2014-4252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4262">CVE-2014-4262</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4263">CVE-2014-4263</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4266">CVE-2014-4266</a>]</td> <td class="Text">RHSA-2014:0889: java-1.7.0-openjdk security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140867</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0867">RHSA-2014:0867-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0178">CVE-2014-0178</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0244">CVE-2014-0244</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3493">CVE-2014-3493</a>]</td> <td class="Text">RHSA-2014:0867: samba security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140861</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0861">RHSA-2014:0861-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4607">CVE-2014-4607</a>]</td> <td class="Text">RHSA-2014:0861: lzo security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140827</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0827">RHSA-2014:0827-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0075">CVE-2014-0075</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0096">CVE-2014-0096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0099">CVE-2014-0099</a>]</td> <td class="Text">RHSA-2014:0827: tomcat security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140790</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0790">RHSA-2014:0790-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3430">CVE-2014-3430</a>]</td> <td class="Text">RHSA-2014:0790: dovecot security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140786</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0786">RHSA-2014:0786-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0206">CVE-2014-0206</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1737">CVE-2014-1737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1738">CVE-2014-1738</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2568">CVE-2014-2568</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2851">CVE-2014-2851</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3144">CVE-2014-3144</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3145">CVE-2014-3145</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3153">CVE-2014-3153</a>]</td> <td class="Text">RHSA-2014:0786: kernel security, bug fix, and enhancement update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140741</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0741">RHSA-2014:0741-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1533">CVE-2014-1533</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1538">CVE-2014-1538</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1541">CVE-2014-1541</a>]</td> <td class="Text">RHSA-2014:0741: firefox security update (Critical)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140704</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0704">RHSA-2014:0704-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2894">CVE-2014-2894</a>]</td> <td class="Text">RHSA-2014:0704: qemu-kvm security and bug fix update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140703</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0703">RHSA-2014:0703-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-6370">CVE-2013-6370</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-6371">CVE-2013-6371</a>]</td> <td class="Text">RHSA-2014:0703: json-c security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140702</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0702">RHSA-2014:0702-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0384">CVE-2014-0384</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2419">CVE-2014-2419</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2430">CVE-2014-2430</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2431">CVE-2014-2431</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2432">CVE-2014-2432</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2436">CVE-2014-2436</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2438">CVE-2014-2438</a>]</td> <td class="Text">RHSA-2014:0702: mariadb security update (Moderate)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140687</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0687">RHSA-2014:0687-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3467">CVE-2014-3467</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3468">CVE-2014-3468</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3469">CVE-2014-3469</a>]</td> <td class="Text">RHSA-2014:0687: libtasn1 security update (Moderate)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140686</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0686">RHSA-2014:0686-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4286">CVE-2013-4286</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4322">CVE-2013-4322</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0186">CVE-2014-0186</a>]</td> <td class="Text">RHSA-2014:0686: tomcat security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140685</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0685">RHSA-2014:0685-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0429">CVE-2014-0429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0446">CVE-2014-0446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0451">CVE-2014-0451</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0452">CVE-2014-0452</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0453">CVE-2014-0453</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0456">CVE-2014-0456</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0457">CVE-2014-0457</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0458">CVE-2014-0458</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0460">CVE-2014-0460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0461">CVE-2014-0461</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1876">CVE-2014-1876</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2397">CVE-2014-2397</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2398">CVE-2014-2398</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2403">CVE-2014-2403</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2412">CVE-2014-2412</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2414">CVE-2014-2414</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2421">CVE-2014-2421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2423">CVE-2014-2423</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2427">CVE-2014-2427</a>]</td> <td class="Text">RHSA-2014:0685: java-1.6.0-openjdk security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140684</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0684">RHSA-2014:0684-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3465">CVE-2014-3465</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3466">CVE-2014-3466</a>]</td> <td class="Text">RHSA-2014:0684: gnutls security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140680</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0680">RHSA-2014:0680-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0224">CVE-2014-0224</a>]</td> <td class="Text">RHSA-2014:0680: openssl098e security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140679</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0679">RHSA-2014:0679-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2010-5298">CVE-2010-5298</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0195">CVE-2014-0195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0198">CVE-2014-0198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0221">CVE-2014-0221</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0224">CVE-2014-0224</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3470">CVE-2014-3470</a>]</td> <td class="Text">RHSA-2014:0679: openssl security update (Important)</td> </tr> <tr class="resultgoodB"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140678</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0678">RHSA-2014:0678-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0196">CVE-2014-0196</a>]</td> <td class="Text">RHSA-2014:0678: kernel security update (Important)</td> </tr> <tr class="resultgoodA"> <td class="Text" align="center">oval:com.redhat.rhsa:def:20140675</td> <td class="Text" align="center">false</td> <td class="Text" align="center">patch</td> <td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0675">RHSA-2014:0675-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0429">CVE-2014-0429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0446">CVE-2014-0446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0451">CVE-2014-0451</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0452">CVE-2014-0452</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0453">CVE-2014-0453</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0454">CVE-2014-0454</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0455">CVE-2014-0455</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0456">CVE-2014-0456</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0457">CVE-2014-0457</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0458">CVE-2014-0458</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0459">CVE-2014-0459</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0460">CVE-2014-0460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0461">CVE-2014-0461</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1876">CVE-2014-1876</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2397">CVE-2014-2397</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2398">CVE-2014-2398</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2402">CVE-2014-2402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2403">CVE-2014-2403</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2412">CVE-2014-2412</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2413">CVE-2014-2413</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2414">CVE-2014-2414</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2421">CVE-2014-2421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2423">CVE-2014-2423</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2427">CVE-2014-2427</a>]</td> <td class="Text">RHSA-2014:0675: java-1.7.0-openjdk security update (Critical)</td> </tr> </table> </body> </html>
704,680
Common Lisp
.l
5,515
118.866002
5,286
0.662532
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
791e9b66873a9aa79e7e3a2d4aba3c6eefb423597b5a1a7a71221c5b60153764
4,215
[ -1 ]
4,217
Makefile
atgreen_red-light-green-light/rlgl/Makefile
#! /usr/bin/make # # Makefile for Golang projects, v2 # # Features: # - uses github.com/Masterminds/glide to manage dependencies and uses GO15VENDOREXPERIMENT # - runs ginkgo tests recursively, computes code coverage report # - runs gofmt and go vet # - prepares code coverage so travis-ci can upload it and produce badges for README.md # - build for linux/amd64, linux/arm, darwin/amd64, windows/amd64 # - just 'make' builds for local OS/arch # - produces .tgz/.zip build output # - can bundle additional files into archive # - sets a VERSION variable in the app # - to include the build status and code coverage badge in CI use (replace NAME by what # you set $(NAME) to further down, and also replace magnum.travis-ci.com by travis-ci.org for # publicly accessible repos [sigh]): # [![Build Status](https://magnum.travis-ci.com/rightscale/NAME.svg?token=4Q13wQTY4zqXgU7Edw3B&branch=master)](https://magnum.travis-ci.com/rightscale/NAME # ![Code Coverage](https://s3.amazonaws.com/rs-code-coverage/NAME/cc_badge_master.svg) # # Top-level targets: # default: compile the program, you can thus use make && ./NAME -options ... # build: builds binaries for linux and darwin # test: runs unit tests recursively and produces code coverage stats and shows them # travis-test: just runs unit tests recursively # clean: removes build stuff # name of this app, used as basename for almost everything NAME=rlgl #=== below this line ideally remains unchanged, add new targets at the end === # dependencies that are used by the build&test process, these need to be installed in the # global Go env and not in the vendor sub-tree DEPEND=golang.org/x/tools/cmd/cover github.com/onsi/ginkgo/ginkgo \ github.com/onsi/gomega github.com/rlmcpherson/s3gof3r/gof3r \ github.com/Masterminds/glide golang.org/x/lint/golint TRAVIS_BRANCH?=dev DATE=$(shell date '+%F %T') TRAVIS_COMMIT?=$(shell git symbolic-ref HEAD | cut -d"/" -f 3) GO15VENDOREXPERIMENT=1 export GO15VENDOREXPERIMENT # produce a version string that is embedded into the binary that captures the branch, the date # and the commit we're building. This works particularly well if you are using release branch # names of the form "v1.2.3" VERSION=$(NAME) $(TRAVIS_BRANCH) - $(DATE) - $(TRAVIS_COMMIT) VFLAG=-X 'main.VERSION=$(VERSION)' .PHONY: depend clean default # the default target builds a binary in the top-level dir for whatever the local OS is # it does not depend on 'depend' 'cause it's a pain to have that run every time you hit 'make' # instead you get to 'make depend' manually once default: $(NAME) $(NAME): $(shell find . -name \*.go) go build -ldflags "$(VFLAG)" -o $(NAME) . # the standard build produces a "local" executable, a linux tgz, and a darwin (macos) tgz # uncomment and join the windows zip if you need it build: $(NAME) build/$(NAME)-linux-amd64.tgz build/$(NAME)-linux-s390x.tgz build/$(NAME)-linux-ppc64le.tgz build/$(NAME)-darwin-amd64.tgz build/$(NAME)-linux-arm.tgz build/$(NAME)-windows-amd64.zip # create a tgz with the binary and any artifacts that are necessary # note the hack to allow for various GOOS & GOARCH combos, sigh build/$(NAME)-%.tgz: *.go rm -rf build/$(NAME) mkdir -p build/$(NAME) tgt=$*; GOOS=$${tgt%-*} GOARCH=$${tgt#*-} go build -ldflags "$(VFLAG)" -o build/$(NAME)/$(NAME) . chmod +x build/$(NAME)/$(NAME) cp README.md build/$(NAME)/ tar -zcf $@ -C build ./$(NAME) rm -r build/$(NAME) build/$(NAME)-%.zip: *.go rm -rf build/$(NAME) mkdir -p build/$(NAME) tgt=$*; GOOS=$${tgt%-*} GOARCH=$${tgt#*-} go build -ldflags "$(VFLAG)" -o build/$(NAME)/$(NAME).exe . chmod +x build/$(NAME)/$(NAME).exe cp README.md build/$(NAME)/ (cd build; zip -r `basename $@` $(NAME)) rm -r build/$(NAME) # Installing build dependencies. You will need to run this once manually when you clone the repo depend: go get -v $(DEPEND) glide install clean: rm -rf build .vendor/pkg rlgl *~ # run gofmt and complain if a file is out of compliance # run go vet and similarly complain if there are issues # run go lint and complain if there are issues # TODO: go tool vet is currently broken with the vendorexperiement lint: @if gofmt -l . | egrep -v ^vendor/ | grep .go; then \ echo "^- Repo contains improperly formatted go files; run gofmt -w *.go" && exit 1; \ else echo "All .go files formatted correctly"; fi #go tool vet -v -composites=false *.go #go tool vet -v -composites=false **/*.go for pkg in $$(go list ./... |grep -v /vendor/); do golint $$pkg; done travis-test: cover # running ginkgo twice, sadly, the problem is that -cover modifies the source code with the effect # that if there are errors the output of gingko refers to incorrect line numbers # tip: if you don't like colors use gingkgo -r -noColor test: lint ginkgo -r -skipPackage vendor --randomizeAllSpecs --randomizeSuites --failOnPending race: lint ginkgo -r -skipPackage vendor --randomizeAllSpecs --randomizeSuites --failOnPending --race cover: lint ginkgo -r -skipPackage vendor --randomizeAllSpecs --randomizeSuites --failOnPending -cover @for d in `echo */*suite_test.go`; do \ dir=`dirname $$d`; \ (cd $$dir; go test -ginkgo.randomizeAllSpecs -ginkgo.failOnPending -cover -coverprofile $$dir_x.coverprofile -coverpkg $$(go list ./...|egrep -v vendor)); \ done @rm -f _total @for f in `find . -name \*.coverprofile`; do tail -n +2 $$f >>_total; done @echo 'mode: atomic' >total.coverprofile @awk -f merge-profiles.awk <_total >>total.coverprofile COVERAGE=$$(go tool cover -func=total.coverprofile | grep "^total:" | grep -o "[0-9\.]*");\ echo "*** Code Coverage is $$COVERAGE% ***"
5,620
Common Lisp
.l
109
49.834862
197
0.726561
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
94a04fd55fb295e0bfe55d4ab1aee4ef044ff1ab87e877711fc588eb18a68b47
4,217
[ -1 ]
4,218
rlgl.go
atgreen_red-light-green-light/rlgl/rlgl.go
// rlgl.go - Copyright 2018-2022 Anthony Green <[email protected]> // // This program is free software: you can redistribute it and/or // modify it under the terms of the GNU Affero General Public License // as published by the Free Software Foundation, either version 3 of // the License, or (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU // Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public // License along with this program. If not, see // <http://www.gnu.org/licenses/>. package main import ( "bytes" "encoding/base64" "encoding/hex" "encoding/json" "fmt" "io" "io/ioutil" "log" "mime/multipart" "net/http" "net/url" "os" "regexp" "strings" "time" "crypto/ecdsa" "crypto/elliptic" "crypto/rand" "crypto/x509" "encoding/pem" "github.com/fatih/color" "github.com/naoina/toml" "github.com/urfave/cli/v2" ) var ( // FIXME: get version from git, as it done in rlgl-server.lisp VERSION = "undefined" red = color.New(color.FgRed).SprintFunc() cyan = color.New(color.FgCyan).SprintFunc() ) type Config struct { Host string Key string Proxy string ProxyAuth string } func output(s string) { fmt.Printf("%s %s\n", cyan("rlgl"), s) } func exitErr(err error) { output(red(err.Error())) os.Exit(2) } func make_keys(path string) { privateKey, _ := ecdsa.GenerateKey(elliptic.P384(), rand.Reader) publicKey := &privateKey.PublicKey x509bytes, _ := x509.MarshalECPrivateKey(privateKey) var pemPrivateBlock = &pem.Block{ Type: "EC PRIVATE KEY", Bytes: x509bytes, } x509bytesPub, _ := x509.MarshalPKIXPublicKey(publicKey) var pemPublicBlock = &pem.Block{ Type: "PUBLIC KEY", Bytes: x509bytesPub, } cfgdir := basedir(path) pemPrivateFile, err := os.Create(cfgdir + "/private_key.pem") if err != nil { fmt.Println(err) os.Exit(1) } err = pem.Encode(pemPrivateFile, pemPrivateBlock) if err != nil { fmt.Println(err) os.Exit(1) } pemPrivateFile.Close() err = os.Chmod(cfgdir+"/private_key.pem", 0600) if err != nil { log.Fatal(err) } pemPublicFile, err := os.Create(cfgdir + "/public_key.pem") if err != nil { fmt.Println(err) os.Exit(1) } err = pem.Encode(pemPublicFile, pemPublicBlock) if err != nil { fmt.Println(err) os.Exit(1) } pemPublicFile.Close() err = os.Chmod(cfgdir+"/public_key.pem", 0644) if err != nil { log.Fatal(err) } } func (c *Config) Write(path string) { cfgdir := basedir(path) // create config dir if not exist if _, err := os.Stat(cfgdir); err != nil { err = os.MkdirAll(cfgdir, 0755) if err != nil { exitErr(fmt.Errorf("failed to initialize config dir [%s]: %s", cfgdir, err)) } } file, err := os.OpenFile(path, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600) if err != nil { exitErr(fmt.Errorf("failed to open config for writing: %s", err)) } writer := toml.NewEncoder(file) err = writer.Encode(c) if err != nil { exitErr(fmt.Errorf("failed to write config: %s", err)) } } // determine config path from environment func getConfigPath() (path string, exists bool) { userHome, ok := os.LookupEnv("HOME") if !ok { exitErr(fmt.Errorf("$HOME not set")) } path = fmt.Sprintf("%s/.rlgl/config", userHome) // default path if xdgSupport() { xdgHome, ok := os.LookupEnv("XDG_CONFIG_HOME") if !ok { xdgHome = fmt.Sprintf("%s/.config", userHome) } path = fmt.Sprintf("%s/rlgl/config", xdgHome) } if _, err := os.Stat(path); err == nil { exists = true } return path, exists } func basedir(path string) string { parts := strings.Split(path, "/") return strings.Join((parts[0 : len(parts)-1]), "/") } // Test for environment supporting XDG spec func xdgSupport() bool { re := regexp.MustCompile("^XDG_*") for _, e := range os.Environ() { if re.FindAllString(e, 1) != nil { return true } } return false } func setProxy(proxy string, auth string) { var transport *http.Transport if proxy != "" { proxyUrl, err := url.Parse(proxy) if err != nil { log.Fatal(err) } if auth != "" { basicAuth := "Basic " + base64.StdEncoding.EncodeToString([]byte(auth)) hdr := http.Header{} hdr.Add("Proxy-Authorization", basicAuth) transport = &http.Transport{ Proxy: http.ProxyURL(proxyUrl), ProxyConnectHeader: hdr, } } else { transport = &http.Transport{ Proxy: http.ProxyURL(proxyUrl), } } http.DefaultTransport = transport } } func SendPostRequest(config *Config, url string, filename string, filetype string) []byte { file, err := os.Open(filename) if err != nil { log.Fatal(err) } defer file.Close() body := &bytes.Buffer{} writer := multipart.NewWriter(body) part, err := writer.CreateFormFile(filetype, file.Name()) if err != nil { log.Fatal(err) } _, err = io.Copy(part, file) if err != nil { log.Fatal(err) } writer.Close() request, err := http.NewRequest("POST", url, body) if err != nil { log.Fatal(err) } var bearer = "Bearer " + config.Key request.Header.Add("Authorization", bearer) request.Header.Add("Content-Type", writer.FormDataContentType()) client := &http.Client{} response, err := client.Do(request) if err != nil { log.Fatal(err) } defer response.Body.Close() content, err := ioutil.ReadAll(response.Body) if err != nil { log.Fatal(err) } return content } func loadPrivateKey(cfgdir string) (*ecdsa.PrivateKey, error) { priv, err := ioutil.ReadFile(cfgdir + "/private_key.pem") if err != nil { log.Fatal(err) } block, _ := pem.Decode(priv) if block == nil { log.Fatal("Failed to decode PEM private key") } var parsedKey interface{} parsedKey, err = x509.ParseECPrivateKey(block.Bytes) if err != nil { log.Fatal(err) } switch parsedKey := parsedKey.(type) { case *ecdsa.PrivateKey: return parsedKey, nil } log.Fatal("Unsupported private key type") return nil, nil } func main() { var policy string var key string var proxy string var proxyauth string var signingkey string var title string var config Config labels := cli.NewStringSlice() cfgPath, cfgExists := getConfigPath() if !cfgExists { config.Write(cfgPath) } else { f, err := os.Open(cfgPath) if err != nil { exitErr(err) } defer f.Close() if err := toml.NewDecoder(f).Decode(&config); err != nil { exitErr(err) } } app := cli.NewApp() app.Commands = []*cli.Command{ { Name: "login", Aliases: []string{"l"}, Usage: "login to Red Light Green Light server", Flags: []cli.Flag{ &cli.StringFlag{ Name: "key", Value: "", Usage: "API key", Destination: &key, }, &cli.StringFlag{ Name: "proxy", Value: "", Usage: "proxy URL (eg. http://HOST:PORT)", Destination: &proxy, }, &cli.StringFlag{ Name: "proxy-auth", Value: "", Usage: "proxy basic authentication (eg. USERNAME:PASSWORD)", Destination: &proxyauth, }, &cli.StringFlag{ Name: "signing-key", Value: "", Usage: "optional private signing key", Destination: &signingkey, }, }, Action: func(c *cli.Context) error { if c.NArg() == 0 { exitErr(fmt.Errorf("Missing server URL")) } if key == "" { var slash string if strings.HasSuffix(c.Args().First(), "/") { slash = "" } else { slash = "/" } exitErr(fmt.Errorf("Missing API key. Generate a new one at %s%sget-api-key", c.Args().First(), slash)) } setProxy(proxy, proxyauth) response, err := http.Get(fmt.Sprintf("%s/login", c.Args().First())) if err != nil { exitErr(err) } responseData, err := ioutil.ReadAll(response.Body) if err != nil { log.Fatal(err) } fmt.Println(string(responseData)) config.Host = c.Args().First() config.Key = key config.Proxy = proxy config.ProxyAuth = proxyauth config.Write(cfgPath) if signingkey == "" { make_keys(cfgPath) } else { data, err := ioutil.ReadFile(signingkey) if err != nil { log.Fatal(err) } err = ioutil.WriteFile(basedir(cfgPath)+"/private_key.pem", data, 0400) if err != nil { log.Fatal(err) } } return nil }, }, { Name: "log", Usage: "log evaluations", Flags: []cli.Flag{ &cli.StringSliceFlag{ Name: "label", Value: labels, Aliases: []string{"l"}, Usage: "set label `KEY=VALUE`", }, }, Action: func(c *cli.Context) error { labels := make(map[string]string) for _, s := range c.StringSlice("label") { x := strings.Split(s, "=") labels[x[0]] = x[1] } if config.Host == "" { exitErr(fmt.Errorf("Login to server first")) } if c.NArg() != 0 { exitErr(fmt.Errorf("Too many arguments")) } setProxy(config.Proxy, config.ProxyAuth) labelsValue, _ := json.Marshal(labels); response, err := http.Get(fmt.Sprintf("%s/report-log?labels=\"%s\"", config.Host, url.QueryEscape(base64.StdEncoding.EncodeToString([]byte(string(labelsValue)))))) if err != nil { exitErr(err) } responseData, err := ioutil.ReadAll(response.Body) if err != nil { log.Fatal(err) } fmt.Print(string(responseData)) return nil }, }, { Name: "verify", Aliases: []string{"v"}, Usage: "verify document sigstore record", Action: func(c *cli.Context) error { if config.Host == "" { exitErr(fmt.Errorf("Login to server first")) } if c.NArg() == 0 { exitErr(fmt.Errorf("Missing report argument")) } else if c.NArg() > 1 { exitErr(fmt.Errorf("Too may arguments")) } setProxy(config.Proxy, config.ProxyAuth) if !strings.HasPrefix(c.Args().First(), "RLGL-") { exitErr(fmt.Errorf("expecting a document ID, but got %s", c.Args().First())) } request, err := http.NewRequest("GET", fmt.Sprintf("%s/verify?id=%s", config.Host, c.Args().First()), nil) if err != nil { log.Fatal(err) } var bearer = "Bearer " + config.Key request.Header.Add("Authorization", bearer) request.Header.Add("Content-Type", "text") client := &http.Client{} response, err := client.Do(request) if err != nil { log.Fatal(err) } defer response.Body.Close() responseData, err := ioutil.ReadAll(response.Body) if err != nil { log.Fatal(err) } fmt.Print(string(responseData)) return nil }, }, { Name: "new-policy-bound-api-key", Usage: "create a new policy bound API key", Action: func(c *cli.Context) error { if config.Host == "" { exitErr(fmt.Errorf("Login to server first")) } if c.NArg() == 0 { exitErr(fmt.Errorf("Missing policy argument")) } else if c.NArg() > 1 { exitErr(fmt.Errorf("Too may arguments")) } setProxy(config.Proxy, config.ProxyAuth) values := map[string]string{"policy": c.Args().First()} jsonValue, _ := json.Marshal(values) request, err := http.NewRequest("POST", fmt.Sprintf("%s/new-policy-bound-api-key", config.Host), bytes.NewBufferString(string(jsonValue))) if err != nil { log.Fatal(err) } var bearer = "Bearer " + config.Key request.Header.Add("Authorization", bearer) request.Header.Add("Content-Type", "text") client := &http.Client{} response, err := client.Do(request) if err != nil { log.Fatal(err) } defer response.Body.Close() responseData, err := ioutil.ReadAll(response.Body) if err != nil { log.Fatal(err) } fmt.Print(string(responseData)) return nil }, }, { Name: "baseline", Aliases: []string{"b"}, Usage: "generate baseline XFAIL regression policy", Action: func(c *cli.Context) error { if config.Host == "" { exitErr(fmt.Errorf("Login to server first")) } if c.NArg() == 0 { exitErr(fmt.Errorf("Missing report argument")) } else if c.NArg() > 1 { exitErr(fmt.Errorf("Too may arguments")) } setProxy(config.Proxy, config.ProxyAuth) if !strings.HasPrefix(c.Args().First(), "RLGL-") { exitErr(fmt.Errorf("expecting a document ID, but got %s", c.Args().First())) } request, err := http.NewRequest("GET", fmt.Sprintf("%s/get-baseline-xfail-policy?id=%s", config.Host, c.Args().First()), nil) if err != nil { log.Fatal(err) } var bearer = "Bearer " + config.Key request.Header.Add("Authorization", bearer) request.Header.Add("Content-Type", "text") client := &http.Client{} response, err := client.Do(request) if err != nil { log.Fatal(err) } defer response.Body.Close() responseData, err := ioutil.ReadAll(response.Body) if err != nil { log.Fatal(err) } fmt.Print(string(responseData)) return nil }, }, { Name: "evaluate", Aliases: []string{"e"}, Usage: "evaluate test results", Flags: []cli.Flag{ &cli.StringFlag{ Name: "policy", Value: "", Usage: "evaluation policy", Destination: &policy, }, &cli.StringSliceFlag{ Name: "label", Value: labels, Aliases: []string{"l"}, Usage: "set label `KEY=VALUE`", }, &cli.StringFlag{ Name: "title", Value: "", Usage: "report title", Destination: &title, }, }, Action: func(c *cli.Context) error { labels := make(map[string]string) for _, s := range c.StringSlice("label") { x := strings.Split(s, "=") labels[x[0]] = x[1] } if (config.Host == "") || (config.Key == "") { exitErr(fmt.Errorf("Login to server first")) } if policy == "" { exitErr(fmt.Errorf("Missing policy")) } if c.NArg() == 0 { exitErr(fmt.Errorf("Missing report")) } setProxy(config.Proxy, config.ProxyAuth) var n string var name string message := SendPostRequest(&config, fmt.Sprintf("%s/upload", config.Host), c.Args().Get(0), "bin") n = string(message) f, err := os.Open(c.Args().Get(0)) if err != nil { log.Fatal(err) } defer f.Close() labelsValue, _ := json.Marshal(labels); values := map[string]string{"policy": policy, "name": name, "ref": n, "labels": string(labelsValue)} if title != "" { values["title"] = title } jsonValue, _ := json.Marshal(values) request, err := http.NewRequest("POST", fmt.Sprintf("%s/evaluate", config.Host), bytes.NewBufferString(string(jsonValue))) if err != nil { log.Fatal(err) } var bearer = "Bearer " + config.Key request.Header.Add("Authorization", bearer) request.Header.Add("Content-Type", "application/json") client := &http.Client{} response, err := client.Do(request) if err != nil { log.Fatal(err) } defer response.Body.Close() responseData, err := ioutil.ReadAll(response.Body) if err != nil { log.Fatal(err) } if responseData[0] != '{' { log.Fatal(string(responseData)) } var result map[string]interface{} err = json.Unmarshal([]byte(responseData), &result) if err != nil { log.Fatal(err) } cfgdir := basedir(cfgPath) var key, _ = loadPrivateKey(cfgdir) var data []byte data, err = hex.DecodeString(fmt.Sprintf("%s", result["digest"])) if err != nil { log.Fatal(err) } var r []byte r, err = key.Sign(rand.Reader, data, nil) if err != nil { log.Fatal(err) } values = map[string]string{"signature": base64.StdEncoding.EncodeToString(r), "id": fmt.Sprintf("%s", result["callback"])} jsonValue, _ = json.Marshal(values) request, err = http.NewRequest("POST", fmt.Sprintf("%s/callback", config.Host), bytes.NewBufferString(string(jsonValue))) if err != nil { log.Fatal(err) } bearer = "Bearer " + config.Key request.Header.Add("Authorization", bearer) request.Header.Add("Content-Type", "text") client = &http.Client{} response, err = client.Do(request) if err != nil { log.Fatal(err) } defer response.Body.Close() _, err = ioutil.ReadAll(response.Body) if err != nil { log.Fatal(err) } fmt.Printf("%s: %s (sha3/256: %s)\n", result["colour"], result["url"], result["digest"]) if result["colour"] == "GREEN" { os.Exit(0) } else { if result["colour"] == "RED" { os.Exit(1) } else { os.Exit(2) } } return nil }, }, } app.Name = "rlgl" app.Version = VERSION app.Copyright = "(c) 2018-2022 Anthony Green" app.Compiled = time.Now() app.Authors = []*cli.Author{ &cli.Author{ Name: "Anthony Green", Email: "[email protected]", }, } app.Usage = "Red Light Green Light" app.Action = func(c *cli.Context) error { err := cli.ShowAppHelp(c) if err != nil { log.Fatal(err) } return nil } err := app.Run(os.Args) if err != nil { log.Fatal(err) } }
17,709
Common Lisp
.l
634
23.157729
167
0.612724
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
0edb1c8384f0239ac37ca690c4c8be44eb064c4b1494f2953f6f848f9e0c3dc9
4,218
[ -1 ]
4,219
glide.yaml
atgreen_red-light-green-light/rlgl/glide.yaml
package: . import: - package: github.com/fatih/color version: ^1.7.0 - package: github.com/naoina/toml version: ^0.1.1 - package: github.com/urfave/cli version: ^1.20.0
175
Common Lisp
.l
8
20.125
33
0.724551
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
3f62d9c6476889e2fd44853d764a9ab6aa59f7ffdbe35fb8758f66b94f62d1e6
4,219
[ -1 ]
4,220
rlgl.svg
atgreen_red-light-green-light/images/rlgl.svg
<?xml version="1.0" encoding="UTF-8" standalone="no"?> <!-- Generator: Adobe Illustrator 19.0.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) --> <svg xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:cc="http://creativecommons.org/ns#" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:svg="http://www.w3.org/2000/svg" xmlns="http://www.w3.org/2000/svg" xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd" xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape" version="1.1" id="Layer_1" x="0px" y="0px" viewBox="0 0 496.162 496.162" style="enable-background:new 0 0 496.162 496.162;" xml:space="preserve" sodipodi:docname="rlgl.svg" inkscape:version="0.92.3 (2405546, 2018-03-11)"><metadata id="metadata59"><rdf:RDF><cc:Work rdf:about=""><dc:format>image/svg+xml</dc:format><dc:type rdf:resource="http://purl.org/dc/dcmitype/StillImage" /></cc:Work></rdf:RDF></metadata><defs id="defs57" /><sodipodi:namedview pagecolor="#ffffff" bordercolor="#666666" borderopacity="1" objecttolerance="10" gridtolerance="10" guidetolerance="10" inkscape:pageopacity="0" inkscape:pageshadow="2" inkscape:window-width="838" inkscape:window-height="480" id="namedview55" showgrid="false" inkscape:zoom="0.47565111" inkscape:cx="248.08099" inkscape:cy="248.08099" inkscape:window-x="2881" inkscape:window-y="257" inkscape:window-maximized="0" inkscape:current-layer="Layer_1" /> <path style="fill:#337180;stroke-width:0.88559228" d="m 247.02627,14.717127 c -121.33058,0 -219.693313,98.355643 -219.693313,219.700393 0,121.33057 98.362733,219.69685 219.693313,219.69685 121.33766,0 219.70039,-98.36628 219.70039,-219.69685 0,-121.34475 -98.36273,-219.700393 -219.70039,-219.700393 z" id="path2" inkscape:connector-curvature="0" /> <path style="fill:#d3d3d3;stroke-width:0.90713316" d="m 229.787,246.881 v 204.57719 c 6.041,0.36207 12.139,0.5538 18.29,0.5538 5.371,0 10.696,-0.15635 15.983,-0.43366 V 246.881 Z" id="path4" inkscape:connector-curvature="0" /> <path style="fill:#eaeaea;stroke-width:0.90713316" d="m 229.787,246.881 v 204.57719 c 6.041,0.36207 12.139,0.5538 18.29,0.5538 V 246.881 Z" id="path6" inkscape:connector-curvature="0" /> <path style="fill:#e5e5e5;stroke-width:0.97107792" d="m 248.081,42.593907 c -53.4177,0 -96.72809,22.939871 -96.72809,51.237772 V 326.9198 c 0,28.2979 43.31039,51.23777 96.72809,51.23777 53.4177,0 96.72809,-22.93987 96.72809,-51.23777 V 93.831679 c 0,-28.297901 -43.31039,-51.237772 -96.72809,-51.237772 z" id="path8" inkscape:connector-curvature="0" /> <path style="fill:#3b3b3b;stroke-width:0.96465236" d="m 248.081,65.208194 c -48.07352,0 -87.04988,20.566786 -87.04988,45.937566 v 208.97285 c 0,25.3708 38.97636,45.93758 87.04988,45.93758 48.07352,0 87.04988,-20.56678 87.04988,-45.93758 V 111.14576 c 0,-25.37078 -38.97636,-45.937566 -87.04988,-45.937566 z" id="path10" inkscape:connector-curvature="0" /> <circle style="fill:#ea4949;stroke-width:1.34224808" cx="250.18338" cy="143.91194" id="circle12" r="57.716671" inkscape:transform-center-x="10.511907" inkscape:transform-center-y="2.1023814" /> <path style="fill:#f25f5f;stroke-width:1.34224808" d="m 285.62544,108.46856 c -19.57401,-19.574007 -51.31146,-19.574007 -70.88547,0 -19.57534,19.574 -19.57534,51.31145 0,70.88681 19.57535,19.574 90.46082,-51.31147 70.88547,-70.88681 z" id="path14" inkscape:connector-curvature="0" inkscape:transform-center-x="16.161193" inkscape:transform-center-y="-3.5459238" /> <circle style="fill:#2bbf60;stroke-width:1.36669445" cx="249.21809" cy="275.94055" r="58.76786" id="circle16" /> <path style="fill:#3cce6c;stroke-width:1.36669445" d="m 285.30567,240.53499 c -19.93051,-19.93051 -52.246,-19.93051 -72.1765,0 -19.93187,19.9305 -19.93187,52.24599 0,72.17786 19.93187,19.93051 92.10837,-52.24599 72.1765,-72.17786 z" id="path22" inkscape:connector-curvature="0" /> <g id="g24"> </g> <g id="g26"> </g> <g id="g28"> </g> <g id="g30"> </g> <g id="g32"> </g> <g id="g34"> </g> <g id="g36"> </g> <g id="g38"> </g> <g id="g40"> </g> <g id="g42"> </g> <g id="g44"> </g> <g id="g46"> </g> <g id="g48"> </g> <g id="g50"> </g> <g id="g52"> </g> </svg>
4,403
Common Lisp
.l
139
28.517986
259
0.680197
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
a8e31d2fc7ba184ba5b621390493647b782633092c98b7835f5469f85f2ccea6
4,220
[ -1 ]
4,221
traffic-light-svgrepo-com.svg
atgreen_red-light-green-light/images/traffic-light-svgrepo-com.svg
<?xml version="1.0" encoding="iso-8859-1"?> <!-- Generator: Adobe Illustrator 19.0.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) --> <svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 496.162 496.162" style="enable-background:new 0 0 496.162 496.162;" xml:space="preserve"> <path style="fill:#337180;" d="M248.077,0C111.072,0,0.002,111.062,0.002,248.083c0,137.005,111.07,248.079,248.075,248.079 c137.013,0,248.083-111.074,248.083-248.079C496.16,111.062,385.09,0,248.077,0z"/> <path style="fill:#D3D3D3;" d="M229.787,246.881v248.608c6.041,0.44,12.139,0.673,18.29,0.673c5.371,0,10.696-0.19,15.983-0.527 V246.881H229.787z"/> <path style="fill:#EAEAEA;" d="M229.787,246.881v248.608c6.041,0.44,12.139,0.673,18.29,0.673V246.881H229.787z"/> <path style="fill:#E5E5E5;" d="M248.081,32.082c-52.079,0-94.304,24.952-94.304,55.732v253.533c0,30.78,42.225,55.732,94.304,55.732 s94.304-24.952,94.304-55.732V87.814C342.385,57.034,300.16,32.082,248.081,32.082z"/> <path style="fill:#3B3B3B;" d="M248.081,42.082c-45.05,0-81.575,23.585-81.575,52.679v239.64c0,29.094,36.525,52.679,81.575,52.679 s81.575-23.585,81.575-52.679V94.761C329.656,65.667,293.131,42.082,248.081,42.082z"/> <circle style="fill:#EA4949;" cx="248.081" cy="116.581" r="43"/> <path style="fill:#F25F5F;" d="M274.486,90.175c-14.583-14.583-38.228-14.583-52.811,0c-14.584,14.583-14.584,38.228,0,52.812 C236.259,157.57,289.07,104.759,274.486,90.175z"/> <circle style="fill:#2BBF60;" cx="248.081" cy="317.081" r="43"/> <circle style="fill:#EAB42D;" cx="248.081" cy="217.081" r="43"/> <path style="fill:#EDCB3B;" d="M274.486,191.175c-14.583-14.583-38.228-14.583-52.811,0c-14.584,14.583-14.584,38.228,0,52.812 C236.259,258.57,289.07,205.759,274.486,191.175z"/> <path style="fill:#3CCE6C;" d="M274.486,291.175c-14.583-14.583-38.228-14.583-52.811,0c-14.584,14.583-14.584,38.228,0,52.812 C236.259,358.57,289.07,305.759,274.486,291.175z"/> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> <g> </g> </svg>
2,176
Common Lisp
.l
53
38.886792
129
0.660857
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
9553976c0308a3df4bb60f8011b851924820e1119093177a6d62f2cece7b85bb
4,221
[ -1 ]
4,228
build.yml
atgreen_red-light-green-light/.github/workflows/build.yml
name: CI # Controls when the action will run. on: # Triggers the workflow on push or pull request events but only for the master branch push: branches: [ master ] pull_request: branches: [ master ] # Allows you to run this workflow manually from the Actions tab workflow_dispatch: # A workflow run is made up of one or more jobs that can run sequentially or in parallel jobs: build: name: Build image runs-on: ubuntu-latest steps: - uses: actions/checkout@v3 - run: | git fetch --prune --unshallow --tags echo exit code $? git tag --list echo "RLGL_VERSION=$(git describe --tags --dirty=+)" - name: Set up Go 1.17 uses: actions/setup-go@v3 with: go-version: 1.17 - name: Get short git commit hash id: hash run: echo "::set-output name=hash::${GITHUB_SHA::7}" - name: Get version number id: version run: echo "::set-output name=version::$(git describe --tags --dirty=+)" - name: Get base hash id: base-hash run: echo "::set-output name=base-hash::$(cat Dockerfile.base rlgl-server.asd | sha512sum | cut -b 1-8)" - name: Test if base exists id: base-exists run: echo "::set-output name=base-exists::$(podman manifest inspect quay.io/moxielogic/rlgl-server-base:${{ steps.base-hash.outputs.base-hash }} > /dev/null 2>&1 && echo 'EXISTS')" - name: Prepare base image id: build-base uses: redhat-actions/buildah-build@v2 with: image: rlgl-server-base tags: ${{ steps.base-hash.outputs.base-hash }} latest dockerfiles: | Dockerfile.base if: ${{ steps.base-exists.outputs.base-exists != 'EXISTS' }} - name: Push Base To quay.io id: push-base-to-quay uses: redhat-actions/push-to-registry@v2 with: image: ${{ steps.build-base.outputs.image }} tags: ${{ steps.build-base.outputs.tags }} registry: quay.io/moxielogic username: ${{ secrets.QUAY_USERNAME }} password: ${{ secrets.QUAY_PASSWORD }} if: ${{ steps.base-exists.outputs.base-exists != 'EXISTS' }} - name: Build rlgl cli run: | (cd rlgl; make build) mv rlgl/build/* cli - name: golangci-lint uses: golangci/golangci-lint-action@v3 with: version: latest skip-pkg-cache: true working-directory: rlgl - name: Buildah Action id: build-image uses: redhat-actions/buildah-build@v2 with: image: rlgl-server tags: latest ${{ steps.hash.outputs.hash }} ${{ steps.version.outputs.version }} dockerfiles: | Dockerfile build-args: | RLGL_VERSION=${{ steps.version.outputs.version }} - name: Push To quay.io id: push-to-quay uses: redhat-actions/push-to-registry@v2 with: image: ${{ steps.build-image.outputs.image }} tags: ${{ steps.build-image.outputs.tags }} registry: quay.io/moxielogic username: ${{ secrets.QUAY_USERNAME }} password: ${{ secrets.QUAY_PASSWORD }} - name: Test run: | # Create a new test keypair openssl ecparam -name prime256v1 -genkey -noout -out .ci/private_key.pem openssl ec -in .ci/private_key.pem -pubout -out .ci/public_key.pem docker-compose -f .ci/docker-compose.yml up -d ip=$(docker container inspect --format '{{ (index .NetworkSettings.Networks "ci_default").IPAddress }}' ci_rlgl-server_1) if [ -z "${ip:-}" ]; then err "Container ${cid} has no IP address" return 1 fi if timeout -s TERM 45 bash -c \ 'while [[ "$(curl -s -o /dev/null -L -w ''%{http_code}'' ${0})" != "200" ]];\ do echo "Waiting for ${0}" && sleep 2;\ done' http://$ip:8080/healthz ; then docker exec -t -e IP=$ip ci_rlgl-server_1 sh -c 'echo -n http://$IP:8080 > /tmp/server-uri' docker exec -t ci_rlgl-server_1 cat /tmp/server-uri ./.ci/test.sh $ip:8080 || true docker logs ci_rlgl-server_1 else ERROR=$? docker logs ci_rlgl-server_1 exit $ERROR fi - name: Print image url run: echo "Image pushed to ${{ steps.push-to-quay.outputs.registry-paths }}" # - name: Rollout to staging environment # uses: actions-hub/kubectl@master # env: # KUBE_CONFIG: ${{ secrets.PROD_KUBECONFIG }} # with: # args: rollout restart deployment rlgl-server
4,586
Common Lisp
.l
118
31.101695
186
0.602971
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
fe69698ed6b29dce1e2feed972428c7b48af633f4550c56cb9a20cdc260f5d53
4,228
[ -1 ]
4,229
rlgl.css
atgreen_red-light-green-light/css/rlgl.css
@import url("https://netdna.bootstrapcdn.com/font-awesome/4.0.3/css/font-awesome.css"); * { font-family: "Trebuchet MS", Arial, Helvetica, sans-serif; box-sizing: border-box; } html { position: relative; min-height: 100%; } body { padding-top: 65px; margin-bottom: 60px; } .rlgl-svg { float: left; width: 100%; background-image: url(../images/rlgl.svg); background-size: cover; height: 0; padding: 0; /* reset */ padding-bottom: 92%; } h1 { position: relative; bottom: 18px; left: 10px; } pre { display: block; padding: 9.5px; margin: 0 0 10px; font-size: 13px; line-height: 1.42857143; color: #333; word-break: break-all; word-wrap: break-word; background-color: #f5f5f5; border: 1px solid #ccc; border-radius: 4px; box-shadow: 2px 2px 3px 0px black; } table { border-collapse: collapse; border: 1px solid #ddd; width: 75%; } table th { text-align: left; border-bottom: 1px solid #ccc; } table th, table td { padding: .4em; } table.fold-table > tbody > tr.view td, table.fold-table > tbody > tr.view th { cursor: pointer; } table.fold-table > tbody > tr.view td:first-child, table.fold-table > tbody > tr.view th:first-child { position: relative; padding-left: 20px; } table.fold-table > tbody > tr.view td:first-child:before, table.fold-table > tbody > tr.view th:first-child:before { position: absolute; top: 50%; left: 5px; width: 9px; height: 16px; margin-top: -8px; font: 16px fontawesome; color: #999; content: "\f0d7"; transition: all .3s ease; } table.fold-table > tbody > tr.view:nth-child(4n-1) { background: #eee; } table.fold-table > tbody > tr.view:hover { background: #aaa; } table.fold-table > tbody > tr.fail { background: #ffb3b3 } table.fold-table > tbody > tr.xfail { background: #e6f6e6 } table.fold-table > tbody > tr.pass { background: #80ff80 } /* table.fold-table > tbody > tr.view.open { background: tomato; color: white; } */ table.fold-table > tbody > tr.view.open td:first-child:before, table.fold-table > tbody > tr.view.open th:first-child:before { transform: rotate(-180deg); color: #333; } table.fold-table > tbody > tr.fold { display: none; } table.fold-table > tbody > tr.fold.open { display: table-row; } .fold-content { padding: .5em; } .fold-content h3 { margin-top: 0; } .fold-content > table { border: 12px solid #ccc; } tr:nth-child(4n-2) { background: #eee; } .footer { position: absolute; bottom: 0; width: 100%; /* Set the fixed height of the footer here */ height: 120px; line-height: 60px; /* Vertically center the text there */ background-color: #f5f5f5; } .footer > .container { padding-right: 15px; padding-left: 15px; } code { font-size: 80%; }
2,889
Common Lisp
.l
134
18.365672
126
0.660433
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
f0fd840d25aec5f888c84dac753c724b0a6f42d64f18657b94c264c1ce067f94
4,229
[ -1 ]
4,230
docker-compose.yml
atgreen_red-light-green-light/.ci/docker-compose.yml
version: '3.2' services: rlgl-server: image: "quay.io/moxielogic/rlgl-server:latest" ports: - "8080:8080" volumes: - type: bind source: /home/runner/work/red-light-green-light/red-light-green-light/.ci/config.ini target: /etc/rlgl/config.ini - type: bind source: /home/runner/work/red-light-green-light/red-light-green-light/.ci/private_key.pem target: /etc/rlgl/private_key.pem - type: bind source: /home/runner/work/red-light-green-light/red-light-green-light/.ci/public_key.pem target: /etc/rlgl/public_key.pem
600
Common Lisp
.l
16
31.125
97
0.666096
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
8969dbce1a6cf757224783bd0cbf08898bf4af0c0437e239fbd6d436f79e679a
4,230
[ -1 ]
4,243
oval.sh
atgreen_red-light-green-light/recog.d/oval.sh
#!/bin/sh grep -q "<title>OVAL Results</title>" $1 if [ $? -eq 0 ]; then echo "oscap-oval"; fi
100
Common Lisp
.l
5
18
40
0.595745
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
01afcaad8805421dd91cc97effe52e6486e7f1a9a6d52663c0b0074b3e98f8c3
4,243
[ -1 ]
4,244
clair.sh
atgreen_red-light-green-light/recog.d/clair.sh
#!/bin/sh grep -q "unapproved" $1 if [ $? -eq 0 ]; then grep -q "vulnerabilities" $1; if [ $? -eq 0 ]; then echo "clair"; fi fi
142
Common Lisp
.l
8
15
33
0.548872
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
15d097b956d6a9210ba62d8d735f3613fecc8e21eaee7dd9eb66af91ffdd3e4c
4,244
[ -1 ]
4,245
assemble
atgreen_red-light-green-light/.s2i/assemble
#!/bin/bash set -e echo "---> Installing application source ..." mkdir -p ./quicklisp/local-projects/${APP_SYSTEM_NAME} cp -Rf /tmp/src/. ./quicklisp/local-projects/${APP_SYSTEM_NAME} echo "---> Building your AWESOME Common Lisp application from source ..." sbcl --eval "(sb-ext:restrict-compiler-policy 'debug 3)" --eval "(ql:quickload :`eval echo ${APP_SYSTEM_NAME}`)" --eval "(quit)" find ./quicklisp chown -R 1001 ./quicklisp
435
Common Lisp
.l
9
46.777778
128
0.710214
atgreen/red-light-green-light
46
2
4
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
bd6579ed7be33931c5d08e8a9e9ed68c7651f467b9a431b65d8cedc9281b56b8
4,245
[ -1 ]
4,265
package.lisp
jfmcbrayer_germinal/package.lisp
;;; Preamble (in-package :cl-user) (defpackage :germinal (:use :cl :cl+ssl) (:import-from :quri #:uri #:uri-scheme #:uri-host #:uri-path #:uri-userinfo #:url-encode #:url-decode) (:import-from :ppath #:normpath #:join) (:import-from :cl-ppcre #:scan #:scan-to-strings) (:import-from :uax-15 #:normalize) (:export #:start #:start-cli #:make-request #:make-response #:path-blacklisted-p #:gemini-serve-file-or-directory #:*germinal-server-name* #:*germinal-root* #:*germinal-host* #:*germinal-port* #:*germinal-cert* #:*germinal-cert-key* #:*germinal-pathname-blacklist* #:*germinal-routes* #:*germinal-middleware* #:request-url #:request-pathinfo #:request-params #:request-client-key #:request-client-addres #:response-status #:response-meta #:response-body))
1,206
Common Lisp
.lisp
43
16.674419
43
0.462597
jfmcbrayer/germinal
40
2
0
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
bf77a2671d50cf719983f89f909459b48d3486e802525ddbc8c1872e37c1dc17
4,265
[ -1 ]
4,266
server.lisp
jfmcbrayer_germinal/server.lisp
;;;; The Germinal server. This is pretty much self-contained. ;;; Package-level things (in-package :germinal) (interpol:enable-interpol-syntax) (defvar *germinal-server-name* "localhost") (defvar *germinal-root* "/var/gemini") (defvar *germinal-host* "0.0.0.0") (defvar *germinal-port* 1965) (defvar *germinal-cert* "/etc/germinal/cert.pem") (defvar *germinal-cert-key* "/etc/germinal/key.pem") (defvar *germinal-pathname-blacklist* '(".git") "List of files and directories to exclude. Relative files/directories are excluded in all subdirectories of *germinal-root*. Absolute paths are excluded at exactly this path.") (defvar *germinal-middleware* '(basic-logging)) (defvar *germinal-tls-context* nil "Variable used to store global TLS context") (defvar *germinal-routes* '(("/hello/(.*)/?" . hello-world-view) ("/hello/?" . hello-world-view) (".*" . gemini-serve-file-or-directory)) "Alist associating regular expressions to match paths against with functions to call to handle them. Routes are matched in order, so put the most specific routes at the top, and the least-specific at the bottom. Each function must take a request object as its first argument and return a response object. Make sure you refer to the function in such a way that it can be found from the package you call `germinal-start' from.") (define-condition gemini-error (error) ((error-type :initarg :error-type :reader gemini-error-type) (error-message :initarg :error-message :reader gemini-error-message))) ;;; Entry functions (defun start (&key (host *germinal-host*) (port *germinal-port*) (background nil)) "Start the germinal server, listening to HOST and PORT." ;; update mime types (setf (gethash "org" mimes:*mime-db*) "text/org-mode") (setf (gethash "gmi" mimes:*mime-db*) "text/gemini") (write-line #?";; Germinal listening on ${host} port ${port}") (force-output) (setq *germinal-tls-context* (make-context :disabled-protocols (list +ssl-op-no-sslv2+ +ssl-op-no-sslv3+ +ssl-op-no-tlsv1+ +ssl-op-no-tlsv1-1+ +ssl-op-no-tlsv1-2+))) (with-global-context (*germinal-tls-context* :auto-free-p (not background)) (usocket:socket-server host port #'gemini-handler () :multi-threading t :element-type '(unsigned-byte 8) :in-new-thread background))) ;;; Internal functions (defun read-line-crlf (stream &optional eof-error-p) "Read a CRLF-terminated line from a binary stream and return a string" (let ((s (make-string-output-stream))) (loop for empty = t then nil for c = (read-byte stream eof-error-p nil) while (and c (not (eql (code-char c) #\return))) do (unless (eql (code-char c) #\newline) (write-char (code-char c) s)) finally (return (if empty nil (get-output-stream-string s)))))) (defun resolve-route (request) "Take a request object as argument, and return the function for handling the route." (loop for route in *germinal-routes* when (scan (car route) (uri-path (request-url request))) return (symbol-function(cdr route)))) (defun serve-route (request) "Take a request object as argument, and apply the function for handling the route to the request and any positional args from the route." (loop for route in *germinal-routes* when (scan (car route) (uri-path (request-url request))) return (apply (symbol-function (cdr route)) request (route-args route request)))) (defun route-args (route request) (vector-to-list (nth 1 (multiple-value-list (scan-to-strings (car route) (uri-path (request-url request))))))) (defun serve-route-with-middleware (request) "Take a request object as argument, and apply the chain of handlers in *germinal-middleware* in order, with serve-route as the last handler." (funcall (middleware-chain *germinal-middleware*) request)) (defun gemini-handler (stream) "The main Gemini request handler. Sets up TLS and sets up request and response" (handler-case (let* ((tls-stream (make-ssl-server-stream stream :certificate *germinal-cert* :key *germinal-cert-key*)) (request (make-request (normalize (read-line-crlf tls-stream) :nfc) (cl+ssl:ssl-stream-x509-certificate tls-stream) usocket:*remote-host*)) (response (serve-route-with-middleware request))) (write-response response tls-stream) (close tls-stream)) (error (c) (format *error-output* "gemini-handler error: ~A~%" c)))) (defun hello-world-view (request &optional name &rest junk) "A `Hello World' view function." (let ((name (if (str:emptyp name) "World" name))) (make-response 20 "text/gemini" (str:concat #?"# Hello, $(name)!" (string #\Newline))))) (defun path-blacklisted-p (path &optional (blacklist *germinal-pathname-blacklist*)) "Return t if the path matches something in the pathname blacklist." (loop for pattern in blacklist when (path-components-contain-p path pattern) return t)) (defun path-components-contain-p (path pattern) (cond ((cl-fad:pathname-root-p path) nil) ((pathname-match-p (cl-fad:pathname-as-file path) pattern) t) (t (path-components-contain-p (cl-fad:pathname-parent-directory (cl-fad:pathname-as-directory path)) pattern)) )) (defun gemini-serve-file-or-directory (request &rest junk) "Given a gemini request (string), try to respond by serving a file or directory listing." (declare (ignore junk)) (handler-case (let* ((path (get-path-for-url (request-url request))) (path-kind (osicat:file-kind path :follow-symlinks t))) (if (or (not (member :other-read (osicat:file-permissions path))) (path-blacklisted-p path) (not (str:starts-with-p *germinal-root* path))) (make-response 51 "Not Found") ;; In lieu of a permission-denied status (cond ((eq :directory path-kind) (gemini-serve-directory path)) ((eq :regular-file path-kind) (gemini-serve-file path)) (t (make-response 51 "Not Found"))))) (osicat-posix:enoent () (make-response 51 "Not Found")) (gemini-error (err) (make-response (gemini-error-type err) (gemini-error-message err))) (error (c) (format *error-output* "gemini-serve-file-or-directory error: ~A~%" c) (make-response 40 "Internal server error")))) (defun get-path-for-url (url) "Get file path based on URL (a quri object)" (if (uri-userinfo url) (error 'gemini-error :error-type 59 :error-message "Bad Request")) (normpath (join *germinal-root* (string-left-trim "/" (url-decode (uri-path url)))))) (defun gemini-serve-file (path) "Given an accessible file path, serve it as a gemini response" (let* ((mime-type (mimes:mime path)) (body (alexandria:read-file-into-byte-vector path))) (make-response 20 mime-type body))) (defun gemini-serve-directory (path) "Given an accessible directory, serve either an index.gmi file or a directory listing as a gemini response" (if (probe-file (str:concat path "/index.gmi")) (gemini-serve-file (str:concat path "/index.gmi")) (gemini-generate-directory-list path))) (defun gemini-generate-directory-list (path) "Given an accessible directory path, generate a directory listing and serve it as a gemini response" (let* ((subdirectories (map 'list #'linkify (remove-if #'path-blacklisted-p (remove-if-not #'cl-fad:directory-exists-p (cl-fad:list-directory path))))) (files (map 'list #'linkify (remove-if #'path-blacklisted-p (remove-if #'cl-fad:directory-exists-p (cl-fad:list-directory path))) )) (body (make-string-output-stream))) (write-sequence #?"# Directory listing for ${(de-prefix path)}/\n\n" body) (write-sequence #?"## Subdirectories\n" body) (write-sequence (let ((cl-interpol:*list-delimiter* #\Newline)) #?"@{subdirectories}\n\n") body) (write-sequence #?"## Files\n" body) (write-sequence (let ((cl-interpol:*list-delimiter* #\Newline)) #?"@{files}\n\n") body) (make-response 20 "text/gemini" (babel:string-to-octets (get-output-stream-string body) :encoding :utf-8)))) (defun url-encode-path (path) "Url-encode a path, leaving slashes intact." (let* ((dir-parts (pathname-directory path)) (abs-or-rel (car dir-parts)) (path-components (append (cdr dir-parts) (list (file-namestring path)))) (url-encoded-path-components (mapcar #'url-encode path-components)) (encoded-path (str:join "/" url-encoded-path-components))) (if (eq :absolute abs-or-rel) (str:concat "/" encoded-path) encoded-path))) (defun linkify (path &optional text) "Format a path name with optional description as a gemini link" (let* ((path-name (de-prefix (namestring path))) (encoded-path-name (url-encode-path path-name)) (file-size (file-size-human-readable (file-size-in-octets path)))) (if text #?"=> $(encoded-path-name) $(text) ($(file-size))" #?"=> $(encoded-path-name) $(path-name) ($(file-size))")))
10,041
Common Lisp
.lisp
199
41.025126
102
0.621677
jfmcbrayer/germinal
40
2
0
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
d3616b5830c48890ef55b61c5748a6c488bc4b41bdc80e2a0e7f54a9fe7b5f31
4,266
[ -1 ]
4,267
util.lisp
jfmcbrayer_germinal/util.lisp
;;;; Utility functions for the Germinal server (in-package :germinal) (defun de-prefix (path &optional (prefix *germinal-root*)) "Strip *germinal-root* from a pathname" (str:replace-all prefix "" path)) (defun vector-to-list (the-vector) (loop for i below (array-dimension the-vector 0) collect (aref the-vector i))) (defun file-size-in-octets (path) (osicat-posix:stat-size (osicat-posix:stat path))) ;; From Reddit /u/ambrevar ;; https://www.reddit.com/r/lisp/comments/c3nfzo/humanreadable_file_size_in_lisp/ ;; This is mostly inspired by Emacs 26.2. (defun file-size-human-readable (file-size &optional flavor) "Produce a string showing FILE-SIZE in human-readable form. Optional second argument FLAVOR controls the units and the display format: If FLAVOR is nil or omitted, each kilobyte is 1024 bytes and the produced suffixes are \"k\", \"M\", \"G\", \"T\", etc. If FLAVOR is `si', each kilobyte is 1000 bytes and the produced suffixes are \"k\", \"M\", \"G\", \"T\", etc. If FLAVOR is `iec', each kilobyte is 1024 bytes and the produced suffixes are \"KiB\", \"MiB\", \"GiB\", \"TiB\", etc." (let ((power (if (or (null flavor) (eq flavor 'iec)) 1024.0 1000.0)) (post-fixes ;; none, kilo, mega, giga, tera, peta, exa, zetta, yotta (list "" "k" "M" "G" "T" "P" "E" "Z" "Y")) (format-string "~d~a~a")) (loop while (and (>= file-size power) (rest post-fixes)) do (setf file-size (/ file-size power) post-fixes (rest post-fixes))) (if (> (abs (- file-size (round file-size))) 0.05) (setf format-string "~,1f~a~a") (setf file-size (round file-size))) (format nil format-string file-size (if (and (eq flavor 'iec) (string= (first post-fixes) "k")) "K" (first post-fixes)) (cond ((and (eq flavor 'iec) (string= (first post-fixes) "")) "B") ((eq flavor 'iec) "iB") (t "")))))
2,090
Common Lisp
.lisp
46
37.565217
81
0.587543
jfmcbrayer/germinal
40
2
0
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
c8cfb5b5007ff0b5f85f9f41183c9ff28fd7a430b7eebab1dbcc60039477689c
4,267
[ -1 ]
4,268
middleware.lisp
jfmcbrayer_germinal/middleware.lisp
(in-package :germinal) (defun basic-logging (handler) "Middleware that logs requests to *standard-output*." (lambda (request) (let ((response (funcall handler request))) (format *standard-output* "[~A] ~A \"~A\" ~A ~A ~%" (local-time:now) (usocket:host-to-hostname (request-client-address request)) (request-pathinfo request) (response-status response) (response-meta response)) response))) (defun validate-server-name (handler) "Middleware that ensures the requested host matches *germinal-server-name*." (lambda (request) (let* ((url (request-url request)) (host (uri-host url))) (if (not (scan *germinal-server-name* host)) (make-response 51 "Not Found") (funcall handler request))))) (defun gemini-app (request) (serve-route request)) (defun middleware-chain (middlewares) (reduce #'funcall (remove-if #'null middlewares) :initial-value #'gemini-app :from-end t))
1,010
Common Lisp
.lisp
32
26.125
78
0.651951
jfmcbrayer/germinal
40
2
0
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
2000db854a245dbcc9594a2e0fd152ed201053a6eab96abdf672a5a74d5445c1
4,268
[ -1 ]
4,269
classes.lisp
jfmcbrayer_germinal/classes.lisp
(in-package :germinal) (interpol:enable-interpol-syntax) (defclass request () ((url :initarg :url :accessor request-url) (path-info :initarg :path-info :accessor request-pathinfo) (params :initarg :params :accessor request-params) (client-key :initarg :client-key :accessor request-client-key) (client-address :initarg :client-address :accessor request-client-address))) (defclass response () ((status :initarg :status :accessor response-status) (meta :initarg :meta :accessor response-meta) (body :initarg :body :accessor response-body :initform ""))) (defun make-request (url &optional client-key client-address) (let* ((parsed-url (uri url)) (params (car (car (quri:uri-query-params parsed-url))))) (if (not (uri-path parsed-url)) (setf (uri-path parsed-url) "/" )) (make-instance 'request :url parsed-url :path-info (uri-path parsed-url) :params params :client-key client-key :client-address client-address))) (defun make-response (status meta &optional body) (make-instance 'response :status (write-to-string status) :meta meta :body body)) (defmethod write-response ((the-response response) (the-stream stream)) (write-sequence (babel:string-to-octets (str:concat (response-status the-response) " " (response-meta the-response) (coerce '(#\return #\newline) 'string)) :encoding :utf-8) the-stream) (if (response-body the-response) (if (stringp (response-body the-response)) (let ((the-body (if (str:ends-with-p #?"\n" (response-body the-response)) (response-body the-response) #?"$((response-body the-response))\n"))) (write-sequence (babel:string-to-octets the-body :encoding :utf-8) the-stream)) (write-sequence (response-body the-response) the-stream))) (force-output the-stream))
2,113
Common Lisp
.lisp
39
42.333333
88
0.603482
jfmcbrayer/germinal
40
2
0
AGPL-3.0
9/19/2024, 11:26:12 AM (Europe/Amsterdam)
04b755a33f1bda3edc2fc675e147ac56036a9df862619a0efcd6d4a042c67b62
4,269
[ -1 ]