id
int64 0
45.1k
| file_name
stringlengths 4
68
| file_path
stringlengths 14
193
| content
stringlengths 32
9.62M
| size
int64 32
9.62M
| language
stringclasses 1
value | extension
stringclasses 6
values | total_lines
int64 1
136k
| avg_line_length
float64 3
903k
| max_line_length
int64 3
4.51M
| alphanum_fraction
float64 0
1
| repo_name
stringclasses 779
values | repo_stars
int64 0
882
| repo_forks
int64 0
108
| repo_open_issues
int64 0
90
| repo_license
stringclasses 8
values | repo_extraction_date
stringclasses 146
values | sha
stringlengths 64
64
| __index_level_0__
int64 0
45.1k
| exdup_ids_cmlisp_stkv2
listlengths 1
47
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3,989 | changelog | spwhitton_consfigurator/debian/changelog | consfigurator (1.4.3-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Fri, 04 Oct 2024 09:31:03 +0800
consfigurator (1.4.2-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Fri, 26 Jul 2024 11:31:24 +0900
consfigurator (1.4.1-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Wed, 10 Jul 2024 08:38:00 +0800
consfigurator (1.4.0-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Thu, 09 May 2024 18:28:26 +0100
consfigurator (1.3.2-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Wed, 24 Apr 2024 08:34:43 +0100
consfigurator (1.3.1-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Mon, 12 Jun 2023 08:49:21 +0100
consfigurator (1.3.0-1) experimental; urgency=medium
* New upstream release.
* Add dep and build-dep on cl-parse-number.
-- Sean Whitton <[email protected]> Fri, 17 Mar 2023 11:04:06 -0700
consfigurator (1.2.3-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Sun, 26 Feb 2023 10:30:49 -0700
consfigurator (1.2.2-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Mon, 20 Feb 2023 13:18:14 -0700
consfigurator (1.2.1-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Mon, 20 Feb 2023 13:07:54 -0700
consfigurator (1.2.0-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Tue, 29 Nov 2022 11:06:36 -0700
consfigurator (1.1.1-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Sun, 18 Sep 2022 15:18:33 -0700
consfigurator (1.1.0-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Tue, 02 Aug 2022 15:03:28 -0700
consfigurator (1.0.3-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Wed, 29 Jun 2022 17:38:28 -0700
consfigurator (1.0.2-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Thu, 19 May 2022 17:51:55 -0700
consfigurator (1.0.1-1) unstable; urgency=medium
* New upstream release.
* Add autopkgtest deps on gpg and pass.
* d/tests/compile-and-tests.lisp: Set TMPDIR to AUTOPKGTEST_TMP.
-- Sean Whitton <[email protected]> Wed, 11 May 2022 12:26:40 -0700
consfigurator (1.0.0-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Sat, 30 Apr 2022 12:42:44 -0700
consfigurator (0.14.0-1) unstable; urgency=medium
* New upstream release.
* d/copyright: update years for David Bremner to include 2022.
-- Sean Whitton <[email protected]> Wed, 02 Feb 2022 13:49:48 -0700
consfigurator (0.13.0-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Wed, 15 Dec 2021 16:22:08 -0700
consfigurator (0.12.3-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Sun, 28 Nov 2021 19:10:23 -0700
consfigurator (0.12.2-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Mon, 15 Nov 2021 11:49:27 -0700
consfigurator (0.12.1-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Tue, 09 Nov 2021 17:53:33 -0700
consfigurator (0.12.0-1) unstable; urgency=medium
* New upstream release.
* Add deps and build-deps on cl-bordeaux-threads, libacl1-dev and libcap-dev.
* Add ${sphinxdoc:Built-Using} to Built-Using.
* Run 'wrap-and-sort -abst'.
-- Sean Whitton <[email protected]> Mon, 08 Nov 2021 17:53:08 -0700
consfigurator (0.11.0-1) unstable; urgency=medium
* New upstream release.
* Add deps and build-deps on cl-anaphora and cl-osicat.
-- Sean Whitton <[email protected]> Wed, 29 Sep 2021 20:06:58 -0700
consfigurator (0.10.0-1) unstable; urgency=medium
* New upstream release.
* Rewrite long description.
-- Sean Whitton <[email protected]> Sun, 22 Aug 2021 15:53:02 -0700
consfigurator (0.9.1-1) unstable; urgency=medium
* New upstream release.
* Replace dep and build-dep cl-trivial-macroexpand-all -> cl-agnostic-lizard.
* Add build-dep on python3-sphinx-rtd-theme.
* Update copyright years.
-- Sean Whitton <[email protected]> Fri, 20 Aug 2021 10:55:35 -0700
consfigurator (0.8.0-2) unstable; urgency=high
* Backport some security & FFI fixes to :SETUID and :SUDO connections.
-- Sean Whitton <[email protected]> Sat, 24 Jul 2021 15:54:41 -0700
consfigurator (0.8.0-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Fri, 04 Jun 2021 11:02:38 -0700
consfigurator (0.7.0-1) unstable; urgency=medium
* New upstream release.
* Override no-debian-changes Lintian tag.
-- Sean Whitton <[email protected]> Tue, 25 May 2021 17:22:39 -0700
consfigurator (0.6.1-1) unstable; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Tue, 25 May 2021 15:35:44 -0700
consfigurator (0.6.0-1) unstable; urgency=medium
* New upstream release.
* Upload to unstable.
* Add dep and build-dep on cl-closer-mop.
* d/tests/compile-and-tests.lisp: Switch the *PACKAGE* to
CONSFIGURATOR/TESTS when running tests so that there is a value
for *CONSFIG*.
* d/rules: also clean *.fasl from tests/.
-- Sean Whitton <[email protected]> Sun, 23 May 2021 16:57:10 -0700
consfigurator (0.5.0-1) experimental; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Thu, 01 Apr 2021 23:45:51 -0700
consfigurator (0.4.1-1) experimental; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Thu, 01 Apr 2021 19:33:13 -0700
consfigurator (0.4.0-1) experimental; urgency=medium
* New upstream release.
* Add deps and build-deps on cl-heredoc, cl-named-readtables,
cl-trivial-backtrace.
* Run upstream test suite as part of autopkgtest.
-- Sean Whitton <[email protected]> Thu, 01 Apr 2021 16:02:00 -0700
consfigurator (0.3.1-1) experimental; urgency=medium
* New upstream release.
-- Sean Whitton <[email protected]> Wed, 10 Mar 2021 12:58:59 -0700
consfigurator (0.3.0-1) experimental; urgency=medium
* New upstream release.
* Install consfigurator.el using dh_elpa
- Add build-deps on dh-elpa, each cl-* package used by Consfigurator, sbcl
- Depend on emacsen-common and Recommend emacs
- Add Provides: elpa-consfigurator.
-- Sean Whitton <[email protected]> Wed, 10 Mar 2021 12:42:30 -0700
consfigurator (0.2.1-1) experimental; urgency=medium
* New upstream release.
* Update Homepage.
* Add trailing slashes to Vcs-Git and Vcs-Browser.
-- Sean Whitton <[email protected]> Tue, 02 Mar 2021 19:02:08 -0700
consfigurator (0.2.0-1) experimental; urgency=medium
* New upstream release.
* Add dependencies on cl-babel, cl-cffi.
* Add an autopkgtest, marked as superficial, to test compiling and loading.
* Add "Provides: consfigurator".
* Move ${sphinxdoc:Depends} Depends->Recommends to ease installing on stable.
* wrap-and-sort -abst
-- Sean Whitton <[email protected]> Tue, 02 Mar 2021 18:08:45 -0700
consfigurator (0.0.1-1) experimental; urgency=medium
* Initial release.
-- Sean Whitton <[email protected]> Wed, 24 Feb 2021 19:42:21 -0700
| 7,743 | Common Lisp | .l | 150 | 48.546667 | 79 | 0.744817 | spwhitton/consfigurator | 57 | 1 | 0 | GPL-3.0 | 9/19/2024, 11:26:04 AM (Europe/Amsterdam) | 0843f6ccd1fc8aeb56d2844d055aed17f6e10a96d7a04d94b256eaa142b147ce | 3,989 | [
-1
] |
3,990 | rules | spwhitton_consfigurator/debian/rules | #!/usr/bin/make -f
ELPA_NAME=consfigurator
export ELPA_NAME
%:
dh $@ --with sphinxdoc,elpa
override_dh_auto_build:
make -C doc html info
make -C emacs consfigurator.el
override_dh_auto_clean:
find src tests -name "*.fasl" -delete
make -C doc clean
| 257 | Common Lisp | .l | 11 | 21.545455 | 38 | 0.756198 | spwhitton/consfigurator | 57 | 1 | 0 | GPL-3.0 | 9/19/2024, 11:26:04 AM (Europe/Amsterdam) | 7824b7be6e1b629e51dac2c4e183d1e257109be3cc0c08a09dcf49862b5f653a | 3,990 | [
-1
] |
3,991 | control | spwhitton_consfigurator/debian/control | Source: consfigurator
Section: admin
Priority: optional
Maintainer: Sean Whitton <[email protected]>
Build-Depends:
cl-agnostic-lizard,
cl-alexandria,
cl-anaphora,
cl-babel,
cl-bordeaux-threads,
cl-cffi,
cl-closer-mop,
cl-heredoc,
cl-interpol,
cl-named-readtables,
cl-osicat,
cl-parse-number,
cl-ppcre,
cl-trivial-backtrace,
debhelper-compat (= 13),
dh-elpa,
libacl1-dev,
libcap-dev,
python3-sphinx,
python3-sphinx-rtd-theme,
sbcl,
sphinx-common,
texinfo,
Standards-Version: 4.5.1
Homepage: https://spwhitton.name/tech/code/consfigurator/
Vcs-Git: https://git.spwhitton.name/consfigurator/
Vcs-Browser: https://git.spwhitton.name/consfigurator/
Rules-Requires-Root: no
Package: cl-consfigurator
Architecture: all
Depends:
cl-agnostic-lizard,
cl-alexandria,
cl-anaphora,
cl-babel,
cl-bordeaux-threads,
cl-cffi,
cl-closer-mop,
cl-heredoc,
cl-interpol,
cl-named-readtables,
cl-osicat,
cl-parse-number,
cl-ppcre,
cl-trivial-backtrace,
emacsen-common,
libacl1-dev,
libcap-dev,
${misc:Depends},
Recommends:
emacs,
sbcl,
${sphinxdoc:Depends},
Provides:
consfigurator,
elpa-consfigurator,
Built-Using:
${sphinxdoc:Built-Using},
Description: Lisp declarative configuration management system
Consfigurator is a system for declarative configuration management using
Common Lisp. You can use it to configure hosts as root, deploy services as
unprivileged users, build and deploy containers, install operating systems,
produce disc images, and more. Some key advantages:
.
* Apply configuration by transparently starting up another Lisp image on the
machine to be configured, so that you can use the full power of Common Lisp
to inspect and control the host.
.
* Also define properties of hosts in a more restricted language, that of
:POSIX properties, to configure machines, containers and user accounts
where you can't install Lisp. These properties can be applied using just
an SSH or serial connection, but they can also be applied by remote Lisp
images, enabling code reuse.
.
* Flexibly chain and nest methods of connecting to hosts. For example, you
could have Consfigurator SSH to a host, sudo to root, start up Lisp, use
the setns(2) system call to enter a Linux container, and then deploy a
service. Secrets, and other prerequisite data, are properly passed along.
.
* Combine declarative semantics for defining hosts and services with a
multiparadigmatic general-purpose programming language that won't get in
your way.
.
Declarative configuration management systems like Consfigurator and Propellor
share a number of goals with projects like the GNU Guix System and NixOS.
However, tools like Consfigurator and Propellor try to layer the power of
declarative and reproducible configuration semantics on top of traditional,
battle-tested UNIX system administration infrastructure like distro package
managers, package archives and daemon configuration mechanisms, rather than
seeking to replace any of those. Let's get as much as we can out of all that
existing distro policy-compliant work!
| 3,120 | Common Lisp | .l | 96 | 30.28125 | 79 | 0.796891 | spwhitton/consfigurator | 57 | 1 | 0 | GPL-3.0 | 9/19/2024, 11:26:04 AM (Europe/Amsterdam) | bb2d38cd109c0f53f641749f3ecb121805e8a57f5eb11329358ddb8f4b01cb34 | 3,991 | [
-1
] |
3,993 | control | spwhitton_consfigurator/debian/tests/control | Test-Command: sbcl --script debian/tests/compile-and-tests.lisp
Depends:
gpg,
pass,
sbcl,
@,
Restrictions: allow-stderr, superficial
| 137 | Common Lisp | .l | 7 | 18 | 63 | 0.792308 | spwhitton/consfigurator | 57 | 1 | 0 | GPL-3.0 | 9/19/2024, 11:26:04 AM (Europe/Amsterdam) | 1cb4efae679e58f64051b9a786bbb5c9db946df3c2898fcd1ab753dac884d198 | 3,993 | [
-1
] |
4,056 | installation.rst | spwhitton_consfigurator/doc/installation.rst | .. _Installation:
Installation
============
Debian and Debian derivatives
-----------------------------
The most recent tagged release of Consfigurator is usually included in `Debian
unstable`_, and the .deb there should work fine on Debian stable and testing,
and derivatives like Ubuntu. After adding an apt source for unstable if
necessary, ``apt-get install cl-consfigurator/unstable``. During Debian's
pre-release freezes, the newest release of Consfigurator might be available in
`Debian experimental`_ instead of unstable.
.. _Debian unstable: https://www.debian.org/doc/manuals/debian-faq/choosing.en.html
.. _Debian experimental: https://wiki.debian.org/DebianExperimental
Quicklisp
---------
The most recent tagged release of Consfigurator is included in the
`Quicklisp`_ service: ``(ql:quickload "consfigurator")``.
.. _Quicklisp: https://www.quicklisp.org/
From git
--------
If you would like to follow development more closely, you can::
% git clone https://git.spwhitton.name/consfigurator ~/.local/share/common-lisp/source/consfigurator
and ASDF should pick it up.
| 1,097 | Common Lisp | .l | 23 | 46.043478 | 104 | 0.757291 | spwhitton/consfigurator | 57 | 1 | 0 | GPL-3.0 | 9/19/2024, 11:26:04 AM (Europe/Amsterdam) | bf8c4cd627ec82eab6826062935f9da3473540e3132b4da00a19f33f390d22a8 | 4,056 | [
-1
] |
4,057 | pitfalls.rst | spwhitton_consfigurator/doc/pitfalls.rst | Pitfalls and limitations
========================
Invoking properties from within properties
------------------------------------------
Properties can programmatically invoke arbitrary properties to be applied in
the context of their current deployment. However, when this is done the
``:hostattrs`` subroutine of the invoked property will not be called, so, for
example, prerequisite data might be missing. You will need to add a call to
``PROPATTRS`` in the invoking property's own ``:hostattrs`` subroutine.
There are other risks in the vicinity: missing informational attributes might
cause some other properties to misbehave. To avoid all this, consider using
``DEFPROPLIST`` to combine properties, rather than having them call each
other.
Attempting to work with anonymous properties or connection types
----------------------------------------------------------------
Hosts, property application specifications and deployments are mutable values,
which you can build, pass around and change in your own code. For example,
deployments can be built and executed programmatically. However, properties
and connection types should be defined in ``.lisp`` files, loaded into Lisp,
and then *not* created or modified, except by reloading. In particular, do
not try to define properties and connection types programmatically, or try to
dynamically rebind or flet-bind them.
The reason for this restriction is that some connection types need to invoke
fresh Lisp images on remote hosts with (local equivalents to) the function
objects contained in properties and connections available to be called. Since
function objects are not serialisable, the only way to do this is to send over
the contents of your ``.lisp`` files and load the same properties and
connection types into the remote Lisp. By contrast, hosts, property
application specifications and deployments can be send over in serialised form.
If you were to dynamically rebind properties or connection types in the root
Lisp, then connections which do not start remote Lisp images would use your
new definitions, but connections which start remote Lisp images would use
the static definitions in your ``.lisp`` files (or lack definitions
altogether). This would violate the idea in Consfigurator that properties,
including nested deployments, have the same meaning regardless of the
connection types they are used with.
Note that you *can* programmatically determine the arguments to pass to
properties upon deployment, though each of these arguments needs to be
serialisable, so you can't pass anonymous functions or objects containing
those. You can work around the latter restriction by defining a new property
which passes in the desired anonymous function, and then adding the new
property to your property application specification.
Code-walking limitations
------------------------
The preprocessing of propspecs, and the conversion of unevaluated propspecs
into propspecs, both require code walking. Consfigurator's implementation of
this is in the function ``MAP-PROPSPEC-PROPAPPS``. However, due to
limitations in the Common Lisp standard, it is not possible to implement the
work of that function in a way which is both always correct and fully
portable. I have not found a general purpose code walker which hooks into
implementation-specific functionality and that is currently maintained, and so
at present we use a best-effort portable code walker, Agnostic Lizard.
This will almost always generate the correct expansions, but if you have
particularly advanced macro property combinators then it is possible that
``MAP-PROPSPEC-PROPAPPS`` will return incorrectly expanded forms. For full
details see Michael Raskin. 2017. "Writing a best-effort portable code
walker in Common Lisp." In *Proceedings of 10th European Lisp Symposium*,
Vrije Universiteit Brussel, Belgium, April 2017 (ELS2017). DOI:
10.5281/zenodo.3254669.
It is possible to implement the work of ``MAP-PROPSPEC-PROPAPPS`` in terms of
``MACROEXPAND-ALL``, whose semantics are conventionally well-understood and
for which fully correct implementations are available in most implementations
of Common Lisp (the trivial-macroexpand-all library can be used to get at
these). However, note that we cannot just call ``MACROEXPAND-ALL`` on
propspecs because unquoted lists appearing as arguments to properties in
atomic property applications will look like invalid function calls to the code
walker. Avoiding this would seem to require wrapping the propspec in one
macrolet for each known property, and this makes ``MACROEXPAND-ALL`` too slow,
even if the macrolet forms are precomputed.
Dumping and reinvoking Lisp
---------------------------
Remote Lisp images can dump executable images of themselves using the
IMAGE-DUMPED property, and some connection types work by dumping and then
immediately reinvoking Lisp. However, there are some limitations to how these
features can be used that are connected with changing execution context, in the
way that :CHROOT.FORK, :SETUID, and the Linux namespace-entering connections do.
Firstly, for at least some Lisp implementations, the build of Lisp that's
running must be accessible via the filesystem in order for it to be possible
to dump an image. In the case of SBCL, for example, the very same
/usr/bin/sbcl and /usr/lib/sbcl/sbcl.core need to be accessible. If
Consfigurator has forked into a chroot then this may not be the case. So, for
example, when preparing a disk image by applying properties to a chroot, you
can't easily apply a property like CRON:RUNS-CONSFIGURATOR. See the docstring
for IMAGE-DUMPED for one way to handle this situation.
Secondly, dumped images can fail to start up at all if they cannot reopen all
the shared libraries they had open right before the dump, and if the execution
context has changed, these files might not be readable anymore. For example,
if Consfigurator has forked into a chroot and then dumped an image, libacl1.so
might not be present at all, or -- what is more likely in the case of that
particular library -- only accessible via a different path. Additionally, the
use of the CFFI groveller by Consfigurator and its dependency Osicat means
that the reinvoked image will try to load shared libraries out of the
~/.cache/common-lisp belonging to the user who originally started up the
remote Lisp image. For example, if :SETUID has been used to switch from root
to an unprivileged user, and then an image is dumped, the unprivileged user
won't be able to execute that image. This is because the unprivileged user
cannot typically read files under /root/.cache/common-lisp.
This second issue could be partly mitigated using CFFI's ``STATIC-PROGRAM-OP``
ASDF operation, as described in the "Static Linking" section of the CFFI
manual. This is not currently implemented, for several reasons. Firstly, it
is less portable than the current CFFI features we use, and does not actually
solve the problem of inaccessible system libraries like libacl1.so, only the
problem of files under ~/.cache/common-lisp. Secondly, there are unsolved
difficulties integrating it with some of Consfigurator's standard usage
patterns, such as calls to TRY-REGISTER-DATA-SOURCE which appear directly in
consfigs (STATIC-PROGRAM-OP tries to load up consfigs in another Lisp image
without a way for us to bind *NO-DATA-SOURCES*). Thirdly, `CFFI currently
tries to reopen all shared libraries upon reinvocation regardless of the use
of STATIC-PROGRAM-OP <https://github.com/cffi/cffi/pull/163>`_. Finally, many
builds of SBCL (including Debian's at the time of writing) can't get all the
way through STATIC-PROGRAM-OP without hacks like manually setting the
SBCL_HOME environment variable before starting the attempt.
| 7,769 | Common Lisp | .l | 112 | 68.214286 | 80 | 0.799215 | spwhitton/consfigurator | 57 | 1 | 0 | GPL-3.0 | 9/19/2024, 11:26:04 AM (Europe/Amsterdam) | 7bea424930fd8940c81d88e4dcf8e0a79e1083f4da5576584402edad035d3b5c | 4,057 | [
-1
] |
4,058 | GNUmakefile | spwhitton_consfigurator/doc/GNUmakefile | include ../consfigurator.mk
LISP = $(wildcard ../src/property/*.lisp ../src/util/*.lisp) \
../src/connection.lisp ../src/property.lisp ../src/propspec.lisp \
../src/host.lisp ../src/combinator.lisp ../src/deployment.lisp \
../src/data.lisp ../src/image.lisp ../src/util.lisp
PAGES = $(patsubst ../src/%,%,$(LISP:lisp=rst))
.PHONY: all
all: html info
.PHONY: html info
html info: $(PAGES) conf.py $(wildcard *.rst */*.rst)
sphinx-build -M $@ . _build
reader.rst:
$(PAGES) &: $(wildcard *.rst.in */*.rst.in) $(LISP)
$(SBCL) --eval "(mapc #'consfigurator::build-manual-rst \
uiop:*command-line-arguments*)" --quit $(PAGES)
.PHONY: clean
clean:
rm -rf _build
rm -f $(PAGES)
# property.lisp contains the definition of BUILD-MANUAL-RST.
.SECONDEXPANSION:
%.rst: $$(wildcard $$*.rst.in) ../src/$$(*D)/$$(*F).lisp ../src/property.lisp
$(SBCL) --eval '(consfigurator::build-manual-rst "$@")' --quit
| 921 | Common Lisp | .l | 23 | 37.695652 | 77 | 0.648709 | spwhitton/consfigurator | 57 | 1 | 0 | GPL-3.0 | 9/19/2024, 11:26:04 AM (Europe/Amsterdam) | 8eb3785a82983dd38c17f19de0cf1c195ac4dab8700cdd68571cc8a99dce25d2 | 4,058 | [
-1
] |
4,059 | os_installation.rst | spwhitton_consfigurator/doc/tutorial/os_installation.rst | OS installation
===============
Consfigurator implements a number of methods for installing operating systems.
.. include:: conventions.rst
Build and write out a raw disk image
------------------------------------
This is the simplest method, and Consfigurator has decent support built-in:
see the previous tutorial. It is less practical for systems which have large
disks and/or complex, nested partitioning schemes, such as ext4 on LVM on
LUKS, as is common for GNU/Linux laptops. In such cases it is nontrivial to
expand the partitions to fill the whole physical disk after the first
successful boot, so the disk image has to be the same size as the target disk,
which can be unwieldy.
Installing directly to target host's primary storage
----------------------------------------------------
This is similar to the previous method, but it avoids the problem of having to
expand filesystems upon first boot. Suppose we have connected the target
host's hard disk to our laptop, or transferred its boot SD card to our
laptop's SD card reader, etc.. Then we can install to it directly:::
CONSFIG> (hostdeploy-these laptop.example.com
(disk:first-disk-installed-for nil test.example.com "/dev/mmcblk0"))
Live replacement of provider cloud images
-----------------------------------------
See the docstring of the INSTALLER:CLEANLY-INSTALLED-ONCE property. This is
an efficient way to handle machines in faraway datacentres. Consfigurator's
support for installing Debian stable this way has been fairly well tested, and
the technique should work for other operating systems too, once Consfigurator
has been taught how to bootstrap them.
Build a specialised live image
------------------------------
This fourth approach requires more work in your consfig. With this approach
you build a live image containing everything you need to run Consfigurator on
the hardware to which you want to install. After booting up the live system,
you can either run Consfigurator manually, or you can set things up to have it
run automatically upon boot.
Consfigurator's ability to bootstrap fresh root filesystems typically requires
Internet access, but an alternative is to build and customise a chroot
corresponding to the root filesystem of the target system, and include that in
the live image, such that after boot Consfigurator just needs to partition the
disk, copy in the contents of the prebuilt chroot, and update /etc/fstab and
/etc/crypttab with UUIDs. Here is a minimal version of something like that::
(try-register-data-source
:git-snapshot :name "consfig"
:repo #P"common-lisp/consfig/" :depth 1 :branch "master")
(defproplist live-installer-built-for :lisp (with-chroot-for)
"Build a custom Debian Live system at /srv/live/installer.iso.
Typically this property is not applied in a DEFHOST form, but rather run as
needed at the REPL. The reason for this is that otherwise the whole image will
get rebuilt each time a commit is made to ~/common-lisp/consfig/."
(:desc "Debian Live system image built")
(disk:debian-live-iso-built. nil "/srv/live/installer.iso"
(os:debian-stable "bullseye" :amd64)
(hostname:configured "debian")
(apt:installed "sudo" "task-english" "emacs"
"sbcl" "slime" "cl-consfigurator" "build-essential"
"lvm2" "cryptsetup" "gdisk" "kpartx" "dosfstools")
(user:has-account "user")
(user:has-enabled-password "user" :initial-password "live")
(file:exists-with-content "/etc/sudoers.d/user"
'("user ALL=(ALL:ALL) NOPASSWD: ALL") :mode #o600)
(as "user" (git:snapshot-extracted "consfig" "common-lisp/" :replace t))
(chroot:os-bootstrapped-for
nil
(merge-pathnames (get-hostname with-chroot-for) "/srv/chroot/")
with-chroot-for)))
Supposing we've a DEFHOST form for test.example.com, on our laptop we
could then use::
CONSFIG> (hostdeploy-these laptop.example.com
(live-installer-built-for test.example.com))
Then once the live system has booted on the target host, you'd complete the
installation using something like this:::
CONSFIG> (deploy-these (:sudo :sbcl) "debian"
(os:debian-stable "bullseye" :amd64)
(disk:volumes-installed-for nil test.example.com :leave-open t
:chroot "/srv/chroot/test.example.com")
This approach requires that a ``:DEVICE-FILE`` is specified for each of the
host's physical disks.
To prepare a live image that is capable of installing more than one system
without an Internet connection, you'd probably need to investigate including
an apt repo, or equivalent, in the live system, and point Consfigurator's OS
bootstrapping properties at that.
| 4,735 | Common Lisp | .l | 81 | 54.580247 | 83 | 0.733319 | spwhitton/consfigurator | 57 | 1 | 0 | GPL-3.0 | 9/19/2024, 11:26:04 AM (Europe/Amsterdam) | 6ce84bc71e22f862127014020827b35a6860c2460dc81811942dae1905447d27 | 4,059 | [
-1
] |
4,060 | Makefile | spwhitton_consfigurator/emacs/Makefile | include ../consfigurator.mk
consfigurator.el: consfigurator.el.in
$(SBCL) --eval '(consfigurator::dump-properties-for-emacs "$<" "$@")'\
--quit
| 148 | Common Lisp | .l | 4 | 35 | 71 | 0.706294 | spwhitton/consfigurator | 57 | 1 | 0 | GPL-3.0 | 9/19/2024, 11:26:04 AM (Europe/Amsterdam) | 81febdbf503f57465a7a17231b20eae72df048cfb70fac8752a3013fb136960d | 4,060 | [
-1
] |
4,061 | consfigurator.el.in | spwhitton_consfigurator/emacs/consfigurator.el.in | ;;; consfigurator.el --- Utilities for Consfigurator consfigs -*- lexical-binding:t -*-
;; Copyright (C) 2021, 2023 Sean Whitton
;; Copyright (C) 2002-2023 Free Software Foundation, Inc.
;; Author: Sean Whitton <[email protected]>
;; Maintainer: Sean Whitton <[email protected]>
;; Version: 1.4.3
;; URL: https://git.spwhitton.name/consfigurator/tree/emacs/consfigurator.el.in
;; Keywords: languages, lisp, syntax, unix
;; This file is free software; you can redistribute it and/or modify
;; it under the terms of the GNU General Public License as published by
;; the Free Software Foundation, either version 3 of the License, or
;; (at your option) any later version.
;; This file is distributed in the hope that it will be useful,
;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
;; GNU General Public License for more details.
;; You should have received a copy of the GNU General Public License
;; along with this program. If not, see <https://www.gnu.org/licenses/>.
;;; Commentary:
;; Utilities for working with Consfigurator consfigs from Emacs.
;; Please see <https://spwhitton.name/tech/code/consfigurator/> for more
;; information about Consfigurator.
;;; Code:
(require 'lisp-mode)
(require 'perl-mode)
(defgroup consfigurator nil
"Options for Consfigurator Emacs utilities."
:group 'tools)
(defcustom consfigurator-auto-activate-indentation-hints t
"Whether `consfigurator-lisp-mode' should call
`consfigurator-activate-indentation-hints'.
Activation of the indentation hints is not buffer-local."
:type 'boolean
:group 'consfigurator)
;;;###autoload
(defun activate-consfigurator-indentation-hints ()
"Activate indentation hints for Consfigurator properties.
Note that these hints assume you're using the recommended consfig
defpackage, where the :consfigurator package is used unqualified,
and packages providing properties have local nicknames
corresponding to the final dot-delimited component of their names."
(interactive)
;; Properties
@putforms@
;; Other operators
(put 'with-unapply 'common-lisp-indent-function '(&body))
(put 'os:typecase 'common-lisp-indent-function '(&rest (&whole 2 &rest 1)))
(put 'os:etypecase 'common-lisp-indent-function '(&rest (&whole 2 &rest 1))))
(defun consfigurator--finish-propertize-qq-heredoc (limit)
(let ((state (syntax-ppss))
ender)
(cond ((and (nth 4 state)
(setq ender
(cdr (get-text-property (nth 8 state) 'syntax-table))))
(when (search-forward ender limit t)
(let ((char (- (point) (length ender))))
(put-text-property (1- char) char 'syntax-table
(eval-when-compile
(string-to-syntax "!")))
(put-text-property (- (nth 8 state) (length ender) 3) (point)
'syntax-multiline t))))
;; Based on `perl-syntax-propertize-special-constructs', which see.
((and (nth 3 state)
(or (not (characterp (nth 3 state)))
(get-text-property (nth 8 state) 'syntax-table)))
(let* ((startpos (point))
(twoargs
(save-excursion
(let (parse-sexp-lookup-properties)
(goto-char (nth 8 state))
(skip-syntax-backward "w ")
(member
(buffer-substring (point)
(progn (forward-word-strictly 1)
(point)))
'("tr" "s" "y")))))
(char (char-after (nth 8 state)))
middle
(close (cdr (assq char perl-quote-like-pairs)))
(st (perl-quote-syntax-table char)))
(when (with-syntax-table st
(if close
(condition-case nil
(progn (goto-char (1+ (nth 8 state)))
(up-list 1)
t)
(scan-error (goto-char startpos) nil))
(not (or (nth 8 (parse-partial-sexp
(if twoargs (1+ (nth 8 state))
(point))
limit nil nil state 'syntax-table))
(and twoargs (not close)
(setq middle (point))
(nth 8 (parse-partial-sexp
(point) limit nil nil
state 'syntax-table)))))))
(if (and middle (eq char ?\"))
(put-text-property (1- middle) middle 'syntax-table
(eval-when-compile
(string-to-syntax ".")))
(put-text-property (1- (point)) (point) 'syntax-table
(if close (eval-when-compile
(string-to-syntax "|"))
(eval-when-compile
(string-to-syntax "\"")))))
(put-text-property (nth 8 state) (point) 'syntax-multiline t)
(when (and twoargs close (< (point) limit))
(put-text-property (point) (1+ (point)) 'syntax-table
(if (assq (char-after)
perl-quote-like-pairs)
(eval-when-compile
(string-to-syntax "|"))
(eval-when-compile
(string-to-syntax "\""))))
(forward-char 1)
(consfigurator--finish-propertize-qq-heredoc limit))))))))
(defun consfigurator-syntax-propertize-function (start end)
"`syntax-propertize-function' for Consfigurator's readtable.
Modes that use this should add `syntax-propertize-multiline' to
`syntax-propertize-extend-region-functions'."
(goto-char start)
(consfigurator--finish-propertize-qq-heredoc end)
(cl-flet ((in-string-or-comment-p ()
(nth 8 (save-excursion (syntax-ppss (match-beginning 0))))))
(let (case-fold-search)
(funcall
(syntax-propertize-rules
("#\\(>>?\\)~?\\(.+?\\)\\1\\([^z-a]\\)"
(3 (ignore
(or (in-string-or-comment-p)
(let ((beg (match-beginning 3))
(ender (match-string 2)))
(put-text-property beg (1+ beg) 'syntax-table
(cons (eval-when-compile
(car (string-to-syntax "!")))
ender))
(consfigurator--finish-propertize-qq-heredoc end))))))
((rx (| (: (group-n 1 "#?" (group-n 2 (opt (| "rx" ?r ?x))))
(group-n 3 (not (in alnum ?\\))))
(: (group-n 1
?# (0+ digit) (opt ?!) ?~ (group-n 2
(opt (| "tr" ?m ?s ?y))))
(group-n 3 nonl))))
(1 (and (not (in-string-or-comment-p))
(eval-when-compile (string-to-syntax "'"))))
;; Based on code in one branch of `perl-syntax-propertize-function'.
(3 (ignore
(or (in-string-or-comment-p)
(let* ((beg (match-beginning 3))
(char (char-after beg))
(prop
(cond ((assq char perl-quote-like-pairs)
(eval-when-compile (string-to-syntax "|")))
((and (eq char ?\")
(not (member (match-string 2)
'("tr" "s" "y"))))
nil)
(t
(eval-when-compile
(string-to-syntax "\""))))))
(put-text-property beg (1+ beg) 'syntax-table prop)
(consfigurator--finish-propertize-qq-heredoc end)))))))
(point) end))))
(defun consfigurator--lisp-indent-function (indent-point state)
;; Don't indent to below trailing modifiers like the 'g' in '#~/foo/g'.
(or (save-excursion
(goto-char (1+ (nth 1 state)))
(and (looking-at "#[[:digit:]]*!?~") (current-column)))
(common-lisp-indent-function indent-point state)))
;; `slime-lisp-mode-hook' runs the hooks for `slime-mode' and only then sets
;; `lisp-indent-function', so I can't see a cleaner way to override it.
(defun consfigurator--slime-lisp-mode-hook ()
(when (derived-mode-p 'consfigurator-lisp-mode)
(setq-local lisp-indent-function #'consfigurator--lisp-indent-function)))
(advice-add 'slime-lisp-mode-hook
:after #'consfigurator--slime-lisp-mode-hook)
;;;###autoload
(define-derived-mode consfigurator-lisp-mode lisp-mode "Lisp"
"Derivative of `lisp-mode' for files using Consfigurator's readtable."
(add-hook 'syntax-propertize-extend-region-functions
#'syntax-propertize-multiline t t)
(setq-local syntax-propertize-function
#'consfigurator-syntax-propertize-function
lisp-indent-function #'consfigurator--lisp-indent-function)
(when consfigurator-auto-activate-indentation-hints
(activate-consfigurator-indentation-hints)))
(provide 'consfigurator)
;;; consfigurator.el ends here
| 7,813 | Common Lisp | .l | 188 | 36.648936 | 88 | 0.668157 | spwhitton/consfigurator | 57 | 1 | 0 | GPL-3.0 | 9/19/2024, 11:26:04 AM (Europe/Amsterdam) | 9d596c392c7cfae525968e04eb80cf3205d8e03b1bee36a667ee4eb8038dcef6 | 4,061 | [
-1
] |
4,062 | release | spwhitton_consfigurator/scripts/release | #!/bin/sh
set -e
if [ "$#" -ne 1 ]; then
echo >&2 "usage: scripts/release VERSION"
exit 1
fi
version=$1
if ! (git diff-index --quiet --cached HEAD && \
git diff-files --quiet && \
test -z "$(git status --porcelain)" \
) >/dev/null 2>&1; then
echo >&2 "must commit first"
exit 1
fi
perl -pi -we's/:version ".+"/:version "'$version'"/' consfigurator.asd
perl -pi -we's/^;; Version: .+/;; Version: '$version'/' \
emacs/consfigurator.el.in
perl -pi -we"s/release = '.+'/release = '$version'/" doc/conf.py
perl -MPOSIX=strftime -pi \
-we's/^\Q'$version' (unreleased)\E$/
strftime "'$version' (%Y-%m-%d)", localtime/e' doc/news.rst
dist=$(dpkg-parsechangelog -SDistribution)
if [ "$dist" = "UNRELEASED" ]; then
dch -v$version-1 ""
else
dch -v$version-1 New upstream release.
fi
dch -r
changed_files="consfigurator.asd emacs/consfigurator.el.in doc/conf.py doc/news.rst debian/changelog"
if ! dpkg-parsechangelog | grep -q "New upstream release."; then
echo >&2 'Debian changelog lacks line "New upstream release."'
git checkout -- $changed_files
exit 1
fi
msg="release Consfigurator $version (-1 to Debian unstable)"
git commit -s -m"$msg" -- $changed_files
git tag -s -m"$msg" v$version
git deborig
dgit sbuild --run-piuparts --run-autopkgtest
| 1,332 | Common Lisp | .l | 39 | 30.769231 | 101 | 0.656786 | spwhitton/consfigurator | 57 | 1 | 0 | GPL-3.0 | 9/19/2024, 11:26:04 AM (Europe/Amsterdam) | dad8f348e008d76b4e4e733fa9f2561d6d52aa2a0a60563faa5c49a7d1d1d346 | 4,062 | [
-1
] |
4,077 | openapi.lisp | fisxoj_sanity-clause/examples/openapi.lisp | ;; load required libraries
(ql:quickload '(jonathan sanity-clause))
(defclass contact-object ()
((name :type string
:data-key "name"
:documentation "The identifying name of the contact person/organization.")
(url :type string
:data-key "url"
:field-type :uri
:documentation "The URL pointing to the contact information. MUST be in the format of a URL.")
(email :type string
:data-key "email"
:field-type :email
:documentation "The email address of the contact person/organization. MUST be in the format of an email address."))
(:metaclass sanity-clause:validated-metaclass))
(defclass license-object ()
((name :type string
:data-key "name"
:documentation "The license name used for the API.")
(url :type string
:data-key "url"
:field-type :uri
:documentation "A URL to the license used for the API. MUST be in the format of a URL."))
(:metaclass sanity-clause:validated-metaclass))
(defclass info-object ()
((title :type string
:data-key "title"
:required t
:documentation "The title of the application.")
(description :type string
:data-key "description"
:documentation "A short description of the application. GFM syntax can be used for rich text representation.")
(terms-of-service :type string
:data-key "termsOfService"
:documentation "The Terms of Service for the API.")
(contact :type contact-object
:field-type :nested
:data-key "contact"
:element-type contact-object
:documentation "The contact information for the exposed API.")
(license :type license-object
:field-type :nested
:element-type license-object
:data-key "license"
:documentation "The license information for the exposed API.")
(version :type string
:documentation "Provides the version of the application API (not to be confused with the specification version)."
:data-key "version"
:required t))
(:metaclass sanity-clause:validated-metaclass))
;;; Deserialize the json from the file into instances of these classes
(let ((v2-info (alexandria:read-file-into-string (merge-pathnames "v2-info.json" *load-truename*))))
(sanity-clause:load 'info-object (jojo:parse v2-info :as :alist)))
;; => #<INFO-OBJECT {10045F9C93}>
(slot-value * 'license)
;; => #<LICENSE-OBJECT {1006600BE3}>
(slot-value * 'name)
;; => "Apache 2.0"
| 2,593 | Common Lisp | .lisp | 58 | 36.810345 | 126 | 0.653191 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 874976f21c3919353fb42c823b1e24020a9e485cff11cb56d44cf447992bbc0c | 4,077 | [
-1
] |
4,078 | schema.lisp | fisxoj_sanity-clause/src/schema.lisp | (defpackage :sanity-clause.schema
(:use #:cl
#:alexandria
#:arrows)
(:export #:validated-metaclass)
(:documentation "The :class:`validated-metaclass` is a way of defining classes that have contracts enforced for them.
::
(defclass person ()
((favorite-dog :type symbol
:field-type :member
:members (:wedge :walter)
:data-key \"favoriteDog\"
:required t)
(age :type (integer 0)
:data-key \"age\"
:required t)
(potato :type string
:data-key \"potato\"
:required t))
(:metaclass validated-metaclass))
The above defines a class that can be instantiated with :function:`sanity-clause.protocol:load, but will error if the initargs don't satisfy the contract required by the field.
::
(sanity-clause:load 'person '((\"favoriteDog\" . \"wedge\")
(\"age\" . 10)
(\"potato\" . \"weasel\"))
Some special types can be specifed with lisp type specs, like ``age`` above, which will generate an :class:`sanity-clause.field:integer-field`, with validations requiring the value be at least 0.
**Nota Bene:** At the moment, there is no validation done on updating slots after instances are created and only instances created with :function:`sanity-clause.protocol:load` are checked. Using :function:`make-instance` doesn't validate anything."))
(in-package :sanity-clause.schema)
(defun class-initargs (class)
"Collect the initargs for :param:`class`, which is either a class or a symbol naming a class."
(unless (c2mop:classp class)
(setf class (find-class class)))
(->
(loop
for slot in (c2mop:class-slots class)
collecting (c2mop:slot-definition-initargs slot))
alexandria:flatten))
(defun take-properties (take-list from)
"Takes keys from :param:`take-list` from the provided plist :param:`from`."
(let (found others)
(doplist (k v from)
(if (member k take-list)
(appendf found (list k v))
(appendf others (list k v))))
(values found others)))
(defun merge-plist (keys list1 list2)
"Merge the keys :param:`keys` on :param:`list1` and :param:`list2`."
(multiple-value-bind (take1 others1) (take-properties keys list1)
(multiple-value-bind (take2 others2) (take-properties keys list2)
(append (loop for key in keys
appending (list key (append (getf take1 key) (getf take2 key))))
others1
others2))))
(defun slot-type-to-field-initargs (typespec)
"Sometimes, it's useful to try to infer the field type from a lisp type-spec. For example::
(integer 0 10)
should produce a field that expects integers ``(<= 0 n 10)``.
In the event the type isn't a simple type, assume it's a class with metaclass :class:`validated-metaclass` and try to use that instead."
(let ((typespec (ensure-list typespec)))
(case (car typespec)
(integer
(values (find-class 'sanity-clause.field:integer-field)
(list :validator (list (lambda (v) (sanity-clause.validator:int v :min (second typespec) :max (third typespec)))))))
(string
(values (find-class 'sanity-clause.field:string-field)
(when-let ((length (second typespec)))
(list :validator (list (lambda (v) (sanity-clause.validator:str v :max-length length :min-length length)))))))
(real
(values (find-class 'sanity-clause.field:real-field) nil))
;; Try to identify classes that are validated-metaclass classes, which can be used as fields
;; when composing classes with others.
(otherwise
(if-let ((field-class (find-class (car typespec) nil)))
(when (eq (class-of field-class) (find-class 'validated-metaclass))
field-class))))))
(defun initargs-for-slot (initargs)
"Collects arguments for and initializes a field and then returns it along with the cleaned up :param:`initargs`. This list can then be passed as the initargs to :class:`validated-field-slot-definition`."
(multiple-value-bind (field-class field-initargs-from-type)
;; Use the value of :field-type preferentially to whatever we
;; might or might not have derived from :type
(if-let ((field-type (getf initargs :field-type)))
(sanity-clause.field:find-field field-type)
(slot-type-to-field-initargs (getf initargs :type)))
(multiple-value-bind (field-initargs others)
(take-properties (class-initargs field-class) initargs)
;; Try to set data-key based on an initarg
;; FIXME: probably better to be smart about which initarg we use
;; or possibly refactor to allow many possible data sources.
(let* ((data-key (or (first (getf initargs :initargs))
(string-downcase (getf initargs :name))))
(field (apply #'sanity-clause.field:make-field
field-class
(list* :data-key (getf initargs :data-key data-key)
(merge-plist '(:validator) field-initargs-from-type field-initargs)))))
;; Remove this one special property, too, which isn't an initarg for either the
;; field or the class.
(remove-from-plist others :field-type)
(list* :field-instance field
others)))))
(defclass validated-metaclass (standard-class)
())
(defmethod make-instance :around ((class validated-metaclass) &rest initargs &key ((data data)))
(c2mop:ensure-finalized class)
(let (
;; There's one special case here to read values from environment variables if the &rest args
;; passed here are '(:source :env)
(data-source (if (equal '(:source :env) data)
:env
data))
(instance (apply #'call-next-method class (remove-from-plist initargs 'data :source))))
(dolist (slot (c2mop:class-slots class))
(let ((field (field-of slot)))
(when (and (sanity-clause.field:load-field-p field)
;; Don't bother trying to load something we don't have a data-key for
(sanity-clause.field:data-key-of field))
(let ((value (sanity-clause.protocol:resolve field data-source)))
(unless (eq value :missing)
(setf (c2mop:slot-value-using-class class instance slot)
value))))))
(values instance)))
(defmethod c2mop:validate-superclass ((mc validated-metaclass) (c standard-object))
(declare (ignore c mc))
t)
(defclass validated-slot-definition ()
((field :accessor field-of
:type sanity-clause.field:field
:initarg :field-instance)))
(defclass validated-direct-slot-definition (validated-slot-definition
c2mop:standard-direct-slot-definition)
())
(defclass validated-effective-slot-definition (validated-slot-definition
c2mop:standard-effective-slot-definition)
())
(defmethod c2mop:direct-slot-definition-class ((class validated-metaclass) &key)
'validated-direct-slot-definition)
(defmethod c2mop:effective-slot-definition-class ((class validated-metaclass) &key)
'validated-effective-slot-definition)
(defmethod shared-initialize :around ((slot validated-direct-slot-definition) slot-names &rest initargs &key &allow-other-keys)
;; This cleverly extracts the initargs for the field that will be stored on the slot
;; and returns the other arguments that are the usual initargs for a standard-direct-slot
(apply #'call-next-method slot slot-names (initargs-for-slot initargs)))
(defmethod c2mop:compute-effective-slot-definition :around ((class validated-metaclass) name direct-slot-definitions)
;; Make sure we set the field to the one defined on the most-specific (left-most)
;; direct slot definiton inherited by this class.
(let ((effective-slot (call-next-method)))
(setf (field-of effective-slot) (some #'field-of direct-slot-definitions))
effective-slot))
;;; Code to add classes to the protocol for list-based schemas sanity-clause.schema:load
;;; This is useful for making classes from alists (ie. not using the ``make-instance`` interface.
(defmethod sanity-clause.protocol:get-value ((slot validated-slot-definition) object)
(declare (ignore field-name))
(sanity-clause.protocol:get-value (field-of slot) object))
;;; Implementations of the load method for lists or metaclasses
(defmethod sanity-clause.protocol:load ((schema list) data &optional format)
(declare (ignore format))
(loop
for (marker field) on schema by #'cddr
unless (sanity-clause.field:data-key-of field)
do (setf (sanity-clause.field:data-key-of field) marker)
when (sanity-clause.field:load-field-p field)
appending (list marker (sanity-clause.protocol:resolve field data (list schema)))))
(defmethod sanity-clause.protocol:load ((symbol symbol) data &optional format)
(declare (ignore format))
(sanity-clause.protocol:load (find-class symbol) data))
(defmethod sanity-clause.protocol:load ((class validated-metaclass) data &optional format)
(declare (ignore format))
(make-instance class 'data data))
;;; Implementations of the dump method for lists or metaclasses
(defmethod sanity-clause.protocol:dump ((schema symbol) data &optional format)
(sanity-clause.protocol:dump (find-class schema) data format))
(defmethod sanity-clause.protocol:dump ((schema list) (data list) &optional format)
(loop
for (marker field) on schema by #'cddr
for value = (getf data marker)
for field-name = (or (sanity-clause.field:attribute-of field)
(string marker))
when (sanity-clause.field:dump-field-p field)
do (sanity-clause.protocol:validate field value)
and if (eq format :alist)
collect (cons field-name value)
else
append (list field-name value)))
| 10,140 | Common Lisp | .lisp | 182 | 47.005495 | 251 | 0.668457 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 2b0026e816698a40f692428e760e6ea83a0ced69e345714bed1fa7cab9613576 | 4,078 | [
-1
] |
4,079 | util.lisp | fisxoj_sanity-clause/src/util.lisp | (defpackage sanity-clause.util
(:use #:cl
#:arrows
#:alexandria)
(:export #:get-value
#:do-key-values))
(in-package #:sanity-clause.util)
(defun lisp-name->env-name (lisp-name)
"Convert kebab case to upper snake case, e.g.
``some-name => SOME_NAME``"
(->> lisp-name
string-upcase
(str:replace-all "-" "_")))
(defun get-value (object key &optional default)
"Generic reader function for lists and class instances. Returns a ``(values value found-p)`` so you can tell if the value was in the list or not. Can also read from the environment if given ``:env`` as OBJECT."
(if (and (keywordp object) (eq object :env))
;; if key is a string, assume it's already an environment variable name like MY_VARIABLE,
;; if a symbol, assume we have to convert from kebab case to upper snake case.
(let ((env-variable-name (etypecase key
(string key)
(symbol (lisp-name->env-name key)))))
(values (or (uiop:getenvp env-variable-name) default) (not (not (uiop:getenvp env-variable-name)))))
(etypecase object
(standard-object
(if (and (slot-exists-p object key) (slot-boundp object key))
(values (slot-value object key) t)
(values default nil)))
(trivial-types:property-list
(values (getf object key default) (not (null (find key object)))))
(trivial-types:association-list
(let* ((assoc-cons (assoc key object :test #'string-equal))
(value (or (cdr assoc-cons) default)))
(values value (not (null assoc-cons)))))
(hash-table
(gethash key object default)))))
(defmacro do-key-values ((key value) data &body body)
(with-gensyms (alist)
`(let ((,alist (etypecase ,data
(hash-table
(hash-table-alist ,data))
(trivial-types:property-list
(plist-alist ,data))
(trivial-types:association-list
,data))))
(loop for (,key . ,value) in ,alist
do (progn ,@body)))))
| 2,027 | Common Lisp | .lisp | 46 | 36.804348 | 214 | 0.629705 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 05d5c611121dfe82356ed4030bd95ac4f15b1e05cee6035cc2eef6378d197957 | 4,079 | [
-1
] |
4,080 | protocol.lisp | fisxoj_sanity-clause/src/protocol.lisp | (defpackage sanity-clause.protocol
(:use :cl)
(:shadow #:load)
(:export #:resolve
#:deserialize
#:serialize
#:validate
#:get-value
#:load
#:dump)
(:documentation "The methods that govern behavior in sanity-clause.
The methods relating to fields are:
* :function:`resolve`
* :function:`deserialize`
* :function:`serialize`
* :function:`validate`
* :function:`get-value`
The methods relating to schemas are:
* :function:`load`
* :function:`dump`"))
(in-package :sanity-clause.protocol)
(defgeneric resolve (field data &optional parents)
(:documentation "A function that encapsulates getting, corecing, and validating values for a field. Calls :function:`get-value`, :function:`deserialize`, and :function:`validate`."))
(defgeneric deserialize (field value)
(:documentation "Converts the value retrieved from the raw data into the datatype the field expects to work with, or fails, raising a :class:`sanity-clause.field:conversion-error`."))
(defgeneric serialize (field value)
(:documentation "Converts the value of a field into another representation."))
(defgeneric validate (field value)
(:documentation "Run the validation checks for a given field and raise a :class:`sanity-clause.field:validation-error` if it is invalid."))
(defgeneric get-value (field object)
(:documentation "Tries to fetch the value corresponding to the field from some datastructure. :param:`field-name` is used if no attribute is explicitly set on the field."))
(defgeneric load (schema data &optional format)
(:documentation "Deserializes :param:`data` into an instance of :param:`schema`. Fills in default values and validates fields. If :param:`schema` is ``:env``, it will try to load from environment variables."))
(defgeneric dump (schema data &optional format)
(:documentation "WARNING: This isn't fully tested/supported, but it might work! I reserve the right to change the API in breaking ways, though.
dump takes some data an serializes it to a plist or alist based on :param:`format`, which can be set to, well, ``:plist`` or ``:alist``."))
| 2,114 | Common Lisp | .lisp | 36 | 55.527778 | 213 | 0.746965 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 34c9bb3ee25a97de21579881f59ab3a37cd7d67f29eca141b1977d3a0add99b7 | 4,080 | [
-1
] |
4,081 | validator.lisp | fisxoj_sanity-clause/src/validator.lisp | (defpackage sanity-clause.validator
(:use #:cl
#:arrows
#:alexandria)
(:shadow #:real)
(:export #:str
#:int
#:real
#:email
#:uuid
#:not-empty
#:hydrate-validators
#:ensure-validator)
(:documentation "Some validation functions that can be used with fields to make sure data has certain properties."))
(in-package :sanity-clause.validator)
(defun ensure-validator (keyword-spec)
"Find a validator function by keyword-spec and return the function represented by the spec unless it's already a function."
(if (functionp keyword-spec)
keyword-spec
(let ((keyword-spec (ensure-list keyword-spec))
(validator-package (find-package :sanity-clause.validator)))
(lambda (value)
(apply (find-symbol (string-upcase (car keyword-spec)) validator-package)
value
(cdr keyword-spec))))))
(defun hydrate-validators (spec-plist)
"Takes a list of validators in the form of keywords and turns them into living function references."
(when-let ((validator-spec (getf spec-plist :validator)))
(setf (getf spec-plist :validator) (mapcar #'ensure-validator validator-spec)))
spec-plist)
(defmacro fail (value reason &rest format-args)
`(format nil ,(format nil "Value ~~a ~S" reason) ,value ,@format-args))
(defun int (value &key (radix 10) max min)
"Accepts a :param:`value` as an integer or string.
If :param:`value` is a string, interpret it as a value with base- :param:`radix`.
If specified, make sure :param:`min` <= :param:`value` <= :param:`max`."
(handler-case
(let ((number (etypecase value
(string (parse-integer value :radix radix))
(integer value))))
(cond
((and max (> number max))
(fail value "must be larger smaller than ~a" max))
((and min (< number min))
(fail value "must be larger than ~a" min))
(t nil)))
(parse-error (e)
(declare (ignore e))
(fail value "must be parseable as an integer"))))
(defun bool (value)
"Attempts to convert :param:`value` to a ``t`` or ``nil`` by comparing it to a list of stringy true or false values. Throws a :class:`<validation-error>` if it can't figure out if :param:`value` is truthy or falsey."
(cond
((member value '("y" "yes" "t" "true" "on" "enable" ) :test #'string-equal) nil)
((member value '("n" "no" "f" "false" "off" "disable") :test #'string-equal) nil)
(t (fail value "is not a valid boolean value"))))
(defun str (value &key min-length max-length)
"Checks that :param:`value` is a string.
If specified, checks that :param:`min-length` <= ``(length value)`` <= :param:`max-length`."
(cond
((not (typep value 'string))
(fail value "must be a string."))
((and min-length
(< (length value) min-length))
(fail value "string length must be > ~d" min-length))
((and max-length
(> (length value) max-length))
(fail value "string length must be < ~d" max-length))
(t nil)))
(defun email (value)
"Checks that the input resembles an email."
(unless (ppcre:scan ".+@.+\\\..{2,}" value)
"Not a valid email address."))
(let ((uuid-scanner (ppcre:create-scanner '(:sequence
:start-anchor
(:greedy-repetition 8 8 (:char-class (:range #\0 #\9) (:range #\a #\f))) #\-
(:greedy-repetition 4 4 (:char-class (:range #\0 #\9) (:range #\a #\f))) #\-
(:greedy-repetition 4 4 (:char-class (:range #\0 #\9) (:range #\a #\f))) #\-
(:greedy-repetition 4 4 (:char-class (:range #\0 #\9) (:range #\a #\f))) #\-
(:greedy-repetition 12 12 (:char-class (:range #\0 #\9) (:range #\a #\f)))
:end-anchor)
:case-insensitive-mode t)))
(defun uuid (value)
"Checks that a value is a string that resembles a uuid."
(unless (ppcre:scan uuid-scanner value)
"Is not a valid uuid.")))
(defun not-empty (value)
"Checks that some value has been supplied. Note: this won't work well with boolean values because NIL is falsey."
(when (emptyp value)
"Must not be empty."))
| 4,162 | Common Lisp | .lisp | 89 | 40.247191 | 219 | 0.626115 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 6207a550ba94aefbe53f51aab8191851eb9d4b8b471b5378eba562c2bd7f400b | 4,081 | [
-1
] |
4,082 | serde.lisp | fisxoj_sanity-clause/src/serde.lisp | (defpackage sanity-clause.serde
(:use #:cl
#:alexandria))
(in-package #:sanity-clause.serialize)
(defvar *serializers* nil
"Plist of known serializers.")
(defgeneric serialize (field serializer value))
(defgeneric deserialize (field serializer value))
(defmacro defserializer (format &key
(name-to-lisp #'identity)
(lisp-to-name #'identity)))
| 372 | Common Lisp | .lisp | 11 | 30.181818 | 49 | 0.733146 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | e2778c68658e786037d679b2834696930ebf07903f04f6cf375dcab19c085680 | 4,082 | [
-1
] |
4,083 | sanity-clause.lisp | fisxoj_sanity-clause/src/sanity-clause.lisp | (defpackage sanity-clause
(:use #:cl
#:alexandria
#:sanity-clause.protocol)
(:import-from #:sanity-clause.field
#:make-field)
(:import-from #:sanity-clause.schema
#:validated-metaclass)
(:import-from #:sanity-clause.loadable-schema
#:load-schema)
(:shadowing-import-from #:sanity-clause.protocol
#:load)
(:export #:resolve
#:deserialize
#:serialize
#:validate
#:get-value
#:load
#:dump
;; loadable schema
#:load-schema
;; field stuff
#:make-field
;; schema stuff
#:validated-metaclass)
(:documentation "Main package of the :package:`sanity-clause` system.
:package:`sanity-clause` helps define data contracts like \"this field will always have a valid integer greater than zero in it\". It's also useful for serializing and deserializing data to and from different formats. Contracts are built in the form of schemas, which are composed of :class:`sanity-clause.field:field` s.
for example::
(setq schema (list :name (make-field 'string)
:age (make-field 'integer :validator (lambda (v) (unless (> v 0) \"impossible age!\")))))
(setq some-data '((:name . \"matt\")
(:age . \"7\")))
(load schema some-data)
;; => (:name \"matt\" :age 7)
;; note: the string for age got converted by DESERIALIZE from a string to an integer.
To learn more about what fields exist, check out :package:`sanity-clause.field`.
To see more validation functions, check out :package:`sanity-clause.validator`.
To see how to load a schema from a file or keyword spec, check out :package:`sanity-clause.schema`."))
(in-package #:sanity-clause)
| 1,714 | Common Lisp | .lisp | 39 | 37.948718 | 323 | 0.667268 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 4c0e1c984e70d93cc6da3cb3e9541ab9ca793cea3df7c67e85775adc3f254946 | 4,083 | [
-1
] |
4,084 | loadable-schema.lisp | fisxoj_sanity-clause/src/loadable-schema.lisp | (defpackage sanity-clause.loadable-schema
(:use #:cl #:alexandria)
(:documentation "Loadable schemas can be expressed as plists of keywords and then can be loaded by :function:`load`, either from a file, or a list.
You could, for example, define the configuration of a program that reads from the environment with::
(setq schema (sanity-clause.loadable-schema:load #P\"my-schema.sexp\"))
And then you could load it from the environment with::
(sanity-clause.schema:load schema :env)
your ``my-schema.sexp`` might look like::
(:name (:string :validator (:not-empty) :default \"lisa\" :required t)
:age (:integer :validator ((:int :min 0)) :required t))")
(:export #:load-schema))
(in-package :sanity-clause.loadable-schema)
(defun load-schema (schema &key (data-key-transformer #'identity))
"Takes a :type:`pathname` or schema spec list like::
(:key (:string :validator (:not-empty) :default \"potato\")
:key2 (:integer :validator ((:int :min 0)) :default 2))
and returns a schema plist with fields. The field names are transformed into the ``:data-key`` for the field by the :param:`data-key-transformer`, which is helpful when reading strings from a config file and putting them into a plist keyed with symbols."
(typecase schema
(pathname (load-schema (uiop:with-safe-io-syntax () (uiop:read-file-form schema))))
(cons (loop for (key (type . spec)) on schema by #'cddr
appending (list key
(apply #'sanity-clause.field:make-field
type
(append (list :data-key (funcall data-key-transformer key))
(sanity-clause.validator:hydrate-validators (copy-list spec)))))))))
| 1,783 | Common Lisp | .lisp | 25 | 61.64 | 255 | 0.659794 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 2c8507f4c8747bcb3a9e222048700c6e1f34448b1f9084533639dae4b816878c | 4,084 | [
-1
] |
4,085 | json.lisp | fisxoj_sanity-clause/src/serde/json.lisp | (defpackage sanity-clause.serde.json
(:use #:cl
#:alexandria
#:sanity-clause.field)
(:export #:lisp-name-to-json-name
#:json-name-to-lisp-name))
(in-package #:sanity-clause.serde.json)
(defun lisp-name-to-json-name (name)
"Converts a kebab style name to a pascal case name. eg. ``some-field => someField``"
(with-output-to-string (s)
(loop
for c across name
with last-char-dash = nil
if (char= c #\-)
do (setf last-char-dash t)
else
do (princ (if last-char-dash (char-upcase c) c) s)
and do (setf last-char-dash nil))))
(defun json-name-to-lisp-name (name)
"Converts a lower pascal case name to kebab case. eg. ``someField => some-field``"
(with-output-to-string (s)
(loop
for c across name
if (upper-case-p c)
do (princ #\- s)
and do (princ (char-downcase c) s)
else
do (princ c s))))
(defmethod sanity-clause.serde:dump ((schema list) value &optional (format (eql :json)))
(jonthan:with-object
(loop
for (marker field) on schema by #'cddr
for value = (getf data marker)
for field-name = (or (sanity-clause.field:data-key-of field)
(string marker))
for json-field = (if (symbolp field-name)
(lisp-name-to-json-name field-name)
field-name)
when (sanity-clause.field:dump-field-p field)
do (sanity-clause.field:validate field)
and do (jojo:write-key-value (lisp-name-to-json-name (attribute field)) (get-value field value)))))
| 1,464 | Common Lisp | .lisp | 41 | 31.341463 | 100 | 0.669258 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 8aea377f6ebc9aec732797dda16033fd47c4867d024890fb4deaa89a7ef6e5b8 | 4,085 | [
-1
] |
4,086 | schema.lisp | fisxoj_sanity-clause/t/schema.lisp | (defpackage sanity-clause/test.schema
(:use #:cl
#:rove
#:alexandria
#:sanity-clause.schema)
(:import-from #:sanity-clause.field
#:make-field
#:conversion-error
#:validation-error
#:required-value-error)
(:shadowing-import-from #:sanity-clause.schema
#:load))
(in-package :sanity-clause/test.schema)
(defun dumb-list-eq (list1 list2)
(every 'eq list1 list2))
(defun plist-eq (list1 list2)
(and (= (length list1) (length list2))
(let ((result t))
(doplist (k v1 list1)
(unless
(let ((v2 (getf list2 k)))
(typecase v1
(cons (dumb-list-eq v1 v2))
(t (eq v1 v2))))
(setf result nil)))
result)))
(deftest test-load
(testing "plists"
(let ((plist-schema (list :name (make-field 'string)
:age (make-field 'integer :required t))))
(ok (sanity-clause.protocol:load plist-schema '(:name "Matt" :age 30))
"Can load from valid data.")
(ok (sanity-clause.protocol:load plist-schema '(:name "Matt" :age "30"))
"Can load valid data, converting from a string, if necessary.")
(ok (signals (sanity-clause.protocol:load plist-schema '(:name "Matt" :age "potato"))
'conversion-error)
"A string that isn't an int raises a conversion error.")
(ok (signals (sanity-clause.protocol:load plist-schema '(:name 11 :age 30))
'conversion-error)
"An integer that is not a string raises a validation error.")
(ok (signals (sanity-clause.protocol:load plist-schema '(:name "Matt"))
'required-value-error)
"A missing, required value raises a required value error.")))
(testing "alists"
(let ((schema (list :name (make-field 'string)
:age (make-field 'integer :required t))))
(ok (sanity-clause.protocol:load schema '((:name . "Matt") (:age . 30)))
"Can load from valid data.")
(ok (sanity-clause.protocol:load schema '((:name . "Matt") (:age . "30")))
"Can load valid data, converting from a string, if necessary.")
(ok (signals (sanity-clause.protocol:load schema '((:name . "Matt") (:age . "potato")))
'conversion-error)
"A string that isn't an int raises a conversion error.")
(ok (signals (sanity-clause.protocol:load schema '((:name . 11) (:age . 30)))
'conversion-error)
"An integer that is not a string raises a validation error.")
(ok (signals (sanity-clause.protocol:load schema '((:name . "Matt")))
'required-value-error)
"A missing, required value raises a required value error.")))
(testing "hash-tables"
(flet ((make-test-hash (alist)
(alexandria:alist-hash-table alist :test 'equal)))
(let ((schema (list :name (make-field 'string)
:age (make-field 'integer :required t))))
(ok (sanity-clause.protocol:load schema (make-test-hash '((:name . "Matt") (:age . 30))))
"Can load from valid data.")
(ok (sanity-clause.protocol:load schema (make-test-hash '((:name . "Matt") (:age . "30"))))
"Can load valid data, converting from a string, if necessary.")
(ok (signals (sanity-clause.protocol:load schema (make-test-hash '((:name . "Matt") (:age . "potato"))))
'conversion-error)
"A string that isn't an int raises a conversion error.")
(ok (signals (sanity-clause.protocol:load schema (make-test-hash '((:name . 11) (:age . 30))))
'conversion-error)
"An integer that is not a string raises a validation error.")
(ok (signals (sanity-clause.protocol:load schema (make-test-hash '((:name . "Matt"))))
'required-value-error)
"A missing, required value raises a required value error."))))
(testing "nested data"
(defclass nested-data-person-schema ()
((name :type string
:validator sanity-clause.validator:not-empty
:initarg :name
:data-key "name"
:required t)
(age :type (integer 0)
:initarg :age
:data-key "age"
:required t))
(:metaclass sanity-clause:validated-metaclass))
(defclass nested-data-schema ()
((person :initarg :person
:field-type :nested
:element-type nested-data-person-schema
:data-key "person"
:required t))
(:metaclass sanity-clause:validated-metaclass))
(let* ((data '(("person" . (("name" . "some-name")
("age" . 11))))))
(ok (sanity-clause.protocol:load 'nested-data-schema data)
"parses the nested object.")))
(testing "a self-referential schema"
(ok
(defclass self-referential-schema ()
((name :data-key "name"
:field-type :string
:validator sanity-clause.validator:not-empty
:required t)
(parent :data-key "parent"
:field-type :one-schema-of
:schema-choices (self-referential-schema)
:required nil))
(:metaclass sanity-clause:validated-metaclass))
"can be defined without error.")
(let ((person-without-parent '(("name" . "matt")))
(person-with-parent '(("name" . "wedge")
("parent" . (("name" . "matt"))))))
(ok (sanity-clause.protocol:load 'self-referential-schema person-without-parent)
"can be deserialized when the optional field is missing.")
(ok (sanity-clause.protocol:load 'self-referential-schema person-with-parent)
"can be deserialized when the optional field is present."))))
(deftest test-examples
(testing "sexp configuration file"
(let* ((raw-configuration (uiop:with-safe-io-syntax () (uiop:read-file-form (asdf:system-relative-pathname :sanity-clause/test "t/fixtures/environment.sexp"))))
(schema (list :database-url (make-field 'string :validator (list 'sanity-clause.validator:not-empty
(lambda (v) (unless (str:starts-with-p "postgres" v :ignore-case t)
"expected a postgres protocol."))))
:port (make-field 'integer :validator (lambda (v) (sanity-clause.validator:int v :min 0)))
:mode (make-field 'member :members '(:development :testing :production))
:penguin (make-field 'boolean :default t)))
(configuration (sanity-clause.protocol:load schema raw-configuration)))
(ok (typep (getf configuration :database-url) 'string)
"database-uri is a valid string.")
(ok (typep (getf configuration :port) 'integer)
"port was converted to an integer.")
(ok (typep (getf configuration :mode) 'keyword)
"mode is a keyword.")
(ok (typep (getf configuration :penguin) 'boolean)
"a default value for penguin is set.")))
(testing "environment variables"
(let* ((schema (list :potato (make-field 'member :members '(:yam :idaho) :required t)
:age (make-field 'integer :validator (lambda (v) (unless (> v 0) "must be greater than zero.")))
:ice-cream (make-field 'member :members '(:strawberry :pistachio) :default :strawberry)))
(configuration (sanity-clause.protocol:load schema :env)))
(ok (typep (getf configuration :age) 'integer)
"age is an integer")
(ok (eq (getf configuration :potato) :yam)
"potato is :yam.")
(ok (eq (getf configuration :ice-cream) :strawberry)
"ice-cream defaults to strawberry."))))
(deftest class-initargs
(defclass orange ()
((seeds :initarg :seeds
:initarg :seed-number)
(cultivar :initarg :cultivar)))
(ok (set-equal (sanity-clause.schema::class-initargs (c2mop:ensure-finalized (find-class 'orange))) '(:seeds :seed-number :cultivar))
"collects the initargs of a given class."))
(deftest take-properties
(multiple-value-bind (found others) (sanity-clause.schema::take-properties '(:p :r) '(:p 1 :c 2 :r 3 :q 5))
(ok (dumb-list-eq found '(:p 1 :r 3))
"takes the properties specified.")
(ok (dumb-list-eq others '(:c 2 :q 5))
"filters out the other properties.")))
(deftest test-merge-plist
(let ((merged (sanity-clause.schema::merge-plist '(:a) '(:a (1 2) :b 3) '(:c 4 :a (3)))))
(ok (= (length merged) 6)
"merges lists.")
(ok (every 'keywordp (loop for (k v) on merged by #'cddr collecting k))
"preserves keys.")))
(deftest test-metaclass
(testing "without any slots"
(ok (defclass validated ()
()
(:metaclass sanity-clause.schema:validated-metaclass))
"can define a class with VALIDATED-METACLASS as the metaclass."))
(testing "with slots that use type-derived field classes"
(ok (defclass validated2 ()
((name :type string :default "larry"))
(:metaclass sanity-clause.schema:validated-metaclass))
"can define a class with a simple slot."))
(testing "with slots that have explicit field types"
(ok (defclass validated3 ()
((name :type string
:field-type :member
:members ("yam" "idaho")))
(:metaclass sanity-clause.schema:validated-metaclass))
"can define a class.")
(c2mop:ensure-finalized (find-class 'validated3))
(let ((name-field (sanity-clause.schema::field-of (find 'name (c2mop:class-direct-slots (find-class 'validated3))
:key 'c2mop:slot-definition-name
:test 'eq))))
(ok (typep name-field 'sanity-clause.field:member-field)
"the field is of the correct type."))))
(deftest test-environment
(ok (defclass environment-sourced ()
((favorite-dog :type symbol
:field-type :member
:members (:wedge :walter)
:initarg :favorite-dog
:required t)
(age :type integer
:initarg :age
:required t)
(potato :type string
:initarg :potato
:required t))
(:metaclass sanity-clause.schema:validated-metaclass))
"can define the class.")
(ok (sanity-clause:load 'environment-sourced '(:source :env))
"can load from the envrionment."))
(deftest test-inheritance
(testing "Redefining slots with the same name"
(defclass b ()
((pie :type symbol
:field-type :member
:members (:apple :cherry)
:initarg :pie))
(:metaclass sanity-clause.schema:validated-metaclass))
(defclass b ()
((pie :type string
:field-type :member
:members ("peach" "key-lime")
:initarg :pie))
(:metaclass sanity-clause.schema:validated-metaclass))
(ok (signals (sanity-clause:load 'b '(:pie :apple)) 'sanity-clause.field:conversion-error)
"take the most specific definition of the field, raising an error for values that were valid for the old version.")
(ok (make-instance 'b :pie "peach")
"accept values for the new version of the slot.")))
(deftest test-nested-class
(defclass pie ()
((pie :type string
:field-type :member
:members ("peach" "key-lime")
:initarg :pie))
(:metaclass sanity-clause.schema:validated-metaclass))
(defclass pie-inventory ()
((pie :field-type :nested
:element-type pie
:data-key :pie
:initarg :pie)
(quantity :type integer
:data-key :qty))
(:metaclass sanity-clause.schema:validated-metaclass))
(defclass pie-list ()
((pies :type list
:field-type :list
:element-type (:nested :element-type pie)
:initarg :pies
:data-key :pies))
(:metaclass sanity-clause.schema:validated-metaclass))
(testing "pie inventory"
(let ((inventory (sanity-clause:load 'pie-inventory '(:pie (:pie "peach") :qty 10))))
(ok (typep (slot-value inventory 'pie) 'pie)
"Pie slot is an instance of pie class.")
(ok (typep (slot-value inventory 'quantity) 'integer)
"Quantity slot is an instance of integer.")))
(testing "list of pies"
(let ((pie-list (sanity-clause:load 'pie-list '(:pies ((:pie "peach") (:pie "peach") (:pie "key-lime"))))))
(ok pie-list
"Can create a nested class with pies in it.")
(ok (every (lambda (i) (typep i 'pie)) (slot-value pie-list 'pies))
"The field is filled with instances of the pie class.")
(ok (= (length (slot-value pie-list 'pies)) 3)
"The correct number of sub-classes are created."))))
(deftest test-slot-type-to-field-initargs
(ok (eq (sanity-clause.schema::slot-type-to-field-initargs '(integer 0 10)) (find-class 'sanity-clause.field:integer-field))
"finds a field type for (INTEGER 0 10).")
(ok (eq (sanity-clause.schema::slot-type-to-field-initargs 'integer) (find-class 'sanity-clause.field:integer-field))
"finds a field type for INTEGER.")
(ok (eq (sanity-clause.schema::slot-type-to-field-initargs '(string 10)) (find-class 'sanity-clause.field:string-field))
"finds a field type for (STRING 10).")
(ok (eq (sanity-clause.schema::slot-type-to-field-initargs 'string) (find-class 'sanity-clause.field:string-field))
"finds a field type for STRING."))
| 13,509 | Common Lisp | .lisp | 272 | 40.165441 | 164 | 0.609903 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 823fd3e18c5d0d71dc9de135227aeba5c35fe15652e38b048b5693e5580984f2 | 4,086 | [
-1
] |
4,087 | field.lisp | fisxoj_sanity-clause/t/field.lisp | (defpackage sanity-clause/test.field
(:use #:cl
#:rove
#:sanity-clause.field
#:alexandria
#:arrows))
(in-package #:sanity-clause/test.field)
(eval-when (:load-toplevel :compile-toplevel)
(defvar +manual-only-fields+ '(map-field list-field nested-field one-field-of-field one-schema-of-field member-field)
"Symbols of field types that require extra data to exist, like :class:`member-field`, which requires a set of symbols as an initarg."))
;; (setf +manual-only-fields+ '(map-field list-field nested-field one-field-of-field one-schema-of-field member-field))
(defmacro with-test-fields (() &body body)
"Generates a lexical environment where one of each kind of field (classes with a -FIELD suffix) are defined and bound to their name.
E.g. (let ((string-field (make-field 'string))
...)
[BODY])"
`(let (,@(let (field-bindings)
(do-external-symbols (symbol (find-package :sanity-clause.field) field-bindings)
(when (and (str:ends-with-p "-FIELD" (symbol-name symbol))
(not (member symbol +manual-only-fields+))
(find-class symbol nil))
(push `(,symbol (make-instance ',symbol)) field-bindings)))))
,@body))
(defclass inventory ()
((potato-count :reader potato-count-of :initarg :count)))
(deftest test-find-field
(ok (sanity-clause.field:find-field :string)
"can find a field by symbol.")
(ok (sanity-clause.field:find-field "real")
"can find a field by string.")
(ok (signals (sanity-clause.field:find-field nil))
"raises an error when it can't find the given field."))
(deftest test-get-value
(testing "missing values"
(let ((default-field (make-instance 'field :default 3 :attribute 'potato-count))
(field (make-instance 'field :attribute 'potato-count))
(clos-inventory (make-instance 'inventory))
(plist-inventory '())
(alist-inventory))
(ok (= (sanity-clause.protocol:get-value default-field clos-inventory) 3)
"Default values work for clos objects.")
(ok (eq (sanity-clause.protocol:get-value field clos-inventory) :missing)
"A missing value with no default is :missing for clos objects.")
(ok (= (sanity-clause.protocol:get-value default-field plist-inventory) 3)
"Default values work for plists.")
(ok (eq (sanity-clause.protocol:get-value field plist-inventory) :missing)
"A missing value with no default is :missing for plists.")
(ok (= (sanity-clause.protocol:get-value default-field alist-inventory) 3)
"Default values work for alists.")
(ok (eq (sanity-clause.protocol:get-value field alist-inventory) :missing)
"A missing value with no default is :missing for alists."))))
(deftest test-deserialize
(with-test-fields ()
(testing "String field"
(ok (sanity-clause.protocol:deserialize string-field "potato")
"deserializes a string.")
(ok (signals (sanity-clause.protocol:deserialize string-field 4.5) 'conversion-error)
"signals an error when given a number."))
(testing "Integer field"
(ok (sanity-clause.protocol:deserialize integer-field "4")
"deserializes a string.")
(ok (sanity-clause.protocol:deserialize integer-field 4)
"deserializes an integer.")
(ok (signals (sanity-clause.protocol:deserialize integer-field 4.5) 'conversion-error)
"signals an error when given a float.")
(ok (signals (sanity-clause.protocol:deserialize integer-field "garbage") 'conversion-error)
"signals an error when given a garbage string."))
(testing "Real field"
(ok (sanity-clause.protocol:deserialize real-field "3.1415")
"deserializes PI as a string ;).")
(ok (sanity-clause.protocol:deserialize real-field 3.1415)
"deserializes PI as a float ;).")
(ok (signals (sanity-clause.protocol:deserialize real-field "garbage") 'conversion-error)
"signals an error when given a garbage string.")
(ok (signals (sanity-clause.protocol:deserialize real-field :garbage) 'conversion-error)
"signals an error when given a non-string and non-real datatype."))
(testing "Member field"
(let ((member-field (make-field 'member :members '(:yam :yukon :idaho))))
(ok (sanity-clause.protocol:deserialize member-field "YaM")
"deserializes a string with different case into its union member.")
(ok (sanity-clause.protocol:deserialize member-field :idaho)
"deserializes a keyword that is a union member.")
(ok (signals (sanity-clause.protocol:deserialize member-field :woodear) 'conversion-error)
"signals an error for a keyword that isn't a member of the union.")
(ok (signals (sanity-clause.protocol:deserialize member-field "washington") 'conversion-error)
"signals an error for a string that isn't a member of the union.")
(ok (signals (sanity-clause.protocol:deserialize member-field 3) 'conversion-error)
"signals an error for a non-string-like type.")))
(testing "URI field"
(ok (sanity-clause.protocol:deserialize uri-field "https://something.com/potato?woo=bar#id")
"accpets a valid uri")
(skip "Not sure how to validate uris, yet"
;; (ok (signals (sanity-clause.protocol:deserialize uri-field "woo//bugs") 'conversion-error)
;; "signals an error on a non-uri value.")
))
(testing "Boolean field"
(ok (eq (sanity-clause.protocol:deserialize boolean-field "on") t)
"converts a truthy string to t.")
(ok (signals (sanity-clause.protocol:deserialize boolean-field "wumbo") 'conversion-error)
"signals an error for an uncertain value."))
(testing "Timestamp field"
(ok (typep (sanity-clause.protocol:deserialize timestamp-field "2006-06-06TZ") 'local-time:timestamp)
"converts values to timestamps from LOCAL-TIME.")
(ok (signals (sanity-clause.protocol:deserialize timestamp-field "pizza") 'conversion-error)
"throws a conversion error on badly formatted timestamp."))))
(deftest test-validate
(testing "validation-error"
;; Two disjoint criteria to generate two validation errors
(let ((test-field (make-field 'integer :validator (list (lambda (v) (sanity-clause.validator:int v :max -3))
(lambda (v) (sanity-clause.validator:int v :min 3))))))
(handler-case
(progn (sanity-clause.protocol:validate test-field "woo.com")
(fail "invalid data didn't raise a validation-error."))
(validation-error (e)
(ok (= (length (error-messages-of e)) 2)
"had more than 0 error messages.")))))
(with-test-fields ()
(testing "Integer field"
(ok (eq (sanity-clause.protocol:validate integer-field 4) nil)
"validates an integer."))
(testing "Email field"
(ok (null (sanity-clause.protocol:validate email-field "[email protected]"))
"validates an email address.")
(ok (signals (sanity-clause.protocol:validate email-field "wooo.com") 'validation-error)
"raises an error when given an invalid email address."))
(testing "String field"
(ok (null (sanity-clause.protocol:validate string-field "some string"))
"accepts any string."))
(testing "Constant field"
(let ((constant-string-field (make-field 'constant :constant "potato" :test 'string=))
(constant-number-field (make-field 'constant :constant 3 :test '=))
(constant-keyword-field (make-field 'constant :data-key 'potato-type :constant :russet)))
(ok (null (sanity-clause.protocol:validate constant-string-field "potato"))
"validates a correct string with string=.")
(ok (signals (sanity-clause.protocol:validate constant-string-field "worm") 'validation-error)
"raises an error for a value that isn't the constant according to string=.")
(ok (null (sanity-clause.protocol:validate constant-number-field 3))
"validates a constant number value with =.")
(ok (signals (sanity-clause.protocol:validate constant-number-field 5) 'validation-error)
"raises an error for a value that isn't = to a constant.")
(ok (signals (sanity-clause.protocol:validate constant-keyword-field :armadillo) 'sanity-clause.field:validation-error)
"raises an error if the value doesn't match the constant value")))
(testing "UUID field"
(ok (null (sanity-clause.protocol:validate uuid-field "74827715-C657-4122-B6CF-63E3FA700FF6"))
"accepts a uuid string.")
(ok (signals (sanity-clause.protocol:validate uuid-field "74827715-GGGG-4122-B6CF-63E3FA700FF6") 'validation-error)
"raises validation errors for something that looks like a uuid, but has forbidden 'G's in it."))))
(deftest test-missing-values
(defclass t-m-v-pizza ()
((type :field-type :member
:initarg :type
:members (:pepperoni :hawaiian :plain)
:required t)
(size :field-type :member
:initarg :size
:members (:small :medium :large))
(rating :field-type :integer
:initarg :rating
:validator (lambda (rating) (sanity-clause.validator:int rating :min 0 :max 5))))
(:metaclass sanity-clause:validated-metaclass))
(ok (signals (sanity-clause:load 't-m-v-pizza
'(:size :small))
'required-value-error)
"a required field signals an error when it's not supplied.")
(ok (not (slot-boundp (sanity-clause:load 't-m-v-pizza '(:type :plain)) 'rating))
"non-required fields are left unbound if data isn't supplied."))
(deftest test-nested-field
(defclass cat ()
((name :type string
:data-key :name)
(age :type integer
:initarg :data-key))
(:metaclass sanity-clause:validated-metaclass))
(defclass human ()
((name :type string
:initarg :name)
(cat-friend :field-type :nested
:element-type cat
:initarg :cat-friend))
(:metaclass sanity-clause:validated-metaclass))
(defclass human-with-cat-list ()
((name :type string
:data-key :name)
(cat-friends :field-type :list
:element-type (:nested :element-type cat)
:data-key :cat-friends))
(:metaclass sanity-clause:validated-metaclass))
(testing "simple nesting"
(let ((data-with-cat '(:name "Matt" :cat-friend (:name "Tara" :age 10)))
(data-without-cat '(:name "Matt")))
(ok (typep (slot-value (sanity-clause:load 'human data-with-cat) 'cat-friend) 'cat)
"deserializes a cat class also, when data exists.")
(ok (not (slot-boundp (sanity-clause:load 'human data-without-cat) 'cat-friend))
"leaves a slot unbound, when data is missing and the slot isn't required.")))
(testing "list nesting"
(let ((data-with-cats '(:name "Matt"
:cat-friends ((:name "Tara"
:age 10)
(:name "Tiger"
:age 4))))
(data-without-cats-field '(:name "Matt"))
(data-with-zero-cats '(:name "Matt" :cat-friends ())))
(ok (= (length (slot-value (sanity-clause:load 'human-with-cat-list data-with-cats) 'cat-friends)) 2)
"deserializes a list of cat classes, when data exists.")
(ok (zerop (length (slot-value (sanity-clause:load 'human-with-cat-list data-with-zero-cats) 'cat-friends)))
"deserializes a list of zero cat classes, when fields exists but is empty.")
(ok (not (slot-boundp (sanity-clause:load 'human-with-cat-list data-without-cats-field) 'cat-friends))
"leaves a slot unbound, when data is missing and the slot isn't required."))))
(deftest test-one-schema-of-field
(testing "A one-schema-of-field with two options"
(defclass tosof-pizza ()
((name :data-key :name
:type string
:required t))
(:metaclass sanity-clause.schema:validated-metaclass))
(defclass tosof-weasel-count ()
((count :data-key :count
:type integer
:validate (lambda (v) (sanity-clause.validator:int v :min 0))
:required t))
(:metaclass sanity-clause.schema:validated-metaclass))
(let ((dumb-field (sanity-clause.field:make-field :one-schema-of
:schema-choices '(tosof-pizza tosof-weasel-count)
:required t)))
(ok (typep (sanity-clause.protocol:deserialize dumb-field '(:name "pepperoni")) 'tosof-pizza)
"decodes the first option.")
(ok (typep (sanity-clause.protocol:deserialize dumb-field '(:count "112")) 'tosof-weasel-count)
"decodes the second option.")
(ok (signals (sanity-clause.protocol:deserialize dumb-field '(:armadillo :arnie)) 'sanity-clause.field:conversion-error)
"signals an error if it can't decode either option.")))
(testing "a descriminated union based on a 'version' field)"
(defclass tosof-v1 ()
((version :field-type :constant
:initarg :version
:constant "1"
:required t))
(:metaclass sanity-clause:validated-metaclass))
(defclass tosof-v2 ()
((version :field-type :constant
:initarg :version
:constant "2"
:required t))
(:metaclass sanity-clause:validated-metaclass))
(defclass tosof-v3 ()
((version :field-type :constant
:initarg :version
:constant "3"
:required t))
(:metaclass sanity-clause:validated-metaclass))
(let ((union-type-field (make-field :one-schema-of :schema-choices '(tosof-v1 tosof-v2 tosof-v3))))
(ok (every 'eq
'(tosof-v3 tosof-v1 tosof-v2)
(mapcar (lambda (data) (class-name (class-of (sanity-clause.protocol:deserialize union-type-field data))))
'((:version "3") (:version "1") (:version "2"))))
"decodes to the correct version of the class."))))
(deftest test-one-field-of-field
(testing "a one-of-field defined with :field-choices class syntax"
(let* ((string-field (make-field :string :validator 'sanity-clause.validator:not-empty))
(integer-field (make-field :integer))
(field (sanity-clause:make-field :one-field-of :data-key :data :field-choices (list string-field integer-field))))
(ok (typep (sanity-clause.protocol:resolve field '(:data "hello")) 'string)
"accepts a string.")
(ok (typep (sanity-clause.protocol:resolve field '(:data 4)) 'integer)
"accepts an integer.")
(ok (signals (sanity-clause.protocol:resolve field (list :data (local-time:now))) 'sanity-clause.field:conversion-error)
"signals an error for a datetime.")))
(testing "a one-of-field defined with :field-choices keyword syntax"
(let ((field (sanity-clause:make-field :one-field-of :data-key :data :field-choices '((:string :validator (:not-empty)) :integer))))
(ok (typep (sanity-clause.protocol:resolve field '(:data "hello")) 'string)
"accepts a string.")
(ok (typep (sanity-clause.protocol:resolve field '(:data 4)) 'integer)
"accepts an integer.")
(ok (signals (sanity-clause.protocol:resolve field (list :data (local-time:now))) 'sanity-clause.field:conversion-error)
"signals an error for a datetime."))))
| 15,332 | Common Lisp | .lisp | 274 | 47.824818 | 139 | 0.663124 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | d33ae19188e93b540db4c6e6007bc315e5d820a7a7c929434df6b9f7152abacf | 4,087 | [
-1
] |
4,088 | util.lisp | fisxoj_sanity-clause/t/util.lisp | (defpackage sanity-clause/test.util
(:use #:cl
#:alexandria
#:rove
#:sanity-clause.util))
(in-package #:sanity-clause/test.util)
(defclass test-class ()
((value :initarg :value)))
(deftest test-get-value
(let ((alist '((:value . 2)))
(plist '(:value 2))
(object (make-instance 'test-class :value 2)))
(testing "alists"
(multiple-value-bind (value found-p) (get-value alist :value)
(ok (= value 2)
"Finds a value that exists.")
(ok (eq found-p t)
"Says it found the value for a value that exists."))
(multiple-value-bind (value found-p) (get-value alist :nonexistent :default)
(ok (eq value :default)
"Returns the default value for a missing value.")
(ok (eq found-p nil)
"Knows it didn't find the value for a missing value.")))
(testing "plists"
(multiple-value-bind (value found-p) (get-value plist :value)
(ok (= value 2)
"Finds a value that exists.")
(ok (eq found-p t)
"Says it found the value for a value that exists."))
(multiple-value-bind (value found-p) (get-value plist :nonexistent :default)
(ok (eq value :default)
"Returns the default value for a missing value.")
(ok (eq found-p nil)
"Knows it didn't find the value for a missing value.")))
(testing "objects"
(multiple-value-bind (value found-p) (get-value object 'value)
(ok (= value 2)
"finds a value that exists.")
(ok (eq found-p t)
"says it found the value for a value that exists."))
(multiple-value-bind (value found-p) (get-value object 'nonexistent :default)
(ok (eq value :default)
"returns the default value for a missing value.")
(ok (eq found-p nil)
"knows it didn't find a value for a missing value.")))
(testing "environment variables"
(multiple-value-bind (value found-p) (get-value :env 'value)
(ok (string= value "2")
"finds a value that exists.")
(ok (eq found-p t)
"says it found the value for a value that exists."))
(multiple-value-bind (value found-p) (get-value object :env :default)
(ok (eq value :default)
"returns the default value for a missing value.")
(ok (eq found-p nil)
"knows it didn't find a value for a missing value.")))))
| 2,328 | Common Lisp | .lisp | 56 | 35.160714 | 83 | 0.631695 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 461ed65f0563763120cb648e49641f1518848b7440a796b0a6d6be8b9b3e9f75 | 4,088 | [
-1
] |
4,089 | loadable-schema.lisp | fisxoj_sanity-clause/t/loadable-schema.lisp | (defpackage sanity-clause/test.loadable-schema
(:use #:cl
#:rove
#:alexandria))
(in-package :sanity-clause/test.loadable-schema)
(deftest test-load-schema
(macrolet ((test-case (&key test-data (data-key-transformer '#'identity))
`(let* ((schema (sanity-clause.loadable-schema:load-schema
(asdf:system-relative-pathname :sanity-clause/test "t/fixtures/schema.sexp")
:data-key-transformer ,data-key-transformer))
(raw-data ',test-data)
(data (sanity-clause.protocol:load schema raw-data)))
(ok (typep (getf data :port) 'integer)
"port is an integer.")
(ok (typep (getf data :name) 'string)
"name is a string.")
(ok (eq (getf data :mode) :on)
"member was converted to a keyword.")
(ok (eq (getf data :boolean) nil)
"boolean is off."))))
(testing "can load a schema with keyword keys"
(test-case :test-data ((:port . 3) (:name . "something") (:mode . "on") (:boolean . "no"))))
(testing "can load a schema with string keys"
(test-case :test-data (("port" . 3)
("name" . "something")
("mode" . "on")
("boolean" . "no"))
:data-key-transformer #'string-downcase))))
| 1,391 | Common Lisp | .lisp | 28 | 36.857143 | 108 | 0.539143 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 24826900eaa3f9ec821874a63c1f0609ff416be45ab282bda13e7ee21b957832 | 4,089 | [
-1
] |
4,090 | json.lisp | fisxoj_sanity-clause/t/serde/json.lisp | (defpackage sanity-clause/test.serde.json
(:use #:cl
#:rove
#:alexandria
#:sanity-clause.serde.json))
(in-package :sanity-clause/test.serde.json)
(let ((cases '(("something" . "something")
("potato-type" . "potatoType")
("some-cool-thing" . "someCoolThing"))))
(deftest test-lisp-name-to-json-name
(loop for (lisp . json) in cases
do (ok (string= (lisp-name-to-json-name lisp) json)
(format nil "correctly converts ~S to ~S" lisp json))))
(deftest test-json-name-to-lisp-name
(loop for (lisp . json) in cases
do (ok (string= (json-name-to-lisp-name json) lisp)
(format nil "correctly converts ~S to ~S" json lisp)))))
| 669 | Common Lisp | .lisp | 17 | 35.352941 | 59 | 0.667183 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | a0dba51cb440539159411c82bc44746eb8a748b9793731cda53cf4d3e5d43539 | 4,090 | [
-1
] |
4,091 | sanity-clause.asd | fisxoj_sanity-clause/sanity-clause.asd | (defsystem sanity-clause
:author "Matt Novenstern"
:license "LGPLv3"
:version "0.7.4"
:homepage "https://fisxoj.github.io/sanity-clause/"
:depends-on ("alexandria"
"arrows"
"cl-ppcre"
"closer-mop"
"local-time"
"str"
"trivial-types"
"parse-float"
"quri")
:pathname "src"
:components ((:file "util")
(:file "validator")
(:file "protocol")
(:file "field")
(:file "loadable-schema")
(:file "schema")
(:file "sanity-clause"))
:description "Sanity clause is a data contract and validation library."
:long-description #.(uiop:read-file-string #P"README.rst")
:in-order-to ((test-op (test-op sanity-clause/test))))
(defsystem sanity-clause/test
:depends-on ("sanity-clause"
"rove")
:pathname "t"
:components ((:file "rove-junit-reporter")
(:file "util")
(:file "field")
(:file "loadable-schema")
(:file "schema"))
:perform (test-op (op c)
(declare (ignore op))
(uiop:symbol-call :rove/reporter/junit :run c
:env '(("VALUE" . "2")
("POTATO" . "YAM")
("AGE" . "11")
("FAVORITE_DOG" . "WEDGE")))))
| 1,339 | Common Lisp | .asd | 41 | 23.073171 | 73 | 0.51466 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | b4a1712a81c0d716e0122ea92af9959ef4094932ff0289910027110ac23aec44 | 4,091 | [
-1
] |
4,092 | sanity-clause-json.asd | fisxoj_sanity-clause/sanity-clause-json.asd | (defsystem sanity-clause-json
:depends-on ("sanity-clause"
"jonathan")
:pathame "src/serde/"
:components ((:file "json")))
| 137 | Common Lisp | .asd | 5 | 23.6 | 31 | 0.659091 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 4b37c383aa720f0d21fe503a75c7d2ffa1ccd6e646299a9a03fa970b05c2cd77 | 4,092 | [
-1
] |
4,113 | test.yml | fisxoj_sanity-clause/.github/workflows/test.yml | name: Test
on: [push]
jobs:
test:
strategy:
matrix:
implementation:
- sbcl
- ccl
# - ecl
# - abcl
test-package:
- sanity-clause/test
name: ${{ matrix.implementation }}
container: clfoundation/cl-devel:2021-06-01
runs-on: ubuntu-latest
timeout-minutes: 10
env:
JUNIT_ENABLED: 1
JUNIT_REPORT_FILENAME: /home/cl/report.xml
CL_SOURCE_REGISTRY: (:source-registry (:tree "/__w/") :inherit-configuration)
# So actions run here instead of the /__w/ directory, which belongs to a magical github user
HOME: /home/cl
steps:
- name: Checkout
uses: actions/checkout@v1
- name: Kludge so the cache works
run: sudo chmod ogu+rw -R /__w/_temp
- name: Cache compiled files
uses: actions/cache@v2
with:
path: |
~/.cache/common-lisp
~/quicklisp/dists
key: "${{ hashFiles('**.asd') }}-${{ matrix.implementation}}-v1"
restore-keys: ${{ hashFiles('**.asd') }}-
env:
RUNNER_TEMP: /tmp
- name: Install dependencies
run: cl-launch -l ${{ matrix.implementation }} -Q '(ql:quickload :${{ matrix.test-package }})'
- name: Run tests
run: cl-launch -l ${{ matrix.implementation }} -Q '(asdf:test-system :${{ matrix.test-package }})'
- name: Publish Results
uses: mikepenz/action-junit-report@v2
if: always()
with:
report_paths: '/home/cl/report.xml'
check_name: "${{ matrix.implementation }} Test Report"
generate-docs:
needs: test
runs-on: ubuntu-latest
if: ${{ github.event_name == 'push' && github.ref == 'refs/heads/master' }}
steps:
- name: Checkout
uses: actions/checkout@v1
- name: Generate Docs
run: |
docker pull quay.io/fisxoj/coo:latest
docker run --rm -v $PWD:/work:Z quay.io/fisxoj/coo:latest
- name: Publish
uses: peaceiris/actions-gh-pages@v3
with:
github_token: ${{ secrets.GITHUB_TOKEN }}
publish_dir: ./docs
| 2,138 | Common Lisp | .l | 64 | 25.5 | 106 | 0.576737 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 7d3173a4e9b2ae5e4f0e9ed500fe4de940816cecaace423895a2a2f13602350e | 4,113 | [
-1
] |
4,128 | schema.sexp | fisxoj_sanity-clause/t/fixtures/schema.sexp | (:port (:integer :validator ((:int :min 0) (:int :max 5)))
:name (:string :validator (:not-empty))
:mode (:member :members (:on :off))
:boolean (:boolean :default t))
| 170 | Common Lisp | .sexp | 4 | 40.75 | 58 | 0.63253 | fisxoj/sanity-clause | 49 | 2 | 8 | LGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 0a3902d0d4fb6122119ad2015bf6838b138704970a70d5c85dd7f41a423364cf | 4,128 | [
-1
] |
4,129 | win32.lisp | VitoVan_cl-pkr/win32.lisp | (in-package #:cl-pkr)
(define-foreign-library user32
(:win32 (:or "user32.dll")))
(use-foreign-library user32)
(define-foreign-library gdi32
(:win32 (:or "gdi32.dll")))
(use-foreign-library gdi32)
(defcfun ("GetDC" get-dc) :pointer (hwnd :pointer))
(defcfun ("DeleteDC" delete-dc) :boolean (hdc :pointer))
(defcfun ("ReleaseDC" release-dc) :int (hWnd :pointer) (hdc :pointer))
(defcfun ("DeleteObject" delete-object) :boolean (ho :pointer))
(defcfun ("CreateCompatibleDC" create-compatible-dc) :pointer (hdc :pointer))
(defcfun ("CreateCompatibleBitmap" create-compatible-bitmap) :pointer
(hdc :pointer)
(cx :int)
(cy :int))
(defcfun ("SelectObject" select-object) :pointer (hdc :pointer) (h :pointer))
(defcfun ("GetPixel" get-pixel) :uint32 (hdc :pointer) (x :int) (y :int))
;; https://docs.microsoft.com/en-us/windows/desktop/api/wingdi/nf-wingdi-bitblt
;; http://www.jasinskionline.com/windowsapi/ref/b/bitblt.html
;; Const SRCCOPY = &HCC0020
;; HEX Value CC0020 -> Decimal Value 13369376
(defparameter *SRCCOPY* 13369376)
(defcfun ("BitBlt" bit-blt) :boolean
(hdc :pointer)
(x :int)
(y :int)
(cx :int)
(cy :int)
(hdcSrc :pointer)
(x1 :int)
(y1 :int)
(drop :uint32))
(defun x-display-size ()
(values
(screen-width)
(screen-width)))
(defmacro with-screen-dc ((dc width height) &body body)
`(let* ((screen-dc (get-dc (null-pointer)))
(,dc (create-compatible-dc screen-dc))
(screen-size (multiple-value-list (x-display-size)))
(,width (car screen-size))
(,height (cadr screen-size))
(bitmap (create-compatible-bitmap screen-dc ,width ,height))
(old-obj (select-object ,dc bitmap)))
(unwind-protect
(progn
(bit-blt ,dc 0 0 ,width ,height screen-dc 0 0 *SRCCOPY*)
,@body)
(progn
(select-object ,dc old-obj)
(delete-dc ,dc)
(release-dc (null-pointer) screen-dc)
(delete-object bitmap)))))
(defun raw-dc->pixel-list (raw-dc x0 y0 x1 y1)
(loop for _y from y0 to y1
collect
(loop for _x from x0 to x1
collect
(let* ((decimal-pixel (get-pixel raw-dc _x _y))
(rgb-data (decimal->rgb decimal-pixel))
(r (nth 0 rgb-data))
(g (nth 1 rgb-data))
(b (nth 2 rgb-data))
(a 255))
(list b g r a)))))
(defun x-snapshot (&key (x 0) (y 0)
(width 1)
(height 1)
(offset 0))
(and
(>= x 0)
(>= y 0)
(with-screen-dc (dc w h) ; w is the real width of full screenshot
(setf x (- x offset) y (- y offset))
(let* ((proper-x (if (> x w) w (if (> x 0) x 0)))
(proper-y (if (> y h) h (if (> y 0) y 0)))
(proper-width (if (> width w) w width))
(proper-height (if (> height h) h height))
(max-x (+ proper-x proper-width))
(max-y (+ proper-y proper-height))
(proper-max-x (if (> max-x w) w max-x))
(proper-max-y (if (> max-y h) h max-y)))
(raw-dc->pixel-list
dc
proper-x
proper-y
(1- proper-max-x)
(1- proper-max-y))))))
| 3,052 | Common Lisp | .lisp | 89 | 29.179775 | 79 | 0.609417 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 348ee987b182f2bafcde9cecd215b31deb0bb2f9b098db1fa86051759db57b28 | 4,129 | [
-1
] |
4,130 | package.lisp | VitoVan_cl-pkr/package.lisp | (defpackage #:cl-pkr
(:use #:cl #:ltk
#+(or win32 darwin) #:cffi)
(:export :color-picker))
| 103 | Common Lisp | .lisp | 4 | 21.75 | 35 | 0.575758 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | c96fa78106036563dd370f0044c933f05c263703cacee5027178b9b03604fc75 | 4,130 | [
-1
] |
4,131 | cl-pkr.lisp | VitoVan_cl-pkr/cl-pkr.lisp | (in-package #:cl-pkr)
(defparameter *update-frequency* 10)
(defparameter *hacking* nil)
(setf *wish-args* '("-name" "Color Picker"))
(let ((tip-index 0))
(defun get-tip ()
(nth tip-index
#+darwin '("[Cmd + C] to Copy HEX"
"[Cmd + Shift + C] to Copy RGB"
"[Cmd + Option + C] to Copy HSL")
#+(or linux win32) '("[Control + C] to Copy HEX"
"[Control + Shift + C] to Copy RGB"
"[Control + Alt + C] to Copy HSL")))
(defun scramble-tip ()
(setf tip-index (random 3))))
(defun make-larger-image (pixels ratio)
(let* ((raw-photo (make-instance 'photo-image))
(photo (make-instance 'photo-image)))
(with-atomic
(image-setpixel raw-photo pixels 0 0)
(format-wish "~A copy ~A -zoom ~A"
(widget-path photo)
(widget-path raw-photo)
ratio)
(format-wish "image delete ~A" (widget-path raw-photo)))
photo))
(defun make-blank-image ()
(make-instance 'photo-image
:width 248
:height 248))
(defun make-point-canvas ()
(make-instance 'canvas
:background "white"
:highlightthickness 1
:highlightbackground "black"))
(defun make-sample-canvas ()
(make-instance 'canvas
:background "white"
:highlightthickness 2
:highlightbackground "black"
:width 244 :height 84))
(defun make-color-label (text)
(make-instance 'label
:text text :width 248 :padding 10))
(defun make-tip-label ()
(make-instance 'label
:text (get-tip)
:width 248 :padding 10
:foreground "blue"))
(defun make-about-button ()
(make-instance 'button
:text "About"
:command
(lambda ()
(format t "shit")
(message-box
(format nil "cl-pkr~%Version: ~A~%https://github.com/VitoVan/cl-pkr~%~%Icon made by [dinosoftlabs]~%From www.flaticon.com~%https://www.flaticon.com/authors/dinosoftlabs"
(asdf:component-version (asdf:find-system 'cl-pkr)))
"About Color Picker" "ok" "info" :parent *tk*))))
(defun init-window (&optional (width 496) (height 248))
(mapcar
(lambda (func) (funcall func *tk* width height))
'(maxsize minsize)))
(defmacro bind-hotkeys (hex-color rgb-color hsl-color)
`(progn
(bind *tk*
#+darwin "<Command-c>"
#+(or linux win32) "<Control-c>"
(lambda (e) (declare (ignore e)) (x-copy ,hex-color) (scramble-tip)))
(bind *tk*
#+darwin "<Command-Shift-c>"
#+(or linux win32) "<Control-C>"
(lambda (e) (declare (ignore e)) (x-copy ,rgb-color) (scramble-tip)))
(bind *tk*
#+darwin "<Command-Option-c>"
#+(or linux win32) "<Control-Alt-c>"
(lambda (e) (declare (ignore e)) (x-copy ,hsl-color) (scramble-tip)))))
(defun color-picker ()
(if *hacking*
(setf *wish-pathname* "./bin/tclkit-gui")
(setf
*wish-pathname*
(or
(uiop:getenv "WISH_PATHNAME")
#+(or linux darwin)
(namestring
(merge-pathnames "tclkit-gui" (car (unix-opts:argv))))
"tclkit-gui")))
(with-ltk ()
(init-window)
(let* ((hex-color nil) (rgb-color nil) (hsl-color nil)
(blank-image (make-blank-image))
(point-canvas (make-point-canvas))
(sample-canvas (make-sample-canvas))
(image-label (make-instance 'label :image blank-image))
(hex-label (make-color-label "HEX: #FFFFFF"))
(rgb-label (make-color-label "RGB: 255, 255, 255"))
(hsl-label (make-color-label "HSL: 0, 0%, 100%"))
(tip-label (make-tip-label))
(about-button (make-about-button))
(old-x nil)
(old-y nil))
(configure image-label :borderwidth 0)
(place image-label 0 0)
(place hex-label 248 0 :height 40)
(place rgb-label 248 40 :height 40)
(place hsl-label 248 80 :height 40)
(place tip-label 248 120 :height 40)
(place about-button 410 8 :height 24 :width 80)
(bind-hotkeys hex-color rgb-color hsl-color)
(labels ((tip-talk (str &key (color "blue"))
(setf (text tip-label) str)
(configure tip-label :foreground color))
(update ()
(let* ((x (screen-mouse-x))
(y (screen-mouse-y)))
(when (not (and (eq x old-x) (eq y old-y)))
(when (or (< x 0) (< y 0))
(tip-talk "Come Back to Main Screen, Please" :color "#EE0000")
(after *update-frequency* #'update)
(return-from update))
(setf old-x x old-y y)
(handler-case
(let* ((pixels (x-snapshot :x x :y y :width 31 :height 31 :offset 15))
(colors (color->strs (pixel->color pixels 15 15))))
(tip-talk (get-tip))
(setf
hex-color (first colors)
rgb-color (second colors)
hsl-color (third colors)
(text hex-label) (concat "HEX: " hex-color)
(text rgb-label) (concat "RGB: " rgb-color)
(text hsl-label) (concat "HSL: " hsl-color))
(configure point-canvas
:background hex-color
:highlightbackground (fourth colors))
(configure sample-canvas :background hex-color)
(place point-canvas 120 120 :width 8 :height 8)
(place sample-canvas 248 160)
(configure image-label :image (make-larger-image pixels 8)))
(error (c)
(tip-talk "Mmm... Try Me on Main Screen?" :color "#EE0000")))))
(after *update-frequency* #'update)))
(format-wish "focus -force .")
(after *update-frequency* #'update)))))
| 6,375 | Common Lisp | .lisp | 145 | 30.662069 | 189 | 0.508044 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 1813a7d060d8d5fc8dca09d6b0e997b510a98f485c4b3f7469b6cd593f1a4f21 | 4,131 | [
-1
] |
4,132 | linux.lisp | VitoVan_cl-pkr/linux.lisp | (in-package #:cl-pkr)
(defmacro with-default-display ((display &key (force nil)) &body body)
`(let ((,display (xlib:open-default-display)))
(unwind-protect
(unwind-protect
(progn ,@body)
(when ,force
(xlib:display-force-output ,display)))
(xlib:close-display ,display))))
(defmacro with-default-display-force ((display) &body body)
`(with-default-display (,display :force t) ,@body))
(defmacro with-default-screen ((screen) &body body)
(let ((display (gensym)))
`(with-default-display (,display)
(let ((,screen (xlib:display-default-screen ,display)))
,@body))))
(defmacro with-default-window ((window) &body body)
(let ((screen (gensym)))
`(with-default-screen (,screen)
(let ((,window (xlib:screen-root ,screen)))
,@body))))
(defun x-display-size ()
(with-default-screen (s)
(values
(xlib:screen-width s)
(xlib:screen-height s))))
(defun raw-data->pixel-list (raw-data x0 y0 x1 y1 w)
(loop for _y from 0 to (- y1 y0)
collect
(loop for _x from 0 to (- x1 x0)
collect
(let* ((cell-i (+ (* w _y)_x))
(value-i (* cell-i 4))
(r (aref raw-data value-i))
(g (aref raw-data (incf value-i)))
(b (aref raw-data (incf value-i)))
(a (aref raw-data (incf value-i))))
(list b g r a)))))
(defun x-snapshot (&key (x 0) (y 0)
(width 1)
(height 1)
(offset 0))
(and
(>= x 0)
(>= y 0)
(multiple-value-bind (w h) (x-display-size)
(with-default-window (window)
(setf x (- x offset) y (- y offset))
(let* ((proper-x (if (> x w) w (if (> x 0) x 0)))
(proper-y (if (> y h) h (if (> y 0) y 0)))
(proper-width (if (> width w) w width))
(proper-height (if (> height h) h height))
(max-x (+ proper-x proper-width))
(max-y (+ proper-y proper-height))
(proper-max-x (if (> max-x w) w max-x))
(proper-max-y (if (> max-y h) h max-y)))
(raw-data->pixel-list
(xlib:get-raw-image window :x proper-x :y proper-y
:width (- proper-max-x proper-x)
:height (- proper-max-y proper-y)
:format :z-pixmap)
proper-x
proper-y
(1- proper-max-x)
(1- proper-max-y)
(- proper-max-x proper-x)))))))
| 2,578 | Common Lisp | .lisp | 66 | 28.530303 | 70 | 0.500599 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 372a66acd5e28d843a922b76df655b681a82bcb44d97fae5275e83d28a13b8c0 | 4,132 | [
-1
] |
4,133 | common.lisp | VitoVan_cl-pkr/common.lisp | (in-package #:cl-pkr)
(defun concat (&rest rest)
(apply #'concatenate 'string rest))
(defun pixel->color (pixel-list x y)
(if pixel-list
(funcall
#'(lambda (data) (mapcar
#'(lambda (i) (nth i (nth x (nth y data))))
'(0 1 2 3)))
pixel-list)
'(255 255 255 255)))
;; Modified from Emacs/color.el (2018 with GPL 3.0)
;; So, I have to make the whole project under GPL 3.0, I think
;; https://github.com/emacs-mirror/emacs/blob/master/lisp/color.el#L157
(defun color-rgb-to-hsl (red green blue)
"Convert RGB colors to their HSL representation.
Modified from Emacs/color.el with some ceiling and multiplication call,
it's a short function, so you can compare the source yourself."
(let* ((r red)
(g green)
(b blue)
(max (max r g b))
(min (min r g b))
(delta (- max min))
(l (/ (+ max min) 2.0)))
(if (= delta 0)
(list 0 0 (ceiling (* 100 l)))
(let* ((s (if (<= l 0.5) (/ delta (+ max min))
(/ delta (- 2.0 max min))))
(rc (/ (- max r) delta))
(gc (/ (- max g) delta))
(bc (/ (- max b) delta))
(h (mod
(/
(cond
((= r max) (- bc gc))
((= g max) (+ 2.0 rc (- bc)))
(t (+ 4.0 gc (- rc))))
6.0)
1.0)))
(list (ceiling (* h 360)) (ceiling (* 100 s)) (ceiling (* 100 l)))))))
(defun color->strs (color)
(setf color (subseq color 0 3))
(list
(apply #'format nil "#~2,'0X~2,'0X~2,'0X" color)
(apply #'format nil "~A, ~A, ~A" color)
(apply #'format nil "~A, ~A%, ~A%"
(apply #'color-rgb-to-hsl
(mapcar #'(lambda (c) (/ c 255)) color)))
(apply #'format nil "#~2,'0X~2,'0X~2,'0X"
(mapcar #'(lambda (c) (- 255 c)) color))))
(defun decimal->rgb (color)
(if (> color 0)
(let ((hex-str (format nil "~6,'0X" color)))
(loop for i from 0 to 5 by 2 collect
(parse-integer
(concatenate
'string
(string (char hex-str i))
(string (char hex-str (1+ i))))
:radix 16)))
'(0 0 0)))
(defun x-copy (text)
(with-atomic (format-wish "clipboard clear")
(format-wish "clipboard append \"~A\"" text)))
| 2,449 | Common Lisp | .lisp | 65 | 28 | 80 | 0.47603 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | e8f86b4313362493abb2d5bba25086c2ce6ce74604c5e435c0c22c4216bd2290 | 4,133 | [
-1
] |
4,134 | darwin.lisp | VitoVan_cl-pkr/darwin.lisp | (in-package #:cl-pkr)
(define-foreign-library application-services
(:darwin "ApplicationServices.framework/ApplicationServices"))
(use-foreign-library application-services)
(defcfun ("CGMainDisplayID" cg-main-display-id) :uint32)
(defcfun ("CGDisplayPixelsHigh" cg-display-pixels-high) :int (display :uint32))
(defcfun ("CGDisplayPixelsWide" cg-display-pixels-wide) :int (display :uint32))
(defcfun ("CGDisplayCreateImage" cg-display-create-image) :pointer (display :uint32))
(defcfun ("CGImageRelease" cg-image-release) :void (image :pointer))
(defcfun ("CGImageGetDataProvider" cg-image-get-data-provider) :pointer (image :pointer))
(defcfun ("CGDataProviderCopyData" cg-data-provider-copy-data) :pointer (provider :pointer))
(defcfun ("CGImageGetWidth" cg-image-get-width) :int (image :pointer))
(defcfun ("CGImageGetHeight" cg-image-get-height) :int (image :pointer))
(defcfun ("CFDataGetBytePtr" cf-data-get-byte-ptr) :pointer (data :pointer))
(defcfun ("CFDataGetLength" cf-data-get-length) :int (data :pointer))
(defcfun ("CFRelease" cf-release) :void (image :pointer))
(defun get-cg-image-ref ()
(cg-display-create-image (cg-main-display-id)))
(defun get-cf-data-ref (image)
(cg-data-provider-copy-data
(cg-image-get-data-provider image)))
(defmacro with-cg-image-ref ((image) &body body)
`(let ((,image (get-cg-image-ref)))
(unwind-protect
(progn ,@body)
(cg-image-release ,image))))
(defmacro with-cf-data-ptr ((image data) &body body)
`(let* ((data-ref (get-cf-data-ref ,image))
(,data (cf-data-get-byte-ptr data-ref)))
(unwind-protect
(progn ,@body)
(cf-release data-ref))))
(defmacro with-display-pixel-data ((data width height) &body body)
`(with-cg-image-ref (img)
(let ((,width (cg-image-get-width img))
(,height (cg-image-get-height img)))
(with-cf-data-ptr (img ,data)
,@body))))
(defun x-display-size ()
(let ((display-id (cg-main-display-id)))
(values
(cg-display-pixels-wide display-id)
(cg-display-pixels-high display-id))))
(defun raw-data->pixel-list (raw-data x0 y0 x1 y1 w)
(loop for _y from y0 to y1
collect
(loop for _x from x0 to x1
collect
(let* ((cell-i (+ (* w _y)_x))
(value-i (* cell-i 4))
(r (mem-aref raw-data :uint8 value-i))
(g (mem-aref raw-data :uint8 (incf value-i)))
(b (mem-aref raw-data :uint8 (incf value-i)))
(a (mem-aref raw-data :uint8 (incf value-i))))
(list b g r a)))))
;; for holy retina screen
(defparameter *display-size-ratio* 2)
(defun x-snapshot (&key (x 0) (y 0)
(width 1)
(height 1)
(offset 0))
(and
(>= x 0)
(>= y 0)
(multiple-value-bind (display-width) (x-display-size)
(with-display-pixel-data (d w h)
(setf *display-size-ratio* (/ w display-width)
x (- (* *display-size-ratio* x) offset)
y (- (* *display-size-ratio* y) offset))
(let* ((proper-x (if (> x w) w (if (> x 0) x 0)))
(proper-y (if (> y h) h (if (> y 0) y 0)))
(proper-width (if (> width w) w width))
(proper-height (if (> height h) h height))
(max-x (+ proper-x proper-width))
(max-y (+ proper-y proper-height))
(proper-max-x (if (> max-x w) w max-x))
(proper-max-y (if (> max-y h) h max-y)))
(raw-data->pixel-list
d
proper-x
proper-y
(1- proper-max-x)
(1- proper-max-y)
w))))))
| 3,666 | Common Lisp | .lisp | 84 | 35.97619 | 92 | 0.597479 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 3fbba70d6160d4e181f08f1ead72b93a8fb1f2194dbecb167ecaed5cc8df6c0e | 4,134 | [
-1
] |
4,135 | cl-pkr.asd | VitoVan_cl-pkr/cl-pkr.asd | #+sbcl (sb-ext:unlock-package :sb-ext)
#+sbcl
(defmethod asdf:perform ((o asdf:image-op) (c asdf:system))
(uiop:dump-image (asdf:output-file o c)
:executable t
#+sb-core-compression :compression
#+sb-core-compression 9
#+win32 :application-type #+win32 :gui))
(asdf:defsystem #:cl-pkr
:description "Cross Platform Color Picker written in Common Lisp"
:author "Vito Van"
:license "GPL-3.0"
:version "1.2.0"
:depends-on (#:ltk
#+(or linux darwin) #:unix-opts
#+(or win32 darwin) #:cffi
#+linux #:clx)
:serial t
:components ((:file "package")
(:file "common")
#+darwin (:file "darwin")
#+linux (:file "linux")
#+win32 (:file "win32")
(:file "cl-pkr"))
:build-operation "program-op"
:build-pathname "bin/color-picker"
:entry-point "cl-pkr:color-picker")
| 969 | Common Lisp | .asd | 27 | 26.777778 | 67 | 0.552604 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 44908c50113680ac020ee5db4620d419e9edf6e3be6c35f2ba759f1065400200 | 4,135 | [
-1
] |
4,141 | deploy.sh | VitoVan_cl-pkr/deploy.sh | #!/bin/bash
if [ "$TRAVIS_OS_NAME" = "" ]
then
case $(uname | tr '[:upper:]' '[:lower:]') in
linux*)
export OS=linux
;;
darwin*)
export OS=osx
;;
msys*|mingw*)
export OS=windows
;;
*)
export TRAVIS_OS_NAME=notset
;;
esac
else
export OS=$TRAVIS_OS_NAME
fi
if [[ "$OS" == "windows" ]]; then export EXE=".exe"; fi
if [[ "$OS" == "osx" ]]; then export APP=".app"; fi
export TCLKIT=bin/tclkit-gui$EXE
mkdir -p bin
rm -rf bin/color-picker$EXE
sbcl --disable-debugger \
--load cl-pkr.asd \
--eval "(ql:quickload 'cl-pkr)" \
--eval "(asdf:make :cl-pkr)"
rm -rf out
mkdir -p out
if [[ "$OS" != "windows" ]]; then
if [ ! -f "$TCLKIT" ]; then
wget -O $TCLKIT \
https://github.com/VitoVan/kitgen/releases/download/8.6.12/$OS-tclkit-gui$EXE
fi
chmod +x bin/tclkit-gui;
fi
if [[ "$OS" == "windows" ]]
then
if [ "$EB" = "" ]; then
echo "Please set env EB to the path of editbin.exe"
exit 42
fi
if [ ! -f bin/rh/rh.exe ]; then
wget http://www.angusj.com/resourcehacker/resource_hacker.zip
unzip resource_hacker.zip -d bin/rh
mv bin/rh/ResourceHacker.exe bin/rh/rh.exe
fi
if [ ! -f bin/warp-packer.exe ]; then
wget -O bin/warp-packer.exe https://github.com/dgiagio/warp/releases/download/v0.3.0/windows-x64.warp-packer.exe
fi
if [ ! -f "$TCLKIT" ]; then
# get the not-UPX-ed version, to change icon with Resource Hacker
wget -O $TCLKIT \
https://github.com/VitoVan/kitgen/releases/download/8.6.12/$OS-tclkit-gui$EXE
fi
mkdir -p out/tmp
cp ./bin/color-picker.exe ./out/tmp/color-picker.exe
# copy libzstd
ls -lah /d/msys64/
cp /d/msys64/mingw64/bin/libzstd.dll ./out/tmp/libzstd.dll
bin/rh/rh.exe -open ./bin/tclkit-gui.exe -save ./out/tmp/tclkit-gui-noicon.exe -action delete -mask ICONGROUP,,
bin/rh/rh.exe -open ./out/tmp/tclkit-gui-noicon.exe -save ./out/tmp/tclkit-gui.exe -action addskip -res ./resources/iconfile.ico -mask ICONGROUP,TK
rm -rf ./out/tmp/tclkit-gui-noicon.exe
bin/warp-packer.exe --arch windows-x64 --input_dir ./out/tmp/ --exec color-picker.exe --output ./out/tmp/color-picker-warp.exe
bin/rh/rh.exe -open ./out/tmp/color-picker-warp.exe -save ./out/color-picker.exe -action addskip -res ./resources/iconfile.ico -mask ICONGROUP,MAINICON
"$EB" /subsystem:windows ./out/color-picker.exe
rm -rf out/tmp
fi
if [[ "$OS" == "osx" ]]
then
export OSX_APP_DIR=out/color-picker.app/Contents
mkdir -p $OSX_APP_DIR
cp ./resources/Info.plist $OSX_APP_DIR/
mkdir -p $OSX_APP_DIR/MacOS
cp ./bin/color-picker $OSX_APP_DIR/MacOS/color-picker-bin
cp ./bin/tclkit-gui $OSX_APP_DIR/MacOS/
# copy libzstd
cp /usr/local/lib/libzstd.1.dylib $OSX_APP_DIR/MacOS/
# set DYLD fallback
cp ./resources/color-picker.sh $OSX_APP_DIR/MacOS/color-picker
chmod +x $OSX_APP_DIR/MacOS/*
mkdir -p $OSX_APP_DIR/Resources
cp ./resources/iconfile.icns $OSX_APP_DIR/Resources
cd out && zip -r -9 color-picker$APP.zip color-picker.app && cd ..
rm -rf out/color-picker.app
fi
if [[ "$OS" == "linux" ]]
then
export LINUX_APP_DIR=out/color-picker.AppDir
mkdir -p $LINUX_APP_DIR
cp resources/AppRun $LINUX_APP_DIR/AppRun
cp resources/color-picker.desktop $LINUX_APP_DIR/
cp resources/iconfile.svg $LINUX_APP_DIR/
mkdir -p $LINUX_APP_DIR/usr/bin
cp bin/color-picker $LINUX_APP_DIR/usr/bin/
cp bin/tclkit-gui $LINUX_APP_DIR/usr/bin/
if [ ! -f bin/appimagetool ]; then
wget -O bin/appimagetool \
https://github.com/AppImage/AppImageKit/releases/download/12/appimagetool-x86_64.AppImage
fi
chmod +x bin/appimagetool
cd out && ../bin/appimagetool color-picker.AppDir color-picker.AppImage && cd ..
rm -rf out/color-picker.AppDir
fi
| 3,978 | Common Lisp | .l | 106 | 31.90566 | 155 | 0.63886 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 329a50c68f1829c8a42e9e41989ea512d2a19079fef0a4be63ec2e6b3303e509 | 4,141 | [
-1
] |
4,144 | .travis.yml | VitoVan_cl-pkr/.travis.yml | language: c
os:
- linux
- osx
- windows
addons:
apt:
packages:
- sbcl
before_install:
- if [[ "$TRAVIS_OS_NAME" == "osx" ]]; then export HOMEBREW_NO_AUTO_UPDATE=1; fi
- if [[ "$TRAVIS_OS_NAME" == "osx" ]]; then brew install sbcl; fi
- if [[ "$TRAVIS_OS_NAME" == "osx" ]]; then brew install make; fi
- if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then wget http://prdownloads.sourceforge.net/sbcl/sbcl-1.4.14-x86-64-windows-binary.msi; fi
- if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then 7z x sbcl-1.4.14-x86-64-windows-binary.msi -Osbcl-1.4.14; fi
- if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then choco install make; fi
install:
- wget http://downloads.sourceforge.net/project/sbcl/sbcl/1.5.3/sbcl-1.5.3-source.tar.bz2
- bzip2 -cd sbcl-1.5.3-source.tar.bz2 | tar xvf -
- cd sbcl-1.5.3
- if [[ "$TRAVIS_OS_NAME" == "osx" ]]; then export GNUMAKE=gmake; fi
- if [[ "$TRAVIS_OS_NAME" != "windows" ]]; then sh make.sh --with-fancy --with-sb-core-compression; fi
- if [[ "$TRAVIS_OS_NAME" != "windows" ]]; then sudo sh install.sh; fi
- if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then PATH=$PATH:"../sbcl-1.4.14/" SBCL_HOME="../sbcl-1.4.14/" sh make.sh --with-fancy --with-sb-core-compression; fi
- if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then sh install.sh; fi
- if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then export PATH=$PATH:"C:\Program Files/sbcl/bin/"; fi
- if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then export SBCL_HOME="C:\Program Files/sbcl/lib/sbcl/"; fi
- cd ..
- if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then export RH="C:\Program Files (x86)/Resource Hacker/ResourceHacker.exe"; fi
- if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then cd ./.travis && ./whereis-editbin.bat && cd ..; fi
- if [[ "$TRAVIS_OS_NAME" == "windows" ]]; then export EB=`cat ./.travis/EDITBIN_PATH`; fi
- wget https://beta.quicklisp.org/quicklisp.lisp
- sbcl --load quicklisp.lisp --eval '(progn (quicklisp-quickstart:install) (quit))'
- echo '(let ((quicklisp-init (merge-pathnames "quicklisp/setup.lisp" (user-homedir-pathname)))) (when (probe-file quicklisp-init) (load quicklisp-init)))' > ~/.sbclrc
script:
- bash deploy.sh
# https://github.com/probonopd/uploadtool
after_success:
- export UPLOADTOOL_SUFFIX=$TRAVIS_OS_NAME
- ls -lh out/* # Assuming you have some files in out/ that you would like to upload
- wget -c https://github.com/probonopd/uploadtool/raw/master/upload.sh
- bash upload.sh out/*
branches:
only:
- # Do not build tags that we create when we upload to GitHub Releases
- master
| 2,560 | Common Lisp | .l | 46 | 52.695652 | 169 | 0.647927 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 13bcbc93f438202f5eb3151856cfb9fc6e7013f5c457050c8b3ab456ec9ff4f3 | 4,144 | [
-1
] |
4,146 | main.yml | VitoVan_cl-pkr/.github/workflows/main.yml | # This is a basic workflow to help you get started with Actions
name: CI
# Controls when the workflow will run
on:
push:
tags:
- "*.*.*"
- "pre-release-*"
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
# A workflow run is made up of one or more jobs that can run sequentially or in parallel
jobs:
osx-build:
# The type of runner that the job will run on
runs-on: macos-latest
# Steps represent a sequence of tasks that will be executed as part of the job
steps:
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- uses: actions/checkout@v3
# Prepare
- name: Prepare SBCL
run: |
export HOMEBREW_NO_AUTO_UPDATE=1
brew install sbcl
brew install make
wget http://downloads.sourceforge.net/project/sbcl/sbcl/2.2.7/sbcl-2.2.7-source.tar.bz2
bzip2 -cd sbcl-2.2.7-source.tar.bz2 | tar xvf -
cd sbcl-2.2.7
export GNUMAKE=gmake
sh make.sh --with-fancy --with-sb-core-compression
sudo sh install.sh
wget https://beta.quicklisp.org/quicklisp.lisp
sbcl --load quicklisp.lisp --eval '(progn (quicklisp-quickstart:install) (quit))'
echo '(let ((quicklisp-init (merge-pathnames "quicklisp/setup.lisp" (user-homedir-pathname)))) (when (probe-file quicklisp-init) (load quicklisp-init)))' > ~/.sbclrc
# Runs a set of commands using the runners shell
- name: Build APP
run: |
bash deploy.sh
ls -lah out/
- name: GH Release
uses: softprops/[email protected]
with:
prerelease: true
files: |
out/*
# This workflow contains a single job called "build"
linux-build:
# The type of runner that the job will run on
runs-on: ubuntu-latest
# Steps represent a sequence of tasks that will be executed as part of the job
steps:
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- uses: actions/checkout@v3
# Prepare
- name: Prepare SBCL
run: |
export HOMEBREW_NO_AUTO_UPDATE=1
sudo apt install sbcl libzstd-dev libcapstone-dev gcc-multilib
wget http://downloads.sourceforge.net/project/sbcl/sbcl/2.2.7/sbcl-2.2.7-source.tar.bz2
bzip2 -cd sbcl-2.2.7-source.tar.bz2 | tar xvf -
cd sbcl-2.2.7
sh make.sh --with-fancy --with-sb-core-compression
sudo sh install.sh
wget https://beta.quicklisp.org/quicklisp.lisp
sbcl --load quicklisp.lisp --eval '(progn (quicklisp-quickstart:install) (quit))'
echo '(let ((quicklisp-init (merge-pathnames "quicklisp/setup.lisp" (user-homedir-pathname)))) (when (probe-file quicklisp-init) (load quicklisp-init)))' > ~/.sbclrc
# Runs a set of commands using the runners shell
- name: Build APP
run: |
bash deploy.sh
ls -lah out/
- name: GH Release
uses: softprops/[email protected]
with:
prerelease: true
files: |
out/*
windows-build:
# The type of runner that the job will run on
runs-on: windows-latest
# Steps represent a sequence of tasks that will be executed as part of the job
steps:
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- uses: actions/checkout@v3
- uses: msys2/setup-msys2@v2
with:
location: D:\
release: true
update: false
install: >-
unzip
p7zip
mingw-w64-x86_64-gcc
mingw-w64-x86_64-zstd
make
diffutils
git
- name: Install Host SBCL
shell: msys2 {0}
run: |
wget http://prdownloads.sourceforge.net/sbcl/sbcl-2.2.7-x86-64-windows-binary.msi
7z x sbcl-2.2.7-x86-64-windows-binary.msi -Osbcl-2.2.7-bin
wget http://downloads.sourceforge.net/project/sbcl/sbcl/2.2.7/sbcl-2.2.7-source.tar.bz2
bzip2 -cd sbcl-2.2.7-source.tar.bz2 | tar xvf -
- name: Build New SBCL
shell: msys2 {0}
run: |
cd sbcl-2.2.7
PATH=$PATH:"../sbcl-2.2.7-bin/" SBCL_HOME="../sbcl-2.2.7-bin/" sh make.sh --xc-host='sbcl --lose-on-corruption --disable-ldb --disable-debugger' --with-fancy --with-sb-core-compression
sh install.sh
- name: Config MSBuild
uses: microsoft/[email protected]
- name: Config Editbin
shell: cmd
run: |
call "C:\Program Files\Microsoft Visual Studio\2022\Enterprise\VC\Auxiliary\Build\vcvars64.bat"
where editbin > EDITBIN_PATH
- name: Config New SBCL and Build APP
shell: msys2 {0}
run: |
export PATH=$PATH:"/c/Program Files/sbcl/bin/"
export SBCL_HOME="/c/Program Files/sbcl/lib/sbcl/"
export EB=`cat EDITBIN_PATH`
wget https://beta.quicklisp.org/quicklisp.lisp
sbcl --load quicklisp.lisp --eval '(progn (quicklisp-quickstart:install) (quit))'
echo '(let ((quicklisp-init (merge-pathnames "quicklisp/setup.lisp" (user-homedir-pathname)))) (when (probe-file quicklisp-init) (load quicklisp-init)))' > ~/.sbclrc
bash deploy.sh
ls -lah out/
- name: GH Release
uses: softprops/[email protected]
with:
prerelease: true
files: |
out/*
| 5,564 | Common Lisp | .l | 134 | 32.529851 | 194 | 0.620056 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 8638d84fabf39b724df3f9b59f84c2ae74de64634bbf24681913be235b459d8c | 4,146 | [
-1
] |
4,147 | Info.plist | VitoVan_cl-pkr/resources/Info.plist | <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>NSHighResolutionCapable</key>
<true/>
<key>CFBundleIconFile</key>
<string>iconfile</string>
</dict>
</plist>
| 305 | Common Lisp | .l | 10 | 27.5 | 102 | 0.667797 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | a0c1d3f04abe2462e53cf8ef0110932d183b84c652b281f8356175a714f2feeb | 4,147 | [
-1
] |
4,148 | iconfile.svg | VitoVan_cl-pkr/resources/iconfile.svg | <?xml version="1.0" encoding="iso-8859-1"?>
<!-- Generator: Adobe Illustrator 19.0.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) -->
<svg version="1.1" id="Capa_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"
viewBox="0 0 468.293 468.293" style="enable-background:new 0 0 468.293 468.293;" xml:space="preserve">
<path style="fill:#2F4859;" d="M49.348,12.832L49.348,12.832c17.11-17.111,44.851-17.11,61.962,0.001l67.416,67.416l-61.961,61.961
L49.349,74.795C32.239,57.684,32.238,29.943,49.348,12.832z"/>
<path style="fill:#D5D6DB;" d="M187.202,78.056l148.377,148.377c29.749,29.749,47.551,69.111,50.703,110.773l18.187,18.187
c3.469,3.469,3.469,9.093,0,12.561l0,0c-3.469,3.469-9.093,3.469-12.561,0l-18.189-18.189
c-41.663-3.155-81.021-20.954-110.77-50.703L114.572,150.686L187.202,78.056z"/>
<path style="fill:#27A2DB;" d="M364.856,265.514H229.4l33.548,33.548c29.749,29.749,69.107,47.549,110.77,50.704l18.189,18.188
c3.469,3.469,9.092,3.468,12.561,0l0,0c3.469-3.469,3.469-9.093,0-12.561l-18.187-18.187
C384.367,311.901,376.974,287.481,364.856,265.514z"/>
<path style="fill:#64798A;" d="M203.832,62.471L203.832,62.471c5.782,5.782,5.782,15.155,0,20.937l-83.908,83.908
c-5.781,5.781-15.155,5.781-20.937,0l0,0c-5.781-5.781-5.781-15.155,0-20.937l83.908-83.908
C188.677,56.689,198.051,56.689,203.832,62.471z"/>
<path style="fill:#27A2DB;" d="M398.186,376.886c0,0-33.59,39.265-33.59,57.816c0,18.551,15.039,33.59,33.59,33.59
c18.551,0,33.59-15.039,33.59-33.59C431.777,416.151,398.186,376.886,398.186,376.886z"/>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
</svg>
| 1,753 | Common Lisp | .l | 48 | 34.3125 | 128 | 0.659824 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 1af4c7c7c2a8879d7d483e977dcf300cbd697631618ba01f9853349150fcaf5e | 4,148 | [
-1
] |
4,149 | color-picker.sh | VitoVan_cl-pkr/resources/color-picker.sh | #!/bin/bash
export USER_DIR=$(pwd)/
# https://stackoverflow.com/questions/59895/how-can-i-get-the-source-directory-of-a-bash-script-from-within-the-script-itsel
SOURCE="${BASH_SOURCE[0]:-$0}";
while [ -L "$SOURCE" ]; do # resolve $SOURCE until the file is no longer a symlink
DIR="$( cd -P "$( dirname -- "$SOURCE"; )" &> /dev/null && pwd 2> /dev/null; )";
SOURCE="$( readlink -- "$SOURCE"; )";
[[ $SOURCE != /* ]] && SOURCE="${DIR}/${SOURCE}"; # if $SOURCE was a relative symlink, we need to resolve it relative to the path where the symlink file was located
done
DIR="$( cd -P "$( dirname -- "$SOURCE"; )" &> /dev/null && pwd 2> /dev/null; )";
cd $DIR
if [[ "$OSTYPE" == "linux-gnu"* ]]; then
# LD_LIBRARY_PATH=./ ./color-picker-bin
echo "NO NEED TO CALL THIS FILE"
elif [[ "$OSTYPE" == "darwin"* ]]; then
DYLD_FALLBACK_LIBRARY_PATH=./ ./color-picker-bin
else
echo "Unknown Platform."
fi
| 918 | Common Lisp | .l | 19 | 45.842105 | 166 | 0.632699 | VitoVan/cl-pkr | 47 | 2 | 2 | GPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 3ac12d853dc75997c52d80c65472857df5813d2168a3586ff325110778231142 | 4,149 | [
-1
] |
4,164 | package.lisp | atgreen_red-light-green-light/package.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019, 2020, 2021 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
;;;; package.lisp
(defpackage #:matcher
(:use #:cl)
(:shadow #:package)
(:export #:make-policy-matcher #:matcher #:githash #:log-entry
#:kind #:expiration-date
#:match-pair-in-alist #:match-candidate-pattern))
(defpackage #:policy
(:use #:cl #:matcher #:cl-fad)
(:shadow #:package)
(:export #:*policy-dir* #:make-policy #:apply-policy
#:commit-url-format #:version #:compile-scanners
#:policy-repo-error #:policy-repo-error-description))
(defpackage #:rlgl-server
(:use #:snooze #:cl #:matcher #:policy #:spinneret)
(:shadow #:package)
(:export #:start-rlgl-server #:stop-rlgl-server
#:db
#:db/sqlite
#:db/postgresql
#:storage/local
#:storage/s3))
| 1,559 | Common Lisp | .lisp | 39 | 37.307692 | 78 | 0.69723 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | ad30835a8bbb5c99663a7293f2f3d2ece7fe07020df5dc6aa3a978b0217a305f | 4,164 | [
-1
] |
4,165 | storage-local.lisp | atgreen_red-light-green-light/storage-local.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019, 2020, 2021, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-server)
;;; MVP storage driver using local storage
(defclass storage/local (storage-backend)
((local-dir :reader local-dir)))
(defmethod initialize-instance :after ((backend storage/local) &key)
"Initialize a local storage backend."
(log:info "Initializing storage/local")
(setf (slot-value backend 'local-dir)
(or (gethash "local-dir" (config backend) "/var/rlgl/docs")))
(let ((filename (str:concat (local-dir backend) "/.key" )))
(if (probe-file filename)
(setf (slot-value backend 'key)
(alexandria:read-file-into-string filename :external-format :latin-1))
(let ((key (rlgl-util:random-base36-string)))
(with-open-file (stream filename
:direction :output
:if-exists :supersede
:if-does-not-exist :create)
(format stream key)
(setf (slot-value backend 'key) key))))))
(defmethod delete-document ((backend storage/local) ref)
"Delete a document from local storage."
(delete-file (str:concat (local-dir backend) "/" (string ref))))
(defmethod read-document ((backend storage/local) ref)
"Return an octet vector containing the document."
(alexandria:read-file-into-byte-vector (str:concat (local-dir backend) "/" (string ref))))
(defmethod store-document ((backend storage/local) document)
"Store a document into local storage."
(let ((filename (concatenate 'string "RLGL-" (rlgl-util:random-base36-string))))
(with-open-file (stream (str:concat (local-dir backend) "/" filename)
:direction :output
:if-exists :supersede
:if-does-not-exist :create
:element-type '(unsigned-byte 8))
(write-sequence document stream)
filename)))
| 2,523 | Common Lisp | .lisp | 53 | 44.245283 | 92 | 0.712546 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 9a9c234b37e09e005b980fa9f28daa20e3f6a7752e4f9bcfe1c69de60ca7145e | 4,165 | [
-1
] |
4,166 | policy.lisp | atgreen_red-light-green-light/policy.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: POLICY; Base: 10 -*-
;;;
;;; Copyright (C) 2018-2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
;; Matcher routines
(in-package #:policy)
(defvar *policy-lock* (bt:make-lock))
(defvar *policy-dir* nil)
(defvar *git-log-table* (make-hash-table :test 'equal))
(defvar *git-commit-table* (make-hash-table :test 'equal))
(define-condition policy-repo-error (error)
((description :reader policy-repo-error-description :initarg :description))
(:report (lambda (condition stream)
(format stream (policy-repo-error-description condition)))))
(defclass policy ()
((version :reader version)
(xfail-matchers :reader xfail-matchers)
(pass-matchers :reader pass-matchers)
(fail-matchers :reader fail-matchers)
(commit-url-format :reader commit-url-format)))
(defun guess-commit-url-format (url)
"Guess the commit URL format string based on URL."
;; They mostly look like this (gogs & github). Haven't seen
;; anything different yet...
(str:concat (if (str:ends-with? ".git" url)
(str:substring 0 (- (length url) 4) url)
url)
"/commit/~A"))
(defun make-policy (url &key (commit-url-format (guess-commit-url-format url)))
"Create an intance of a POLICY object based on the contents of the
git repo at URL. If :COMMIT-URL-FORMAT is provided, use that as the
format string for generating a git commit url given a commit hash
argument. If not provided, we will try to guess this format string
based on URL."
;; Hold one big lock, just in case...
(bt:with-lock-held (*policy-lock*)
(let* ((policy-dirname (str:concat (namestring *policy-dir*)
(subseq (ironclad:byte-array-to-hex-string
(ironclad:digest-sequence
:sha1 (flexi-streams:string-to-octets url)))
0 8))))
;; Update the policy
(let ((output (if (not (fad:directory-exists-p policy-dirname))
(progn
(log:info "GIT_TERMINAL_PROMPT=0 /usr/bin/git clone ~A ~A"
url policy-dirname)
(inferior-shell:run
(format nil "GIT_TERMINAL_PROMPT=0 /usr/bin/git clone ~A ~A"
url policy-dirname)))
(progn
(log:info "bash -c \"(cd ~A; /usr/bin/git pull --ff-only)\""
policy-dirname)
(inferior-shell:run
(format nil "bash -c \"(cd ~A; /usr/bin/git pull --ff-only)\""
policy-dirname))))))
(dolist (line output)
(log:info line)))
(let ((policy-pathname
(fad:pathname-as-directory (make-pathname :name policy-dirname))))
(let ((xfail-file (merge-pathnames-as-file policy-pathname #p"XFAIL"))
(pass-file (merge-pathnames-as-file policy-pathname #p"PASS"))
(fail-file (merge-pathnames-as-file policy-pathname #p"FAIL")))
(dolist (file (list xfail-file pass-file fail-file))
(unless (file-exists-p (namestring file))
(fad:delete-directory-and-files policy-pathname :if-does-not-exist :ignore)
(error 'policy-repo-error :description "Policy repo is missing policy files")))
(let ((p (make-instance 'policy)))
(setf (slot-value p 'version)
(inferior-shell:run/ss
(format nil "bash -c \"(cd ~A; git rev-parse HEAD)\""
policy-dirname)))
(setf (slot-value p 'commit-url-format) commit-url-format)
(setf (slot-value p 'xfail-matchers) (read-json-patterns :XFAIL xfail-file))
(setf (slot-value p 'pass-matchers) (read-json-patterns :PASS pass-file))
(setf (slot-value p 'fail-matchers) (read-json-patterns :FAIL fail-file))
;; Map all of the commit hashes to this policy for future
;; reference.
(let ((hash-log (inferior-shell:run/lines
(format nil "bash -c \"(cd ~A; git log --pretty=%H)\""
policy-dirname))))
(dolist (key hash-log)
(setf (gethash key *git-commit-table*) p)))
p))))))
;; regex matcher for the special case of numeric ranges: two floating
;; point numbers separated by "..".
(defparameter +range-matcher+
(cl-ppcre:create-scanner "^\\d+(|\.\\d*)\.\.\\d+(|\.\\d*)$"))
(defparameter +number-matcher+
(cl-ppcre:create-scanner "^\\d+(|\.\\d*)"))
(defparameter +numeric-range+
(cl-ppcre:create-scanner "^(\\d+)\.\.(\\d+)$"))
(defun parse-numeric-range (value)
"Extract the numeric values for a double-dotted range."
(metabang.bind:bind (((:values _ _ start-array end-array) (cl-ppcre:scan +numeric-range+ value)))
(values
(parse-integer
(subseq value (aref start-array 0) (aref end-array 0)))
(parse-integer
(subseq value (aref start-array 1) (aref end-array 1))))))
(defun compile-scanners (matcher)
"Given an alist, MATCHER, replace the CDR of each pair with a
function that runs one of three matching algorithms against a single
string argument: numeric range checks, regexp matching, and string
comparison. The algorithm choice depends on the CDR of the pair,
which is either a numeric range string ('..' notation), a
regexp (starting with \#^), or any other string."
(mapcar (lambda (pair)
(cons (car pair)
(cond
((cl-ppcre:scan +range-matcher+ (cdr pair))
(multiple-value-bind (start end)
(parse-numeric-range (cdr pair))
(eval `(lambda (s)
(and (cl-ppcre:scan +number-matcher+ s)
(let ((num (parse-integer s)))
(and (>= num ,start)
(<= num ,end))))))))
((eq (char (cdr pair) 0) #\^)
(eval `(lambda (s)
(cl-ppcre:scan
,(cl-ppcre:create-scanner
(str:concat (cdr pair) "$"))
s))))
(t
(eval `(lambda (s)
(string= s ,(cdr pair))))))))
matcher))
(defun extract-expiration-date (line)
"Given a matcher string LINE, return a universal time value if one
exists after the JSON object, or NIL otherwise."
(let* ((last-brace (position #\} line :from-end t))
(date-string (str:trim (str:substring (+ last-brace 1) t line))))
(and (> (length date-string) 0)
(date-time-parser:parse-date-time date-string))))
;; An arbitratily far-away date, representing "never"
(defparameter +the-year-3000+ (date-time-parser:parse-date-time "3000"))
(defun read-json-patterns (kind filename)
(let ((patterns (list)))
(let ((matcher-lines (inferior-shell:run/lines
(format nil "bash -c \"(cd $(dirname ~A); git blame -s -l $(basename ~A))\""
filename filename))))
(dolist (matcher-line matcher-lines)
(let ((githash (subseq (remove #\^ matcher-line) 0 40)))
(multiple-value-bind (lineno location)
(read-from-string (subseq matcher-line 40))
(let ((line (string-trim '(#\Space #\Tab)
(subseq matcher-line (+ 41 location)))))
(when (and (> (length line) 0)
(null (find (char line 0) "#;-")))
(let ((json
(compile-scanners
(json:decode-json-from-string line))))
(setf patterns (cons (make-policy-matcher :kind kind
:githash githash
:lineno lineno
:matcher json
:expiration-date (or (extract-expiration-date line)
+the-year-3000+))
patterns))))))))
;; Now go through git logs
(dolist (matcher patterns)
(let* ((githash (githash matcher))
(log-entry (gethash githash *git-log-table*)))
(when (and (null log-entry)
(not (string= githash ; check for local change
"0000000000000000000000000000000000000000")))
(progn
(setf log-entry (inferior-shell:run/lines
(format nil "bash -c \"(cd $(dirname ~A); git log -n 1 -r ~A $(basename ~A))\""
filename githash filename)))
(setf (gethash githash *git-log-table*) log-entry)))
(setf (slot-value matcher 'log-entry) log-entry))))
patterns))
(defun apply-policy (policy candidate-result-list)
"Apply a POLICY to CANDIDATE-RESULT-LIST, a list of test results,
where these results are represented as alists derived from json
encoded values produced by the report parsers. This function
returns two values: :GREEN or :RED, as well as a list of pairs made
by consing the matcher object with the test result alist."
(let ((red-or-green :GREEN)
(now (get-universal-time)))
(let ((result (mapcar (lambda (result)
(cons
(or
;; Check for exceptions
(find-if (lambda (matcher)
(and (< now (expiration-date matcher))
(match-candidate-pattern
result (matcher matcher))))
(xfail-matchers policy))
;; Now check for failures
(let ((red-match
(find-if (lambda (matcher)
(and (< now (expiration-date matcher))
(match-candidate-pattern
result (matcher matcher))))
(fail-matchers policy))))
(when red-match
(setf red-or-green :RED))
red-match)
;; Now check for passes
(find-if (lambda (matcher)
(and (< now (expiration-date matcher))
(match-candidate-pattern
result (matcher matcher))))
(pass-matchers policy))
;; We don't have a match. Let's fail.
(progn
(setf red-or-green :RED)
nil))
result))
candidate-result-list)))
(values red-or-green result))))
| 9,755 | Common Lisp | .lisp | 226 | 37.517699 | 99 | 0.652137 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | f8f0d0ee0eb1ce559aa28155bb6650dd3a27efcef4a90e535fd775d7d069c291 | 4,166 | [
-1
] |
4,167 | api-key.lisp | atgreen_red-light-green-light/api-key.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019, 2020, 2021 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
;; Make base32-style API keys.
;; Inspired by https://www.npmjs.com/package/uuid-apikey
(defpackage #:rlgl.api-key
(:use #:cl)
(:shadow #:package)
(:export #:make-api-key #:authorize-by-api-key #:authorize-by-policy-bound-api-key))
(in-package #:rlgl.api-key)
(defun authorize-by-api-key (db api-key)
(if (or (rlgl.db:find-puk-by-api-key db api-key)
(rlgl.db:find-policy-bound-api-key db api-key))
t
nil))
(defun authorize-by-policy-bound-api-key (db api-key policy-name)
"Return nil if API-KEY is bound to a policy that is not POLICY-NAME, and t otherwise."
(let ((bound-policy (rlgl.db:find-policy-bound-api-key db api-key)))
(if bound-policy
(string= policy-name bound-policy)
t)))
(defun int-to-byte-array (int)
(let ((a (make-array 4)))
(setf (aref a 0) (ldb (byte 8 0) int))
(setf (aref a 1) (ldb (byte 8 8) int))
(setf (aref a 2) (ldb (byte 8 16) int))
(setf (aref a 3) (ldb (byte 8 24) int))
a))
(defun string-to-base32 (s start end)
(str:substring
0 7
(base32:bytes-to-base32
(int-to-byte-array (parse-integer
(str:substring start end s) :radix 16)))))
(defun make-api-key ()
"Make a base32-style API key."
(let ((uuid (str:replace-all "-" ""
(print-object (uuid:make-v4-uuid) nil))))
(str:upcase
(str:concat
(string-to-base32 uuid 0 7)
"-"
(string-to-base32 uuid 8 15)
"-"
(string-to-base32 uuid 16 23)
"-"
(string-to-base32 uuid 24 31)))))
| 2,347 | Common Lisp | .lisp | 61 | 35.016393 | 88 | 0.670764 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | daab5f2543b1d77fb55ac6993cf8b8bc93ee9d082958c3fe49d79e6ede8d4d18 | 4,167 | [
-1
] |
4,168 | matcher.lisp | atgreen_red-light-green-light/matcher.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019, 2020 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
;; Matcher routines
(in-package #:matcher)
(defclass policy-matcher ()
((kind :initarg :kind :reader kind)
(githash :initarg :githash :reader githash)
(lineno :initarg :lineno :reader lineno)
(matcher :initarg :matcher :reader matcher)
(expiration-date :initarg :expiration-date :reader expiration-date)
(log-entry :reader log-entry)))
(defun make-policy-matcher (&key kind (githash nil)
(lineno 0)
(matcher nil)
expiration-date)
(make-instance 'policy-matcher
:kind kind
:githash githash
:lineno lineno
:matcher matcher
:expiration-date expiration-date))
(defun match-pair-in-alist (pair alist)
"Given a cons PAIR, return non-NIL if PAIR matches in ALIST using
the function stored in the CDR of PAIR."
(let ((c (assoc (car pair) alist)))
(and c (apply (cdr pair) (list (cdr c))))))
(defun match-candidate-pattern (candidate pattern)
"Given a CANDIDATE alist, return T if PATTERN matches CANDIDATE."
(not (find-if-not (lambda (v)
(match-pair-in-alist v candidate))
pattern)))
| 2,006 | Common Lisp | .lisp | 46 | 40.043478 | 75 | 0.680655 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 689394b3325e09451b5a2a826342272e43d60f5030163dd152b599f0eb7e6768 | 4,168 | [
-1
] |
4,169 | storage-s3.lisp | atgreen_red-light-green-light/storage-s3.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*-
;;;
;;; Copyright (C) 2019, 2021, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-server)
;;; MVP storage driver using s3 storage
;; ----------------------------------------------------------------------------
;; Make an AWS credentials list from environment variables
(defun getenv-aws-credentials ()
(list (uiop:getenv "AWS_ACCESS_KEY")
(uiop:getenv "AWS_SECRET_KEY")))
;; ----------------------------------------------------------------------------
(defclass storage/s3 (storage-backend)
((s3-endpoint :initarg :s3-endpoint :reader s3-endpoint)
(s3-bucket :initarg :s3-bucket :reader s3-bucket)))
(defmethod initialize-instance :after ((backend storage/s3) &key)
"Initialize a s3 storage backend."
(log:info "Initializing storage/s3")
(setf zs3:*credentials* (getenv-aws-credentials))
(setf (slot-value backend 's3-endpoint)
(or (gethash "s3-endpoint" (config backend) "s3.amazonaws.com")))
(setf (slot-value backend 's3-bucket)
(or (gethash "s3-bucket" (config backend) "rlgl-docs-2")))
(unless (zs3:bucket-exists-p (s3-bucket backend))
(zs3:create-bucket (s3-bucket backend))))
(defmethod delete-document ((backend storage/local) ref)
"Delete a document from local storage."
(zs3:delete-object (s3-bucket backend) (string ref)))
(defmethod read-document ((backend storage/s3) ref)
"Return a string containing the document."
(zs3:get-vector (s3-bucket backend) (string ref)))
(defmethod store-document ((backend storage/s3) document)
"Store a document into s3 storage."
(let ((ref (str:concat "RLGL-" (rlgl-util:random-base36-string))))
(zs3:put-vector document (s3-bucket backend) ref)
ref))
| 2,471 | Common Lisp | .lisp | 49 | 47.877551 | 79 | 0.672471 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | b85e5d5a695d909cab66e9c7e15d3087e363a899352b4e9037e808e15d0b017f | 4,169 | [
-1
] |
4,170 | test.lisp | atgreen_red-light-green-light/test/test.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*-
;;;
;;; Copyright (C) 2018-2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package #:cl-user)
(defpackage #:test-rlgl-server
(:use #:common-lisp #:rlgl-server #:prove #:matcher #:policy)
(:export #:run))
(in-package #:test-rlgl-server)
(setf prove:*default-reporter* :fiveam)
(setf prove:*debug-on-error* t)
(defvar *upload-ref* nil)
(defun test-eval (report)
(print (pathname report))
(subtest (format nil "upload ~A" report)
(let* ((params `((file . (,(pathname report)
:content-type "application/octet-stream"
:filename ,(pathname report)))))
(upload-ref
(drakma:http-request "http://localhost:8080/upload"
:method :post
:form-data t
:parameters params)))
(setf *upload-ref* upload-ref)
(like upload-ref "RLGL-[A-Z0-9]+")))
(subtest (format nil "evaluate ~A" report)
(let* ((result (drakma:http-request "http://localhost:8080/evaluate"
:method :post
:content-type "application/json"
:content (format nil "{ \"id\": \"~A\", \"policy\": \"~A\", \"ref\": \"~A\" }"
(rlgl-util:random-base36-string)
"http://github.com/moxielogic/rlgl-toolchain-policy"
*upload-ref*)))
(json (json:decode-json-from-string result)))
(setf *json* json)
(like (cdr (assoc :CALLBACK json)) "[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+[A-Z0-9]+")))
(subtest (format nil "callback ~A" report)
(let ((result (nth-value 1 (drakma:http-request "http://localhost:8080/callback"
:method :post
:content-type "application/json"
:content (format nil "{ \"id\": \"~A\", \"signature\": \"MGUCMEYUlcrqJlgR+p8AKNP1hOTZqspNbOnXMssK3xDq2q0Z9J/y0owNCaNz5gWu/NTjMAIxAPpztPFIbjtWugP0cyqhe6L3mtrzUjZazLEcTOnThJmEWPni1COga+wIUtqvgN3VxQ==\" }"
(cdr (assoc :CALLBACK *json*)))))))
(is result 200)))
)
(defun run ()
(plan 1)
(start-rlgl-server t "test/config.ini")
;; ---------------------------------------------------------------------------
;; API tests
;; ---------------------------------------------------------------------------
(subtest "start test"
(loop for i from 0 to 10
do
(let ((id (drakma:http-request "http://localhost:8080/start")))
(is (length id) 8))))
(test-eval "test/report.html")
(test-eval "test/sample-junit.xml")
(test-eval "test/mysql-aqua.html")
(test-eval "test/clair-report.json")
(test-eval "test/empty-clair-report.json")
(let* ((result (nth-value 1 (drakma:http-request "http://localhost:8080/evaluate"
:method :post
:content-type "application/json"
:content (format nil "{ \"id\": \"~A\", \"policy\": \"http://github.com/atgreen/red-light-green-light\", \"ref\": \"~A\" }"
(rlgl-util:random-base36-string)
*upload-ref*)))))
(log:info result))
(finalize)
(if (uiop:getenv "RLGL_WAIT4EVER")
(progn
(format t "Waiting forever. Hit CTRL-C to exit.")
(loop (sleep 3000))))
)
| 4,210 | Common Lisp | .lisp | 86 | 38.744186 | 233 | 0.54944 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | f0431c82d69cf09c8d17ac8974674d171583bd79ae399212b776ca148a907d3b | 4,170 | [
-1
] |
4,171 | db.lisp | atgreen_red-light-green-light/db/db.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL.DB; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019, 2020, 2021, 2022 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
;; Database routines
(in-package #:rlgl.db)
(defclass db-backend ()
((key :initarg :key :reader key)
(make-user-fn :initarg :make-user-fn :reader make-user-fn)
(make-api-key-fn :initarg :make-api-key-fn :reader make-api-key-fn)
(sql-insert-log-statement
:initarg :sql-insert-log-statement
:reader sql-insert-log-statement)))
(defmethod initialize-instance :after ((db db-backend) &key)
(let ((dbc (connect-cached db)))
(when (fresh db)
(mapc (lambda (command)
(dbi:do-sql dbc command))
'("drop table if exists log;"
"drop table if exists users;"
"drop table if exists labels;"
"drop table if exists policy_bound_api_keys;"
"drop table if exists api_keys;")))
(mapc (lambda (command)
(dbi:do-sql dbc command))
'("create table if not exists log (version char(40), colour varchar(6), report varchar(24) not null, signature char(140) not null, client_signature char(140) not null, unixtimestamp integer);"
"create table if not exists policy_bound_api_keys (api_key char(31) not null, policy varchar(256) not null);"
"create table if not exists labels (puk integer, report char(13), key varchar(64), value varchar(256));"
"create table if not exists api_keys (puk integer, api_key char(31) not null);"))))
(defmethod record-log ((db db-backend) api-key version result report signature client-signature labels)
(let ((stmt (format nil (sql-insert-log-statement db)
version result report signature client-signature)))
(log:info stmt)
(let ((connection (connect-cached db)))
(dbi:do-sql connection stmt)
(dolist (kv labels)
(dbi:do-sql connection (format nil "insert into labels(puk, report, key, value) values ('~A', '~A', '~A', '~A');"
(find-puk-by-api-key db api-key)
report
(str:substring 0 64 (string (car kv)))
(str:substring 0 256 (cdr kv))))))))
(defmethod report-log ((db db-backend) server-uri labels)
(let* ((connection (connect-cached db))
(report-sets (mapcar (lambda (kv)
(let* ((query (dbi:prepare connection
(format nil "select report from labels where key = '~A' and value = '~A'"
(str:substring 0 64 (string (car kv))) (str:substring 0 256 (cdr kv)))))
(result (dbi:execute query))
(reports (loop for row = (dbi:fetch result)
while row
collect (destructuring-bind (j1 report)
row
report))))
(fset:convert 'fset:set reports)))
labels))
(reports (if (eq (length report-sets) 1)
(car report-sets)
(fset:reduce #'fset:intersection report-sets)))
(fstr (make-array '(0) :element-type 'base-char
:fill-pointer 0 :adjustable t)))
(with-output-to-string (s fstr)
(fset:do-set (report reports)
(let* ((query (dbi:prepare (connect-cached db)
(format nil "select unixtimestamp, colour, version, client_signature from log where report = '~A';" report)))
(result (dbi:execute query)))
(loop for row = (dbi:fetch result)
while row
do (destructuring-bind (j1 time j2 result j3 version j4 client-signature)
row
(local-time:format-timestring
s (local-time:unix-to-timestamp time)
:format local-time:+rfc-1123-format+)
(format s ": ~A [~5A] ~A/doc?id=~A ~A~%" result version server-uri report client-signature))))))
fstr))
(defmethod find-signature-by-report ((db db-backend) report)
(let* ((query (dbi:prepare (connect-cached db)
(format nil "select signature from log where report = '~A';" report)))
(result (dbi:fetch (dbi:execute query))))
(str:trim (getf result :|signature|))))
(defmethod find-client-signature-by-report ((db db-backend) report)
(let* ((query (dbi:prepare (connect-cached db)
(format nil "select client_signature from log where report = '~A';" report)))
(result (dbi:fetch (dbi:execute query))))
(str:trim (getf result :|client_signature|))))
(defmethod find-puk-by-api-key ((db db-backend) api-key)
(let* ((query (dbi:prepare (connect-cached db)
(format nil "select puk from api_keys where api_key = '~A';" api-key)))
(result (dbi:fetch (dbi:execute query))))
(getf result :|puk|)))
(defmethod find-policy-bound-api-key ((db db-backend) api-key)
(let* ((query (dbi:prepare (connect-cached db)
(format nil "select policy from policy_bound_api_keys where api_key = '~A';" api-key)))
(result (dbi:fetch (dbi:execute query))))
(getf result :|policy|)))
(defmethod register-test-api-key ((db db-backend) api-key)
(dbi:do-sql (connect-cached db)
(format nil "insert into api_keys(puk, api_key) values (-1, '~A');" api-key)))
(defmethod find-user-by-keycloak-id ((db db-backend) user-uuid preferred-username)
(let* ((query (dbi:prepare (connect-cached db)
(format nil "select puk from users where user_uuid = '~A';" user-uuid)))
(result (dbi:fetch (dbi:execute query)))
(user (let ((puk (getf result :|puk|)))
(log:info "found user puk ~A" puk)
(and puk
(let* ((query (dbi:prepare (connect-cached db)
(format nil "select api_key from api_keys where puk = ~A;" puk)))
(junk (log:info (dbi:fetch (dbi:execute query))))
(api-key (getf (dbi:fetch (dbi:execute query)) :|api_key|)))
(log:info "~A" result)
(funcall (make-user-fn db) puk user-uuid api-key preferred-username))))))
(if (null user)
(progn
(log:info "registering new user ~A" user-uuid)
(dbi:do-sql (connect-cached db)
(format nil "insert into users(user_uuid, created_at) values ('~A', ~A);"
user-uuid (local-time:timestamp-to-unix (local-time:now))))
(let* ((query (dbi:prepare (connect-cached db)
(format nil "select puk from users where user_uuid = '~A';" user-uuid)))
(newpuk (getf (dbi:fetch (dbi:execute query)) :|puk|)))
(log:info "created user puk ~A" newpuk)
(dbi:do-sql (connect-cached db)
(format nil "insert into api_keys(puk, api_key) values (~A, '~A');" newpuk (funcall (make-api-key-fn db)))))
(find-user-by-keycloak-id db user-uuid preferred-username))
user)))
(defmethod register-policy-bound-api-key ((db db-backend) api-key policy)
(dbi:do-sql (connect-cached db)
(format nil "insert into policy_bound_api_keys(api_key, policy) values ('~A', '~A');" api-key policy))
(dbi:do-sql (connect-cached db)
(format nil "insert into users(user_uuid, created_at) values ('~A', ~A) on conflict do nothing;" api-key (local-time:timestamp-to-unix (local-time:now))))
api-key)
| 8,079 | Common Lisp | .lisp | 143 | 46.538462 | 195 | 0.607499 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 618664308cfa06b619507d7d35a0af3697b2e2680bab5401713664d32f6d49a7 | 4,171 | [
-1
] |
4,172 | package.lisp | atgreen_red-light-green-light/db/package.lisp | (defpackage #:rlgl.db
(:use #:cl)
(:shadow #:package)
(:export #:record-log #:report-log #:db/sqlite #:db/postgresql
#:find-puk-by-api-key #:find-user-by-keycloak-id #:find-policy-bound-api-key
#:find-signature-by-report #:find-client-signature-by-report
#:register-policy-bound-api-key #:register-test-api-key))
| 345 | Common Lisp | .lisp | 7 | 43.714286 | 80 | 0.66568 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | fa7bdf6054b843f1ac0fde5956fcf6ce469e48988027d83fe8da340ce01505e3 | 4,172 | [
-1
] |
4,173 | db-postgresql.lisp | atgreen_red-light-green-light/db/db-postgresql.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL.DB; Base: 10 -*-
;;;
;;; Copyright (C) 2019, 2020, 2021, 2022 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
;; Postgres driver
(in-package #:rlgl.db)
(defclass db/postgresql (db-backend)
((db-name
:initarg :db-name
:reader db-name)
(host
:initarg :host
:reader host)
(port
:initarg :port
:reader port)
(password
:initarg :password
:reader password)
(fresh
:initarg :fresh
:initform nil
:reader fresh))
(:default-initargs
:db-name "rlgl"
:host "localhost"
:port 5432
:sql-insert-log-statement "insert into log(version, colour, report, signature, client_signature, unixtimestamp) values ('~A', '~A', '~A', '~A', '~A', round(extract(epoch from now())));"))
(defmethod initialize-instance :after ((db db/postgresql) &key)
(let ((dbc (connect-cached db)))
(mapc (lambda (command)
(log:info command)
(dbi:do-sql dbc command))
'("create extension if not exists \"uuid-ossp\";"
"create table if not exists users (puk serial primary key, user_uuid char(36) not null, created_at integer, unique(user_uuid));"))))
(defmethod connect-cached ((db db/postgresql))
(log:info "establishing postgresql connection at ~A:~A"
(host db)
(port db))
(log:info "postgresql host IP: ~A"
(sb-bsd-sockets:get-host-by-name (host db)))
(dbi:connect-cached :postgres :database-name (db-name db)
:host (host db)
:port (port db)
:username "rlgl" :password (password db)))
| 2,225 | Common Lisp | .lisp | 58 | 34.758621 | 190 | 0.684089 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | c73e61ad01de50fa0db36782220931398efd83303df57f0881b6491a38f05cb3 | 4,173 | [
-1
] |
4,174 | db-sqlite.lisp | atgreen_red-light-green-light/db/db-sqlite.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL.DB; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019, 2020, 2021, 2022 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
;; Matcher routines
(in-package #:rlgl.db)
(defclass db/sqlite (db-backend)
((sqlite-db-filename
:initarg :filename
:reader filename)
(fresh
:initarg :fresh
:initform nil
:reader fresh))
(:default-initargs
:sql-insert-log-statement "insert into log(version, colour, report, signature, client_signature, unixtimestamp) values ('~A', '~A', '~A', '~A', '~A', strftime('%s','now'));"
:filename (error "Must supply a filename.")))
(defmethod initialize-instance :after ((db db/sqlite) &key)
(let ((dbc (connect-cached db)))
(mapc (lambda (command)
(dbi:do-sql dbc command))
'("create table if not exists users (puk integer primary key autoincrement, user_uuid char(36) not null, created_at integer, unique(user_uuid));"))))
(defmethod connect-cached ((db db/sqlite))
(dbi:connect-cached :sqlite3 :database-name (filename db)))
| 1,730 | Common Lisp | .lisp | 37 | 44.135135 | 176 | 0.707938 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 92e1470ad197f061a5ac1d67f7abf23dbeb7b75b4aad97031945e38be7af8390 | 4,174 | [
-1
] |
4,175 | package.lisp | atgreen_red-light-green-light/parsers/package.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*-
;;;
;;; Copyright (C) 2021 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(defpackage #:rlgl-parsers
(:use #:cl)
(:shadow #:package)
(:export #:parse-report
#:doctype
#:title
#:columns
#:parser/anchore
#:parser/aqua
#:parser/clair
#:parser/csv
#:parser/dejagnu
#:parser/junit
#:parser/oscap-oval
#:parser/oscap-xccdf
#:parser/popeye
#:parser/tripwire-pdf))
| 1,262 | Common Lisp | .lisp | 34 | 31.705882 | 76 | 0.650367 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | fda454e6d7fca69071d99b828778d5b34d76c4ec3ae03a3471fefd9768acf3d9 | 4,175 | [
-1
] |
4,176 | aqua.lisp | atgreen_red-light-green-light/parsers/aqua.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019, 2020, 2021, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-parsers)
;;; MVP Aqua report parser
;; ----------------------------------------------------------------------------
(defclass parser/aqua (report-parser)
()
(:default-initargs
:title "Aqua Scan Report"
:doctype "html"))
(defmethod parse-report ((parser parser/aqua) doc labels)
(let ((pdoc (plump:parse (flexi-streams:make-flexi-stream
(flexi-streams:make-in-memory-input-stream doc)
:external-format :utf-8)))
(tests-fail (list)))
(let* ((vulns (lquery:$ pdoc "#cves > tbody > tr > tr > td:nth-child(1) > a"
(combine (attr :href) (text))))
(severity (lquery:$ pdoc "#cves > tbody > tr > tr > td:nth-child(3) > span"
(text)))
(score (lquery:$ pdoc "#cves > tbody > tr > tr > td:nth-child(4) > span"
(text))))
(loop for i from 0 to (- (length vulns) 1)
do
(progn
(setf tests-fail
(cons
(json:decode-json-from-string
(format nil
"{ \"report\": \"aqua\", \"result\": \"FAIL\", \"id\": \"~A\", \"url\": \"~A\", \"severity\": \"~A\", \"score\": \"~A\" ~A}"
(car (cdr (aref vulns i)))
(car (aref vulns i))
(aref severity i)
(aref score i)
(rlgl-util:jsonify-labels labels)))
tests-fail)))))
tests-fail))
| 2,161 | Common Lisp | .lisp | 51 | 37.627451 | 132 | 0.602759 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 9670834068184e72d1408972deb9d57bb38cfd6a89ce6f5329fccba2af2f6b4c | 4,176 | [
-1
] |
4,177 | oscap-xccdf.lisp | atgreen_red-light-green-light/parsers/oscap-xccdf.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*-
;;;
;;; Copyright (C) 2019, 2020, 2021, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-parsers)
;;; MVP OpenSCAP XCCDF Results report parser
(defclass parser/oscap-xccdf (report-parser)
()
(:default-initargs
:title "OpenSCAP XCCDF Scan Report"
:doctype "html"))
(defmethod parse-report ((parser parser/oscap-xccdf) doc labels)
(let ((pdoc (plump:parse (flexi-streams:make-flexi-stream
(flexi-streams:make-in-memory-input-stream doc)
:external-format :utf-8)))
(tests-fail (list))
(tests-pass (list)))
(let ((rows (lquery:$ pdoc "#rule-overview > table > tbody > tr")))
(loop for row across rows do
(let ((text (lquery:$ row "td" (text))))
(when (eq (length text) 3)
(let ((id (aref text 0))
(severity (aref text 1))
(result (aref text 2)))
(cond
((string= result "fail")
(setf tests-fail
(cons
(json:decode-json-from-string
(format nil "{ \"report\": \"oscap-xccdf\", \"result\": \"FAIL\", \"id\": \"~A\", \"severity\": \"~A\" ~A}"
id severity (rlgl-util:jsonify-labels labels)))
tests-fail)))
((string= result "pass")
(setf tests-pass
(cons
(json:decode-json-from-string
(format nil "{ \"report\": \"oscap-xccdf\", \"result\": \"PASS\", \"id\": \"~A\", \"severity\": \"~A\" ~A}"
id severity (rlgl-util:jsonify-labels labels)))
tests-pass)))))))))
(append tests-fail tests-pass)))
| 2,188 | Common Lisp | .lisp | 53 | 37.867925 | 111 | 0.660723 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 66a0b907d13dc398f48a24767d37e91067ebdb75f7c37fe59013a287466ed50f | 4,177 | [
-1
] |
4,178 | anchore.lisp | atgreen_red-light-green-light/parsers/anchore.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*-
;;;
;;; Copyright (C) 2019, 2020, 2021, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-parsers)
;;; MVP Anchore Results report parser
;; ----------------------------------------------------------------------------
(defclass parser/anchore (report-parser)
()
(:default-initargs
:title "Anchore Scan Report"
:doctype "text"))
(defmethod parse-report ((parser parser/anchore) doc labels)
(let* ((report (json:decode-json-from-string doc))
(tests-pass (list))
(tests-fail
(let ((vulnerabilities (cdr (assoc :VULNERABILITIES report))))
(mapcar (lambda (v)
(json:decode-json-from-string
(format nil "{ \"report\": \"anchore\", \"result\": \"FAIL\", \"id\": \"~A\", \"package name\": \"~A\", \"severity\": \"~A\", \"url\": \"~A\" ~A}"
(cdr (assoc :VULN v))
(cdr (assoc :PACKAGE--NAME v))
(cdr (assoc :SEVERITY v))
(cdr (assoc :URL v))
(rlgl-util:jsonify-labels labels))))
vulnerabilities))))
(append tests-fail tests-pass)))
| 1,799 | Common Lisp | .lisp | 40 | 41.425 | 149 | 0.63683 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | ffd1259144c314157c40d73cb8ca54d92969781f759773426cb23fd359c1bff0 | 4,178 | [
-1
] |
4,179 | oscap-oval.lisp | atgreen_red-light-green-light/parsers/oscap-oval.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019, 2020, 2021, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-parsers)
;;; MVP OpenScap OVAL Results report parser
;; ----------------------------------------------------------------------------
(defclass parser/oscap-oval (report-parser)
()
(:default-initargs
:title "OpenSCAP OVAL Scan Report"
:doctype "html"))
(defmethod parse-report ((parser parser/oscap-oval) doc labels)
(let ((pdoc (plump:parse (flexi-streams:make-flexi-stream
(flexi-streams:make-in-memory-input-stream doc)
:external-format :utf-8)))
(tests-fail (list))
(tests-pass (list)))
;;; Extract date
;;; (lquery:$ pdoc "body > table.noborder.nomargin > tbody > tr > td:nth-child(2) > table > tbody > tr:nth-child(3) > td:nth-child(4)"
;;; text
(lquery:$ pdoc "tr.resultbadA > td:nth-child(4) > a"
(combine (attr :href) (text))
(map-apply #'(lambda (url text)
(setf tests-fail
(cons
(json:decode-json-from-string
(format nil "{ \"report\": \"oscap-oval\", \"result\": \"FAIL\", \"id\": \"~A\", \"url\": \"~A\" ~A}"
text url (rlgl-util:jsonify-labels labels)))
tests-fail)))))
(lquery:$ pdoc "tr.resultgoodA > td:nth-child(4) > a"
(combine (attr :href) (text))
(map-apply #'(lambda (url text)
(setf tests-pass
(cons
(json:decode-json-from-string
(format nil "{ \"report\": \"oscap-oval\", \"result\": \"PASS\", \"id\": \"~A\", \"url\": \"~A\" ~A}"
text url (rlgl-util:jsonify-labels labels)))
tests-pass)))))
(append tests-fail tests-pass)))
| 2,401 | Common Lisp | .lisp | 53 | 41.037736 | 137 | 0.620999 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 6816ca2835c53137320a98050de0eddbd7579cee55568484f524c2df20e02382 | 4,179 | [
-1
] |
4,180 | clair.lisp | atgreen_red-light-green-light/parsers/clair.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*-
;;;
;;; Copyright (C) 2019, 2020, 2021, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-parsers)
;;; MVP Clair Results report parser
;; ----------------------------------------------------------------------------
(defclass parser/clair (report-parser)
()
(:default-initargs
:title "Clair Scan Report"
:doctype "text"))
(defmethod parse-report ((parser parser/clair) doc labels)
(let* ((report (json:decode-json-from-source (flexi-streams:make-flexi-stream
(flexi-streams:make-in-memory-input-stream doc)
:external-format :utf-8)))
(tests-pass (list))
(tests-fail
(let ((vulnerabilities (cdr (assoc :VULNERABILITIES report))))
(mapcar (lambda (v)
(json:decode-json-from-string
(format nil "{ \"report\": \"clair\", \"result\": \"FAIL\", \"id\": \"~A\", \"url\": \"~A\" ~A}"
(cdr (assoc :VULNERABILITY v))
(cdr (assoc :LINK v))
(rlgl-util:jsonify-labels labels))))
vulnerabilities))))
(append tests-fail tests-pass)))
| 1,801 | Common Lisp | .lisp | 40 | 41.35 | 99 | 0.649003 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 482623fb26b1d69cfcb8a484e534ce2941239462fc065cba149f4987cdca85e5 | 4,180 | [
-1
] |
4,181 | report-parser.lisp | atgreen_red-light-green-light/parsers/report-parser.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019, 2020, 2021 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-parsers)
(defclass report-parser ()
((name :initarg :name :reader name)
(title :initarg :title :reader title)
(doctype :initarg :doctype :reader doctype)
(columns :initarg :columns :reader columns :initform nil)))
| 1,092 | Common Lisp | .lisp | 23 | 45.913043 | 78 | 0.731022 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 1aafe21d07a66e2e77567ab4f877ca93ca131e72935d6ce7432c8e6deb677c4d | 4,181 | [
-1
] |
4,182 | dejagnu.lisp | atgreen_red-light-green-light/parsers/dejagnu.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*-
;;;
;;; Copyright (C) 2019, 2020, 2021, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-parsers)
;;; MVP DejaGnu Results report parser
;; ----------------------------------------------------------------------------
(defclass parser/dejagnu (report-parser)
()
(:default-initargs
:title "DejaGnu Summary Report"
:doctype "text"))
(defmethod parse-report ((parser parser/dejagnu) doc labels)
(let ((tests (list))
(host "UNKNOWN")
(target "UNKNOWN")
(in (flexi-streams:make-flexi-stream
(flexi-streams:make-in-memory-input-stream doc)
:external-format :utf-8)))
(loop for line = (read-line in nil)
while line do
(setf tests
(cond
((str:starts-with? "Native configuration is " line)
(setf host (str:substring 24 nil line))
(setf target (str:substring 24 nil line))
tests)
((str:starts-with? "Host is" line)
(setf host (str:substring 10 nil line))
tests)
((str:starts-with? "Target is" line)
(setf target (str:substring 10 nil line))
tests)
((str:starts-with? "FAIL:" line)
(cons
(json:decode-json-from-string
(let ((s (format nil "{ \"report\": \"dejagnu\", \"result\": \"FAIL\", \"host\": \"~A\", \"target\": \"~A\", \"id\": \"~A\" ~A}"
host target (rlgl-util:escape-json-string
(str:substring 6 nil line))
(rlgl-util:jsonify-labels labels))))
(log:info s)
s))
tests))
((str:starts-with? "XFAIL:" line)
(cons
(json:decode-json-from-string
(let ((s (format nil "{ \"report\": \"dejagnu\", \"result\": \"XFAIL\", \"host\": \"~A\", \"target\": \"~A\", \"id\": \"~A\" ~A}"
host target (rlgl-util:escape-json-string
(str:substring 7 nil line))
(rlgl-util:jsonify-labels labels))))
(log:info s)
s))
tests))
((str:starts-with? "XPASS:" line)
(cons
(json:decode-json-from-string
(let ((s (format nil "{ \"report\": \"dejagnu\", \"result\": \"XPASS\", \"host\": \"~A\", \"target\": \"~A\", \"id\": \"~A\" ~A}"
host target (rlgl-util:escape-json-string
(str:substring 7 nil line))
(rlgl-util:jsonify-labels labels))))
(log:info s)
s))
tests))
(t tests))))
tests))
| 3,392 | Common Lisp | .lisp | 78 | 34 | 152 | 0.538531 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 7cb7ee555a44c360f67c725b56ec7c1dbb52447882196066ca742ac28cbc5412 | 4,182 | [
-1
] |
4,183 | junit.lisp | atgreen_red-light-green-light/parsers/junit.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*-
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-parsers)
;;; MVP JUnit XML parser
;; ----------------------------------------------------------------------------
(defclass parser/junit (report-parser)
()
(:default-initargs
:title "JUnit Test Report"
:doctype "text"))
(defmethod parse-report ((parser parser/junit) doc labels)
(let ((xmls (cxml:parse-octets doc
(cxml-xmls:make-xmls-builder))))
(let ((children (cdr (cdr xmls))))
(remove nil
(mapcar
(lambda (child)
(if (and (listp child)
(string= (car child) "testcase"))
(let ((classname nil)
(result nil))
(dolist (a (car (cdr child)))
(cond
((string= (car a) "classname")
(setf classname (car (cdr a))))
((string= (car a) "name")
(setf result (car (cdr a))))))
(json:decode-json-from-string
(format nil "{ \"report\": \"junit\", \"result\": \"~A\", \"id\": \"~A\" ~A}"
result classname (rlgl-util:jsonify-labels labels))))
nil))
children)))))
| 1,770 | Common Lisp | .lisp | 45 | 35.266667 | 80 | 0.62093 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | aefb7a5d63258345dc3c45afd9efe2c7cea4a7d4bb174f17bceb8ffff79c411d | 4,183 | [
-1
] |
4,184 | popeye.lisp | atgreen_red-light-green-light/parsers/popeye.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*-
;;;
;;; Copyright (C) 2021, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-parsers)
;;; MVP Popeye HTML Results report parser
(defclass parser/popeye (report-parser)
()
(:default-initargs
:title "Popeye Scan Report"
:doctype "html"
:columns '(:RESULT :TYPE :RESOURCE :ID :LEVEL)))
(defmethod parse-report ((parser parser/popeye) doc labels)
(let ((pdoc (plump:parse (flexi-streams:make-flexi-stream
(flexi-streams:make-in-memory-input-stream doc)
:external-format :utf-8)))
(tests-fail (list)))
(let ((sections (lquery:$ pdoc "div.section")))
(loop for section across sections do
(let ((section-title
(car (split-sequence:split-sequence
#\space
(str:trim
(aref (lquery:$ section "div.section-title" (text)) 0))))))
(let ((outcomes (lquery:$ section "ul.outcome > li")))
(loop for outcome across outcomes do
(let ((outcome-name (str:trim (aref (lquery:$ outcome "div.outcome" (text)) 0))))
(let ((issues (lquery:$ outcome "ul.issues > li > span")))
(map nil (lambda (issue)
(let ((level (str:s-last (aref (lquery:$ issue (attr "class")) 0)))
(text (str:trim (aref (lquery:$ issue (text)) 0))))
(when (> (parse-integer level) 0)
(setf tests-fail
(cons
(json:decode-json-from-string
(format nil "{ \"report\": \"popeye\", \"result\": \"FAIL\", \"type\": \"~A\", \"resource\": \"~A\", \"id\": \"~A\", \"level\": ~S ~A}"
section-title
outcome-name
(ppcre:regex-replace-all "\"" text "\\\"" )
level
(rlgl-util:jsonify-labels labels)))
tests-fail)))))
issues))))))))
(reverse tests-fail)))
| 3,027 | Common Lisp | .lisp | 57 | 38.684211 | 176 | 0.521915 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | e32733528d573157ef93e63a555874234abb2856847eeee65e616baa2cebbe99 | 4,184 | [
-1
] |
4,185 | tripwire-pdf.lisp | atgreen_red-light-green-light/parsers/tripwire-pdf.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-PARSERS; Base: 10 -*-
;;;
;;; Copyright (C) 2020, 2021, 2022, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package :rlgl-parsers)
;;; Tripwire Results report parser
;; ----------------------------------------------------------------------------
(defclass parser/tripwire-pdf (report-parser)
()
(:default-initargs
:title "Tripwire Scan Report"
:doctype "pdf"))
(defparameter +newline+ (format nil "~A" #\newline))
(defun find-next (pos str doc)
(let ((p-start (search str doc :start2 pos)))
(when p-start
(let* ((p-start (+ p-start (length str)))
(p-end (search +newline+ doc :start2 p-start)))
(when p-end
(values (subseq doc p-start p-end) p-end))))))
(defun find-prev (pos str doc)
(let ((p-start (search str doc :end2 pos :from-end t)))
(when p-start
(let* ((p-start (+ p-start (length str)))
(p-end (search +newline+ doc :start2 p-start)))
(when p-end
(values (subseq doc p-start p-end) p-end))))))
(defun find-next-test (pos doc)
(multiple-value-bind (test-name pos)
(find-next pos "Test Name: " doc)))
(defun parse-tripwire-text (text labels)
(let ((tests (list))
(position 0))
(multiple-value-bind (policy-name ppos)
(find-next position "Policy Name: " text)
(multiple-value-bind (test-name tpos)
(find-next ppos "Test Name: " text)
(loop
while test-name
do (multiple-value-bind (rule-name rpos)
(find-prev tpos "Rule Name: " text)
(setf tests (cons (json:decode-json-from-string
(format nil "{ \"report\": \"tripwire-pdf\", \"status\": ~S, \"policy\": ~S, \"rule\": ~S, \"id\": ~S ~A}"
(find-next tpos "Status: " text)
(rlgl-util:escape-json-string policy-name)
(rlgl-util:escape-json-string rule-name)
(rlgl-util:escape-json-string test-name)
(rlgl-util:jsonify-labels labels)))
tests))
(multiple-value-bind (next-test-name next-tpos)
(find-next (+ 1 tpos) "Test Name: " text)
(setf test-name next-test-name)
(setf tpos next-tpos))))))
tests))
(defmethod parse-report ((parser parser/tripwire-pdf) doc labels)
(tmpdir:with-tmpdir (tmpdir)
(let* ((base-filename (str:concat tmpdir "/" (generate-random-string)))
(pdf-filename (str:concat base-filename ".pdf"))
(txt-filename (str:concat base-filename ".txt")))
(with-open-file (stream pdf-filename
:direction :output
:if-exists :supersede
:if-does-not-exist :create
:element-type '(unsigned-byte 8))
(write-sequence doc stream))
(inferior-shell:run
(str:concat "pdftotext " pdf-filename " " txt-filename))
(parse-tripwire-text (alexandria:read-file-into-string
txt-filename :external-format :latin-1)
labels))))
| 4,012 | Common Lisp | .lisp | 83 | 37.73494 | 140 | 0.563409 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | dc1df9efb612d67603039035144a5a8cebe4ea560a15b32d4d076453768f011b | 4,185 | [
-1
] |
4,186 | user.lisp | atgreen_red-light-green-light/user/user.lisp | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019, 2020, 2021 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package #:rlgl.user)
(defclass user ()
((id :reader user-id)
(uuid :reader user-uuid)
(api-key :reader user-api-key)
(name :reader user-name)))
(defun make-user (id uuid api-key login)
(let ((u (make-instance 'user)))
(setf (slot-value u 'id) id)
(setf (slot-value u 'uuid) uuid)
(setf (slot-value u 'api-key) api-key)
(setf (slot-value u 'name) login)
u))
(defun find-user-by-keycloak-id-token (db id-json)
(let ((user (rlgl.db:find-user-by-keycloak-id db
(cdr (assoc :SUB id-json))
(cdr (assoc :NAME id-json)))))
user))
| 1,427 | Common Lisp | .lisp | 35 | 38.2 | 78 | 0.691643 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | f4f411be409eb41a425cca17cc8680ed63d312845e0f8f56347f459ca0609514 | 4,186 | [
-1
] |
4,187 | package.lisp | atgreen_red-light-green-light/user/package.lisp | (defpackage #:rlgl.user
(:use #:cl)
(:shadow #:package)
(:export #:make-user #:user-api-key #:user-name #:find-user-by-oidc-id #:find-user-by-keycloak-id-token))
| 168 | Common Lisp | .lisp | 4 | 39.5 | 107 | 0.664634 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 0794672b19d65095be797baa3bc25a1ed89f1c716ef6b54ef9597e6954440e1d | 4,187 | [
-1
] |
4,188 | #user.lisp# | atgreen_red-light-green-light/user/#user.lisp# | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Package: RLGL-SERVER; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019, 2020 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(in-package #:rlgl.user)
(defclass user ()
((id :reader user-id)
(uuid :reader user-uuid)
(api-key :reader user-api-key)
(name :reader user-name)))
(defun make-user (id uuid api-key login)
(let ((u (make-instance 'user)))
(setf (slot-value u 'id) id)
(setf (slot-value u 'uuid) uuid)
(setf (slot-value u 'api-key) api-key)
(setf (slot-value u 'name) login)
u))
(defun find-user-by-keycloak-id-token (db id-json)
(let ((user (rlgl.db:find-user-by-keycloak-id db
(cdr (assoc :SUB id-json))
(cdr (assoc :NAME id-json)))))
user))
| 1,421 | Common Lisp | .lisp | 35 | 38.028571 | 75 | 0.691751 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 2939e9e006f0cc3dd0cf312c84941ea266407c668c68ddecb3bab0c144a8c6f3 | 4,188 | [
-1
] |
4,189 | test-rlgl-server.asd | atgreen_red-light-green-light/test-rlgl-server.asd | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*-
;;;
;;; Copyright (C) 2018, 2019 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(asdf:defsystem #:test-rlgl-server
:description "Test the Red Light Green Light server."
:depends-on (:rlgl-server :prove :drakma)
:components
((:module "test"
:serial t
:components
((:file "test")))))
(defmethod perform ((o test-op) (c (eql (find-system :test-rlgl-server))))
(funcall (intern (string '#:run) '#:test-rlgl-server)))
(defmethod operation-done-p ((o test-op) (c (eql (find-system :test-rlgl-server))))
nil)
| 1,286 | Common Lisp | .asd | 29 | 41.551724 | 83 | 0.69697 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | e7f753527f9be6fdb834380e5fa8e0e652001094f626a5f5ff271df25905006b | 4,189 | [
-1
] |
4,190 | rlgl-server.asd | atgreen_red-light-green-light/rlgl-server.asd | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*-
;;;
;;; Copyright (C) 2018-2022, 2024 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(asdf:defsystem #:rlgl-server
:description "The Red Light Green Light server."
:author "Anthony Green <[email protected]>"
:version "8"
:serial t
:components ((:file "package")
(:file "api-key")
(:file "matcher")
(:file "policy")
(:file "storage-local")
(:file "storage-s3")
(:file "rlgl-server"))
:depends-on (:rlgl-parsers :rlgl-util :rlgl-db :rlgl-user
:metabang-bind :markup :cl-template
:cl-toml :snooze :cl-json :plump :lquery :ironclad
:inferior-shell :hunchentoot :spinneret
:cl-json-util :cl-fad :str :log4cl :cl-ppcre
:cxml :cl-dbi :cl-date-time-parser :quri
:local-time :cl-csv :prometheus :cl-postgres
:dbd-sqlite3 :dbd-postgres :zs3 :simple-date-time
:drakma :uuid :cl-base32 :legit
:split-sequence :thread-pool
:prometheus.formats.text
:prometheus.exposers.hunchentoot
:prometheus.collectors.sbcl
:prometheus.collectors.process))
| 1,962 | Common Lisp | .asd | 43 | 37.697674 | 71 | 0.631908 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 8acec6f5cfa1efef25dbc5e8541405b5afec9744001d595b542601cff95dc139 | 4,190 | [
-1
] |
4,191 | rlgl-db.asd | atgreen_red-light-green-light/db/rlgl-db.asd | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*-
;;;
;;; Copyright (C) 2021, 2022, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(asdf:defsystem #:rlgl-db
:description "Database functions"
:author "Anthony Green <[email protected]>"
:version "0"
:serial t
:components ((:file "package")
(:file "db")
(:file "db-postgresql")
(:file "db-sqlite"))
:depends-on (:cl-dbi :local-time :log4cl :fset :str :sb-bsd-sockets))
| 1,165 | Common Lisp | .asd | 27 | 40 | 72 | 0.692172 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | de72eed1673db02b555e5ded2f359107013fa1cff26d0ea9f787507169491fe4 | 4,191 | [
-1
] |
4,192 | cl-json-util.asd | atgreen_red-light-green-light/local-projects/cl-json-util/cl-json-util.asd | (asdf:defsystem :cl-json-util
:version "0.0.1"
:description "JSON utilities for Common Lisp"
:author "Muyinliu Xing <[email protected]>"
:depends-on (:jsown)
:components ((:static-file "cl-json-util.asd")
(:file "cl-json-util")))
| 256 | Common Lisp | .asd | 7 | 32 | 48 | 0.662651 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | e942e782239e5cbff4a7303e00cc8480997b8e6451267e4d86268049e0706193 | 4,192 | [
-1
] |
4,193 | rlgl-parsers.asd | atgreen_red-light-green-light/parsers/rlgl-parsers.asd | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*-
;;;
;;; Copyright (C) 2021, 2022, 2023 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(asdf:defsystem #:rlgl-parsers
:description "Parsers for rlgl"
:author "Anthony Green <[email protected]>"
:version "0"
:serial t
:components ((:file "package")
(:file "report-parser")
(:file "anchore")
(:file "aqua")
(:file "clair")
(:file "csv")
(:file "dejagnu")
(:file "junit")
(:file "oscap-oval")
(:file "oscap-xccdf")
(:file "popeye")
(:file "tripwire-pdf"))
:depends-on (:cl-json :plump :lquery :flexi-streams :tmpdir :log4cl
:str :cxml :quri :cl-csv :rlgl-util :inferior-shell))
| 1,502 | Common Lisp | .asd | 36 | 35.361111 | 72 | 0.625939 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 1a5de1fba05a16d73b0e516cb69b9f73db018c7ab95e141db5d7a8a8ca35e218 | 4,193 | [
-1
] |
4,194 | rlgl-user.asd | atgreen_red-light-green-light/user/rlgl-user.asd | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*-
;;;
;;; Copyright (C) 2021 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(asdf:defsystem #:rlgl-user
:description "User functions"
:author "Anthony Green <[email protected]>"
:version "0"
:serial t
:components ((:file "package")
(:file "user"))
:depends-on (:rlgl-db))
| 1,033 | Common Lisp | .asd | 25 | 39.2 | 70 | 0.713009 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | c66eccc416e9f762ef9e0d3a23d0c19409eb3f2f2877d081bc817a11c80736eb | 4,194 | [
-1
] |
4,195 | rlgl-util.asd | atgreen_red-light-green-light/util/rlgl-util.asd | ;;; -*- Mode: LISP; Syntax: COMMON-LISP; Base: 10 -*-
;;;
;;; Copyright (C) 2021 Anthony Green <[email protected]>
;;;
;;; This program is free software: you can redistribute it and/or
;;; modify it under the terms of the GNU Affero General Public License
;;; as published by the Free Software Foundation, either version 3 of
;;; the License, or (at your option) any later version.
;;;
;;; This program is distributed in the hope that it will be useful,
;;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
;;; Affero General Public License for more details.
;;;
;;; You should have received a copy of the GNU Affero General Public
;;; License along with this program. If not, see
;;; <http://www.gnu.org/licenses/>.
(asdf:defsystem #:rlgl-util
:description "Utility functions"
:author "Anthony Green <[email protected]>"
:version "0"
:serial t
:components ((:file "util"))
:depends-on (:cl-fad :str :quri))
| 1,013 | Common Lisp | .asd | 24 | 40.666667 | 70 | 0.724696 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 8a72af91b40e105e72cbb6f72ced09975a4c90bbcc61fc844ad408a72e174600 | 4,195 | [
-1
] |
4,196 | verify.sh.clt | atgreen_red-light-green-light/verify.sh.clt | #!/bin/sh
set -x
# Red Light Green Light validate.sh version <%= @ rlgl-version %>
# This validate feature is provided in source form for transparency
# and audit purposes.
# This script performs three important validations:
#
# - validate the server signature of the report using the server's
# public key
#
# - validate the client signature of the report using the client's
# public key
#
# - validate the transparency log entry for this report using
# rekor-cli
# ---- Identify the document for which we are performing validation -----------
DOC=<%= @ id %>
# ---- Error handling ---------------------------------------------------------
set -e
error_exit()
{
echo ERROR: ${1:-"Unknown Error"} 1>&2
exit 1
}
# ---- Verify that all required programs are installed ------------------------
awk --help > /dev/null 2>&1 || error_exit "Cannot run awk. Please install it."
for PROGRAM in "rekor-cli version" "openssl version" "curl --help" "grep --help" "base64 --help"; do
$PROGRAM > /dev/null 2>&1 || error_exit "Cannot run $(echo ${PROGRAM} | awk '{ printf $1 }'). Please install it."
done
# ---- Create names of temporary files and ensure deletion on exit ------------
TMPDIR="$(mktemp -d)"
trap 'rm -rf -- "$TMPDIR"' EXIT
DOCUMENT=${TMPDIR}/${DOC}
DIGEST=${TMPDIR}/${DOC}.digest
SERVER_PUBKEY=${TMPDIR}/rlgl.pem
SERVER_SIGNATURE=${TMPDIR}/${DOC}.digest.sig
CLIENT_SIGNATURE=${TMPDIR}/${DOC}.digest.csig
# ---- Download all artifacts -------------------------------------------------
curl -s <%= @ server-uri %>/pubkey > ${SERVER_PUBKEY}
curl -s <%= @ server-uri %>/doc?id=${DOC} > ${DOCUMENT}
cat ${DOCUMENT} | openssl dgst -sha3-256 - | awk '{ printf $2 }' > ${DIGEST}
curl -s <%= @ server-uri %>/doc?id=${DOC}.sig | base64 -d > ${SERVER_SIGNATURE}
curl -s <%= @ server-uri %>/doc?id=${DOC}.csig | base64 -d > ${CLIENT_SIGNATURE}
# ---- Validate the server signature of the document digest -------------------
echo Checking document server signature: $(openssl dgst -sha256 -verify ${SERVER_PUBKEY} -signature ${SERVER_SIGNATURE} ${DIGEST})
# ---- Checking client signature ----------------------------------------------
if [ -z "$RLGL_CLIENT_PUBKEY" ]; then
echo "Checking document client signature : Set the environment RLGL_CLIENT_PUBKEY to point at your public key"
else
echo "Checking document client signature :" $(cat ${DOCUMENT} | openssl dgst -sha3-256 -verify ${RLGL_CLIENT_PUBKEY} -signature ${CLIENT_SIGNATURE})
fi
# ---- Look up this document in rekor and print out the record ----------------
echo DEBUG
echo == DIGEST ====================================
cat ${DIGEST}
echo == SERVER_SIGNATURE ==========================
cat ${SERVER_SIGNATURE}
echo == SERVER_PUBKEY =============================
cat ${SERVER_PUBKEY}
echo ==============================================
# ---- Look up this document in rekor and print out the record ----------------
echo Searching for sigstore record:
HASH=$(rekor-cli verify --artifact ${DIGEST} --signature ${SERVER_SIGNATURE} --public-key ${SERVER_PUBKEY} --pki-format x509 | grep "Entry Hash:" | awk '{ printf $3 }')
rekor-cli get --uuid $HASH
| 3,142 | Common Lisp | .cl | 64 | 47.5625 | 168 | 0.613251 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | c6c2ca0da4454487b39ad0c91e819abb6b2de108f0f48793de9a8383f6423647 | 4,196 | [
-1
] |
4,202 | Makefile | atgreen_red-light-green-light/Makefile | all:
binary:
buildapp --output rlgl-server \
--asdf-tree `pwd`/.. \
--asdf-tree `pwd`/local-projects/postmodern-20220220-git \
--asdf-tree `pwd`/local-projects/cl-json-util \
--asdf-tree `pwd`/local-projects/snooze-20210518-git \
--asdf-tree `pwd`/parsers \
--asdf-tree `pwd`/db \
--asdf-tree `pwd`/user \
--asdf-tree `pwd`/util \
--asdf-tree ~/quicklisp/dists/quicklisp/software \
--load-system rlgl-server \
--compress-core \
--entry "rlgl-server:start-rlgl-server"
check: clean
openssl genrsa -out /tmp/rlgl-test-key.pem 1024
openssl rsa -in /tmp/rlgl-test-key.pem -out /tmp/rlgl-public-test-key.pem -outform PEM -pubout
PRIVATE_KEY_FILE=/tmp/rlgl-test-key.pem \
PUBLIC_KEY_FILE=/tmp/rlgl-public-test-key.pem \
sbcl --dynamic-space-size 4096 \
--disable-debugger \
--eval '(ql:quickload :prove)' \
--eval '(pushnew (truename ".") asdf:*central-registry* )' \
--eval '(pushnew (truename "./user") asdf:*central-registry* )' \
--eval '(pushnew (truename "./util") asdf:*central-registry* )' \
--eval '(pushnew (truename "./db") asdf:*central-registry* )' \
--eval '(pushnew (truename "./parsers") asdf:*central-registry* )' \
--eval '(pushnew (truename "./test/") asdf:*central-registry* )' \
--eval '(ql:register-local-projects)' \
--eval '(ql:quickload :rlgl-server)' \
--eval "(asdf:oos 'asdf:load-op :rlgl-server :force t)" \
--eval '(ql:quickload :test-rlgl-server)' \
--eval '(test-rlgl-server:run)' \
--eval '(sb-ext:quit)'
run: clean
openssl genrsa -out /tmp/rlgl-test-key.pem 1024
PRIVATE_KEY_FILE=/tmp/rlgl-test-key.pem \
sbcl --dynamic-space-size 4096 \
--eval '(pushnew (truename ".") asdf:*central-registry* )' \
--eval '(pushnew (truename "./local-projects/cl-json-util") asdf:*central-registry* )' \
--eval '(pushnew (truename "./user") asdf:*central-registry* )' \
--eval '(pushnew (truename "./util") asdf:*central-registry* )' \
--eval '(pushnew (truename "./db") asdf:*central-registry* )' \
--eval '(pushnew (truename "./parsers") asdf:*central-registry* )' \
--eval '(pushnew (truename "./test/") asdf:*central-registry* )' \
--eval '(asdf:load-system :rlgl-server)' \
--eval '(rlgl-server:start-rlgl-server t "test/config.ini")'
cover: clean
sbcl --disable-debugger \
--eval '(require :sb-cover)' \
--eval '(ql:quickload :prove)' \
--eval '(declaim (optimize sb-cover:store-coverage-data))' \
--eval '(pushnew (truename ".") asdf:*central-registry* )' \
--eval '(ql:register-local-projects)' \
--eval '(ql:quickload :rlgl-server)' \
--eval "(asdf:oos 'asdf:load-op :rlgl-server :force t)" \
--eval '(prove:run #P"test.lisp")' \
--eval '(sb-cover:report "./coverage/")' \
--eval '(sb-ext:quit)'
coveralls: clean
COVERALLS=true sbcl --disable-debugger \
--eval '(ql:quickload :cl-coveralls)' \
--eval '(pushnew (truename ".") asdf:*central-registry* )' \
--eval '(pushnew (truename "./test/") asdf:*central-registry*)' \
--eval '(ql:register-local-projects)' \
--eval '(ql:quickload :test-rlgl-server)' \
--eval '(coveralls:with-coveralls (:project-dir (directory-namestring (truename "."))) (test-rlgl-server:run))' \
--eval '(sb-ext:quit)'
clean:
@rm -rf system-index.txt test/system-index.txt coverage/* test-policy rlgl-server *~ */*~
| 3,428 | Common Lisp | .l | 71 | 43.507042 | 115 | 0.63205 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | c9834a4df4cc58d0d0e6cec3c5a30505e5b47713654f80a1213eca105ed4e631 | 4,202 | [
-1
] |
4,203 | Dockerfile.base | atgreen_red-light-green-light/Dockerfile.base | FROM quay.io/containerlisp/lisp-10-ubi8:latest
COPY rlgl-server.asd /tmp
RUN sbcl --eval '(let* ((ds (with-open-file (stream "/tmp/rlgl-server.asd") \
(read stream))) \
(pos (position :DEPENDS-ON ds))) \
(dolist (p (nth (+ pos 1) ds)) \
(ql:quickload p)))'
| 468 | Common Lisp | .l | 7 | 52.142857 | 87 | 0.368192 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 3d5976a6c92b3f0b27260a6242bddcda5357933c61f499f2b7e099a524fe75a6 | 4,203 | [
-1
] |
4,205 | browserconfig.xml | atgreen_red-light-green-light/browserconfig.xml | <?xml version="1.0" encoding="utf-8"?>
<browserconfig>
<msapplication>
<tile>
<square150x150logo src="/images/mstile-150x150.png"/>
<TileColor>#da532c</TileColor>
</tile>
</msapplication>
</browserconfig>
| 253 | Common Lisp | .l | 9 | 21.777778 | 65 | 0.614754 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 359223cd55ef292c6eeb0768500791673cc532fd36bbe9b4184557fc1f69e8dd | 4,205 | [
-1
] |
4,207 | slynk-port-forward | atgreen_red-light-green-light/slynk-port-forward | #!/bin/sh
# Forward ports from the rlgl-server to localhost for development
# purposes.
# Port 8080 is the HTTP port for rlgl-server
# Port 4005 is the slynk port for connecting with the emacs sly client
if [ "$#" -ne 1 ]; then
echo "Usage: slynk-port-forward NAMESPACE"
exit 1
fi
NAMESPACE=$1
# trap ctrl-c and call ctrl_c()
trap ctrl_c INT
function ctrl_c() {
kill -9 ${P1}
kill -9 ${P2}
}
PODNAME=$(kubectl get pods -n ${NAMESPACE} --template '{{range .items}}{{.metadata.name}}{{"\n"}}{{end}}' | grep rlgl-server)
kubectl port-forward ${PODNAME} 8080 -n ${NAMESPACE} &
P1=$?
kubectl port-forward ${PODNAME} 4005 -n ${NAMESPACE} &
P2=$?
while true; do sleep 10000; done;
| 697 | Common Lisp | .l | 22 | 29.636364 | 125 | 0.693114 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 8ca43a0992438be06a841bc78cfc6f0f4e36759f23f84f62c1c5a67c6b30a55d | 4,207 | [
-1
] |
4,208 | Dockerfile | atgreen_red-light-green-light/Dockerfile | FROM registry.access.redhat.com/ubi9/ubi
MAINTAINER Anthony Green <[email protected]>
ENV LC_ALL=C.utf8 \
LANG=C.utf8 \
LANGUAGE=C.utf8 \
SBCL_VERSION=2.3.10 \
GREEN_ORB_VERSION=0.2.4 \
PATH=/opt/rlgl/.local/bin:$PATH \
HOME=/opt/rlgl
RUN dnf -y install bzip2 git make gcc file poppler-utils gpg
RUN curl -L -O "https://downloads.sourceforge.net/project/sbcl/sbcl/${SBCL_VERSION}/sbcl-${SBCL_VERSION}-x86-64-linux-binary.tar.bz2" \
&& tar -xf sbcl-${SBCL_VERSION}-x86-64-linux-binary.tar.bz2 \
&& cd sbcl-${SBCL_VERSION}-x86-64-linux \
&& ./install.sh --prefix=/usr/local \
&& cd .. \
&& rm -rf sbcl-${SBCL_VERSION}-x86-64-linux-binary.tar.bz2 sbcl-${SBCL_VERSION}-x86-64-linux
RUN useradd -r -u 1000 -m -d /opt/rlgl -s /bin/bash rlgl
WORKDIR /opt/rlgl
COPY . .
RUN chown -R rlgl /opt/rlgl
RUN mkdir -p /var/rlgl/docs /var/rlgl/policy && chown -R 1000:0 /var/rlgl && chmod -R go+rwx /var/rlgl
USER 1000
RUN curl -L -O "https://github.com/atgreen/green-orb/releases/download/v${GREEN_ORB_VERSION}/green-orb-${GREEN_ORB_VERSION}-linux-amd64.tar.gz" \
&& tar xf green-orb-${GREEN_ORB_VERSION}-linux-amd64.tar.gz \
&& rm green-orb-${GREEN_ORB_VERSION}-linux-amd64.tar.gz \
&& echo "# config file here" > green-orb.yaml
RUN git clone --depth=1 https://github.com/ocicl/ocicl.git; cd ocicl; make; make install; ocicl version; ocicl setup > ~/.sbclrc \
&& echo "(asdf:initialize-source-registry '(:source-registry :ignore-inherited-configuration (:tree #P\"/opt/rlgl/\")))" >> ~/.sbclrc \
&& echo "(setf ocicl-runtime:*verbose* t)" >> ~/.sbclrc \
&& echo "(setf ocicl-runtime:*download* t)" >> ~/.sbclrc \
&& cd .. && rm -rf ocicl
RUN ocicl install && ./orb sbcl --non-interactive --eval "(progn (asdf:load-system :rlgl-server) (quit))"
RUN chmod -R go+rwx /opt/rlgl
CMD git config --global --add safe.directory /opt/rlgl && ./orb sbcl --userinit /opt/rlgl/.sbclrc --eval '(asdf:load-system :rlgl-server)' --eval '(progn (rlgl-server:start-rlgl-server) (loop do (sleep 1000)))'
| 2,059 | Common Lisp | .l | 34 | 57.088235 | 210 | 0.677099 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 1bb8fe8250dcd0ab4ee389ac6541e15ee0ce9e6ea0e32be8b8eecbb890d02b09 | 4,208 | [
-1
] |
4,212 | sample-junit.xml | atgreen_red-light-green-light/test/sample-junit.xml | <?xml version="1.0" encoding="UTF-8" ?>
<testsuite errors="1" failures="1" hostname="mahmood-alis-macbook-pro.local"
name="tests.ATest" tests="3" time="0.069" timestamp="2009-12-19T17:58:59">
<properties>
<property name="java.vendor" value="Sun Microsystems Inc." />
<property name="jtreg.home" value="/Users/mahmood/research/jtreg" />
<property name="sun.java.launcher" value="SUN_STANDARD" />
<property name="sun.management.compiler" value="HotSpot 64-Bit Server Compiler" />
<property name="os.name" value="Darwin" />
<property name="sun.boot.class.path" value="../../jsr308-langtools/dist/lib/javac.jar:../jsr308-langtools/dist/lib/javac.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/resources.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/rt.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/sunrsasign.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/jsse.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/jce.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/charsets.jar:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/classes" />
<property name="java.vm.specification.vendor" value="Sun Microsystems Inc." />
<property name="ant.home" value="/usr/share/ant" />
<property name="bindist.file" value="binary/jsr308-all.jar" />
<property name="java.runtime.version" value="1.6.0_03-p3-landonf_19_aug_2008_15_52-b00" />
<property name="user.name" value="mahmood" />
<property name="user.language" value="en" />
<property name="build" value="build" />
<property name="sun.boot.library.path" value="/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/amd64" />
<property name="ant.project.name" value="checkers" />
<property name="java.version" value="1.6.0_03-p3" />
<property name="build.tests" value="tests/build" />
<property name="user.timezone" value="" />
<property name="sun.arch.data.model" value="64" />
<property name="java.endorsed.dirs" value="/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/endorsed" />
<property name="sun.cpu.isalist" value="" />
<property name="sun.jnu.encoding" value="UTF-8" />
<property name="file.encoding.pkg" value="sun.io" />
<property name="file.separator" value="/" />
<property name="java.specification.name" value="Java Platform API Specification" />
<property name="src.tests" value="/Users/mahmood/research/checker-framework/checkers/tests/src/tests/ATest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/AnnotationBuilderTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/BasicEncryptedTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/BasicSuperSubTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/CheckerParameterized.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/CheckerTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/FailingTests.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/FlowTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/FrameworkTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/I18nTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/IGJTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/InterningTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/JavariTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/LockTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/NullnessTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/OIGJTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/ParameterizedCheckerTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/RegexTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/TaintingTest.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/TestInput.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/TestRun.java /Users/mahmood/research/checker-framework/checkers/tests/src/tests/TestUtilities.java" />
<property name="java.class.version" value="50.0" />
<property name="src" value="src" />
<property name="user.country" value="US" />
<property name="java.home" value="/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre" />
<property name="java.vm.info" value="mixed mode" />
<property name="ant.file" value="/Users/mahmood/research/checker-framework/checkers/build.xml" />
<property name="os.version" value="10.2.0" />
<property name="temp.dir" value="binary/buildbin" />
<property name="path.separator" value=":" />
<property name="java.vm.version" value="1.6.0_03-p3-landonf_19_aug_2008_15_52-b00" />
<property name="checkers.rel.jp" value="../checkers" />
<property name="ant.library.dir" value="/usr/share/ant/lib" />
<property name="dist.doc" value="doc" />
<property name="java.awt.printerjob" value="sun.print.PSPrinterJob" />
<property name="halt.on.test.failure" value="true" />
<property name="sun.io.unicode.encoding" value="UnicodeBig" />
<property name="compiler.exists" value="true" />
<property name="user.home" value="/Users/mahmood" />
<property name="java.specification.vendor" value="Sun Microsystems Inc." />
<property name="src.files.spaceseparated" value="/Users/mahmood/research/checker-framework/checkers/src/checkers/basetype/BaseTypeChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/basetype/BaseTypeVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/basetype/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/basic/BasicChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/flow/Flow.java /Users/mahmood/research/checker-framework/checkers/src/checkers/flow/GenKillBits.java /Users/mahmood/research/checker-framework/checkers/src/checkers/flow/Location.java /Users/mahmood/research/checker-framework/checkers/src/checkers/flow/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/I18nChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/KeyLookupAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/KeyLookupChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/SubI18Checker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/quals/LocalizableKey.java /Users/mahmood/research/checker-framework/checkers/src/checkers/i18n/quals/Localized.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/IGJAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/IGJBottom.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/IGJChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/IGJVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/Assignable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/AssignsFields.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/I.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/Immutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/Mutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/ReadOnly.java /Users/mahmood/research/checker-framework/checkers/src/checkers/igj/quals/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/InterningAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/InterningChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/InterningVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/quals/Interned.java /Users/mahmood/research/checker-framework/checkers/src/checkers/interning/quals/PolyInterned.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/JavariAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/JavariChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/JavariVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/Assignable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/Mutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/PolyRead.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/QReadOnly.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/ReadOnly.java /Users/mahmood/research/checker-framework/checkers/src/checkers/javari/quals/ThisMutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/LinearAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/LinearChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/LinearVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/quals/Linear.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/quals/Normal.java /Users/mahmood/research/checker-framework/checkers/src/checkers/linear/quals/Unusable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/lock/LockAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/lock/LockChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/lock/LockVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/lock/quals/GuardedBy.java /Users/mahmood/research/checker-framework/checkers/src/checkers/lock/quals/Holding.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/CollectionToArrayHeuristics.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/MapGetHeuristics.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessFlow.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessSubchecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/NullnessVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/RawnessSubchecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/AssertNonNull.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/AssertNonNullIfTrue.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/LazyNonNull.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/NonNull.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/NonNullVariable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/NonRaw.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/Nullable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/PolyNull.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/PolyRaw.java /Users/mahmood/research/checker-framework/checkers/src/checkers/nullness/quals/Raw.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/ImmutabilityAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/ImmutabilitySubchecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/ImmutabilityVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/OIGJChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/OIGJMutabilityBottom.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/OwnershipAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/OwnershipSubchecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/OwnershipVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/Assignable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/AssignsFields.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/Dominator.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/I.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/Immutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/Modifier.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/Mutable.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/O.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/ReadOnly.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/WildCard.java /Users/mahmood/research/checker-framework/checkers/src/checkers/oigj/quals/World.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/DefaultLocation.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/DefaultQualifier.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/DefaultQualifierInHierarchy.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/DefaultQualifiers.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/Dependent.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/ImplicitFor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/PolymorphicQualifier.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/SubtypeOf.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/TypeQualifier.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/TypeQualifiers.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/Unqualified.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/Unused.java /Users/mahmood/research/checker-framework/checkers/src/checkers/quals/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/regex/RegexAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/regex/RegexChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/regex/quals/Regex.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/Result.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/SourceChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/SourceVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/SupportedLintOptions.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/SuppressWarningsKey.java /Users/mahmood/research/checker-framework/checkers/src/checkers/source/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/tainting/TaintingAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/tainting/TaintingChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/tainting/quals/PolyTainted.java /Users/mahmood/research/checker-framework/checkers/src/checkers/tainting/quals/Tainted.java /Users/mahmood/research/checker-framework/checkers/src/checkers/tainting/quals/Untainted.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/AnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/AnnotatedTypeMirror.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/AnnotatedTypes.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/BasicAnnotatedTypeFactory.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/QualifierHierarchy.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/TreeAnnotator.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/TypeAnnotator.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/TypeFromElement.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/TypeFromTree.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/TypeHierarchy.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/VisitorState.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/package-info.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/visitors/AnnotatedTypeComparer.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/visitors/AnnotatedTypeScanner.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/visitors/AnnotatedTypeVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/visitors/SimpleAnnotatedTypeScanner.java /Users/mahmood/research/checker-framework/checkers/src/checkers/types/visitors/SimpleAnnotatedTypeVisitor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/AggregateChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/AnnotationUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/DependentTypes.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/ElementUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/GraphQualifierHierarchy.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/Heuristics.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/InternalUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/QualifierDefaults.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/QualifierPolymorphism.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/TreeUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/TypesUtils.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/count/AnnotationsCounter.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/count/Locations.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/debug/EmptyProcessor.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/debug/SignaturePrinter.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/debug/TreeDebug.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/stub/Skeleton.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/stub/StubGenerator.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/stub/StubParser.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/stub/StubUtil.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/Critical.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/Encrypted.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/FactoryTestChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/FlowTestChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/Odd.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/PolyEncrypted.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/SubQual.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/SuperQual.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/TestChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/TypeOutputtingChecker.java /Users/mahmood/research/checker-framework/checkers/src/checkers/util/test/package-info.java /Users/mahmood/research/checker-framework/checkers/src/edu/umd/cs/findbugs/annotations/CheckForNull.java /Users/mahmood/research/checker-framework/checkers/src/edu/umd/cs/findbugs/annotations/NonNull.java /Users/mahmood/research/checker-framework/checkers/src/edu/umd/cs/findbugs/annotations/Nullable.java /Users/mahmood/research/checker-framework/checkers/src/edu/umd/cs/findbugs/annotations/UnknownNullness.java /Users/mahmood/research/checker-framework/checkers/src/javax/annotation/CheckForNull.java /Users/mahmood/research/checker-framework/checkers/src/javax/annotation/Nonnull.java /Users/mahmood/research/checker-framework/checkers/src/javax/annotation/Nullable.java /Users/mahmood/research/checker-framework/checkers/src/net/jcip/annotations/GuardedBy.java /Users/mahmood/research/checker-framework/checkers/src/net/jcip/annotations/Immutable.java /Users/mahmood/research/checker-framework/checkers/src/net/jcip/annotations/NotThreadSafe.java /Users/mahmood/research/checker-framework/checkers/src/net/jcip/annotations/ThreadSafe.java /Users/mahmood/research/checker-framework/checkers/src/org/jetbrains/annotations/NotNull.java /Users/mahmood/research/checker-framework/checkers/src/org/jetbrains/annotations/Nullable.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/CheckForNull.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/NonNull.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/NullAllowed.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/NullUnknown.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/SuppressWarnings.java /Users/mahmood/research/checker-framework/checkers/src/org/netbeans/api/annotations/common/package-info.java" />
<property name="java.library.path" value="/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/amd64/server:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/amd64:/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/../lib/amd64:/usr/java/packages/lib/amd64:/lib:/usr/lib" />
<property name="java.vendor.url" value="http://java.sun.com/" />
<property name="javaparser.lib.uptodate" value="true" />
<property name="build.reports" value="build/reports" />
<property name="java.vm.vendor" value="Sun Microsystems Inc." />
<property name="javac.lib" value="../../jsr308-langtools/dist/lib/javac.jar" />
<property name="run.tests.should.fork" value="true" />
<property name="java.runtime.name" value="Java(TM) SE Runtime Environment" />
<property name="java.class.path" value="/Users/mahmood/research/jsr308-langtools/dist/lib/javac.jar:/Users/mahmood/research/checker-framework/jsr308-langtools/dist/lib/javac.jar:/Users/mahmood/research/checker-framework/checkers/tests/build:/Users/mahmood/research/checker-framework/checkers/tests/junit-4.7.jar:/Users/mahmood/research/checker-framework/checkers/build:/usr/share/java/ant-1.7.1/lib/ant-launcher.jar:/usr/share/ant/lib/ant.jar:/usr/share/ant/lib/ant-junit.jar" />
<property name="jsr308.langtools" value="../../jsr308-langtools" />
<property name="ant.version" value="Apache Ant version 1.7.1 compiled on September 22 2009" />
<property name="annotation-utils.lib" value="../annotation-file-utilities/annotation-file-utilities.jar:lib/asmx.jar" />
<property name="src.astub.files.uptodate" value="true" />
<property name="compiler.version" value="javac 1.7.0-jsr308-1.0.2" />
<property name="checkers.jar.file" value="checkers.jar" />
<property name="build.jtreg.dir" value="build/jtreg" />
<property name="java.vm.specification.name" value="Java Virtual Machine Specification" />
<property name="tmpdir" value="/var/tmp//mahmood/checkers" />
<property name="java.vm.specification.version" value="1.0" />
<property name="sun.cpu.endian" value="little" />
<property name="sun.os.patch.level" value="unknown" />
<property name="build.version" value="1.0.3" />
<property name="tests" value="tests" />
<property name="java.io.tmpdir" value="/var/tmp/" />
<property name="javaparser.lib" value="lib/javaparser.jar" />
<property name="java.vendor.url.bug" value="http://java.sun.com/cgi-bin/bugreport.cgi" />
<property name="javaparser.loc" value="../javaparser" />
<property name="compiler.version.goal" value="javac 1.7.0-jsr308-1.0.3" />
<property name="jp.project" value="true" />
<property name="os.arch" value="amd64" />
<property name="java.awt.graphicsenv" value="sun.awt.X11GraphicsEnvironment" />
<property name="ant.file.checkers" value="/Users/mahmood/research/checker-framework/checkers/build.xml" />
<property name="java.ext.dirs" value="/System/Library/Frameworks/JavaVM.framework/Versions/soylatte16-amd64-1.0.3/jre/lib/ext:/usr/java/packages/lib/ext" />
<property name="javadoc.lib" value="../../jsr308-langtools/dist/lib/javadoc.jar:../../jsr308-langtools/dist/lib/doclets.jar" />
<property name="user.dir" value="/Users/mahmood/research/checker-framework/checkers" />
<property name="checkers.lib" value="checkers.jar" />
<property name="line.separator" value="
" />
<property name="compiler.lib" value="../../jsr308-langtools/dist/lib/javac.jar:../jsr308-langtools/dist/lib/javac.jar" />
<property name="java.vm.name" value="Java HotSpot(TM) 64-Bit Server VM" />
<property name="basedir" value="/Users/mahmood/research/checker-framework/checkers" />
<property name="tests.junit" value="tests/junit-4.7.jar" />
<property name="javari.jdk.build" value="jdk/javari/build" />
<property name="ant.java.version" value="1.6" />
<property name="ant.core.lib" value="/usr/share/ant/lib/ant.jar" />
<property name="file.encoding" value="UTF-8" />
<property name="dist.annos.file" value="checkers-quals.jar" />
<property name="javari.jdk.src" value="jdk/javari/src" />
<property name="java.specification.version" value="1.6" />
</properties>
<testcase classname="tests.ATest" name="error" time="0.0060">
<error type="java.lang.RuntimeException">java.lang.RuntimeException
at tests.ATest.error(ATest.java:11)
</error>
</testcase>
<testcase classname="tests.ATest" name="fail" time="0.0020">
<failure type="junit.framework.AssertionFailedError">junit.framework.AssertionFailedError:
at tests.ATest.fail(ATest.java:9)
</failure>
</testcase>
<testcase classname="tests.ATest" name="sucess" time="0.0" />
<system-out><![CDATA[here
]]></system-out>
<system-err><![CDATA[]]></system-err>
</testsuite>
| 28,067 | Common Lisp | .l | 115 | 239.504348 | 17,423 | 0.817473 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 36b5074da1cc6d92d41b975a2d8f3f2571168d2476896d06d4460710b80df6b0 | 4,212 | [
-1
] |
4,213 | clair-report.json | atgreen_red-light-green-light/test/clair-report.json | { "image": "containerlisp/lisp-10-centos7", "unapproved": [ "RHSA-2019:1619", "RHSA-2018:0180", "RHSA-2017:0372", "RHSA-2018:0502", "RHSA-2018:0654", "RHSA-2018:1374", "RHSA-2018:2772", "RHSA-2018:1967" ], "vulnerabilities": [ { "featurename": "vim-minimal", "featureversion": "2:7.4.160-5.el7", "vulnerability": "RHSA-2019:1619", "namespace": "centos:7", "description": "Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim/neovim: ':source!' command allows arbitrary command execution via modelines (CVE-2019-12735) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "link": "https://access.redhat.com/errata/RHSA-2019:1619", "severity": "High", "fixedby": "2:7.4.160-6.el7_6" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:0180", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * A flaw was found in the patches used to fix the 'dirtycow' vulnerability (CVE-2016-5195). An attacker, able to run local code, can exploit a race condition in transparent huge pages to modify usually read-only huge pages. (CVE-2017-1000405) Red Hat would like to thank Eylon Ben Yaakov and Daniel Shapiro for reporting this issue. Bug Fix(es): * Previously, Red Hat Enterprise Linux 7.4 with the kernel version provided by the kernel-alt package, did not support turning off transactional memory (TM) on the POWER9 systems. With this update it is now possible to turn off TM on the POWER9 systems. (BZ#1509974) * Due to a bug in the ixgbe and i40e drivers, the socket buffer list (skb list) in some cases got corrupted when running Red Hat Enterprise Linux 7.4 with the kernel version provided by the kernel-alt package on the POWER9 systems. Consequently, a kernel panic occurred. This update fixes ixgbe and i40e, and the kernel no longer panics due to this behavior. (BZ#1518412) * Users can lower the max_sectors_kb setting in the sysfs file system to accommodate certain workloads. Previously, users needed to set the maximum I/O size to either the block layer default or the optional preferred I/O size reported by the device. This update fixes the scsi driver to keep the current heuristic function for the initial setting of max_sectors_kb. As a result, for subsequent invocations, the driver now only updates the current queue limit if it exceeds the capabilities of the hardware. (BZ#1518432) * When performing full-bootme tests on Boston ESS systems running Red Hat Enterprise Linux 7.4 with the kernel version provided in the kernel-alt package, a kernel panic occurred and the operating system dropped into the XMON software. This update fixes the Multi-Queue Block IO Queueing Mechanism (blk-mq), and the kernel no longer panics in these circumstances. (BZ#1518433) * When running the stress test on the file system with the gssstress command, and pulling one disk from one recovery group, \"kernel I/O error\" was reported, and gssstress became unresponsive. Gssstress now works as expected under the described circumstances. (BZ#1522645) * When using the fwupdate_xl710 utility to apply updates for NVM Intel Ethernet Converged Network Adapter XL710 on machines running Red Hat Enterpise Linux 7.4 with the kernel version provided in the kernel-alt package, a deadlock sometimes occurred when the i40e driver was acquiring access to the Non-Volatile Memory (NVM) of the device. Consequently, NVM acquire timeouts occurred, the firmware update failed with the following error message: \"Failed Acquiring NVM resource for read err=-53 status=0xa\", and left the device's memory in a corrupted state. This update fixes the i40e driver, and the firmware updates no longer fail due to this behavior. (BZ#1522843) * Previously, on POWER9 systems with more than 100 Pstates, the cpufreq driver did not handle the cases when the NxN matrix denominated transition table (trans_table) overflowed beyond the PAGE_SIZE boundary correctly. Consequently, reading trans_table for any of the CPUs failed with the following error: \"fill_read_buffer: show+0x0/0xa0 returned bad count\" With this update reading trans_table for any of the CPUs now proceeds as expected under the described circumstances. (BZ#1522844) * Previously, the /sys/firmware/opal/exports directory did not contain an export node. Consequently, a range of memory in the Open Power Abstraction Layer (OPAL) that the operating system attempted to export to user space for debugging purposes was not available. With this update the sysfs file under /sys/firmware/opal/exports is now available for each property found there, and this file can be used for debugging purposes. (BZ#1522845)", "link": "https://access.redhat.com/errata/RHSA-2018:0180", "severity": "High", "fixedby": "0:4.11.0-44.4.1.el7a" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2017:0372", "namespace": "centos:7", "description": "The kernel-aarch64 package contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important) * Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important) Red Hat would like to thank Phil Oester for reporting CVE-2016-5195. Bug Fix(es): * Previously, the operating system did not support the Mellanox ConnectX-4 PCIe Network Interface Controllers (NIC) in Ethernet mode. This update enables Ethernet support in the mlx5 driver. As a result, the Mellanox ConnectX-4 PCIe NICs now work in Ethernet mode as expected. (BZ#1413108) * On the Qualcomm Datacenter Technologies server platform with Qualcomm Datacenter Technologies Centriq 2400 CPU (QDF2400v1) memory accesses sometimes allocated Translation Lookaside Buffer (TLB) entries using an incorrect Address Space ID (ASID). This could consequently result in memory corruption and crashes under certain conditions. The underlying source code has been modified to handle the TTBRx_EL1[ASID] and TTBRx_EL1[BADDR] fields separately using a reserved ASID, and the described problem no longer occurs. (BZ#1421765)", "link": "https://access.redhat.com/errata/RHSA-2017:0372", "severity": "High", "fixedby": "0:4.5.0-15.2.1.el7" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:0502", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important)(ppc only) * kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak (CVE-2017-17712, Important) * kernel: mm/pagewalk.c:walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak (CVE-2017-16994, Moderate) Bug Fix(es): * When changing the Maximum Transmission Unit (MTU) size on Broadcom BCM5717, BCM5718 and BCM5719 chipsets, the tg3 driver sometimes lost synchronization with the device. Consequently, the device became unresponsive. With this update, tg3 has been fixed, and devices no longer hang due to this behavior. (BZ#1533478) * Previously, the perf tool used strict string matching to provide related events to a particular CPUID instruction. Consequently, the events were not available on certain IBM PowerPC systems. This update fixes perf to use regular expressions instead of string matching of the entire CPUID string. As a result, the perf tool now supports events on IBM PowerPC architectures as expected. (BZ#1536567) * Previously, the kernel debugfs file system implemented removal protection based on sleepable read-copy-update (SRCU), which slowed down the drivers relying on the debugfs_remove_recursive() function. Consequently, a decrease in performance or a deadlock sometimes occurred. This update implements per-file removal protection in debugfs. As a result, the performance of the system has improved significantly. (BZ#1538030) * When running the 'perf test' command on a PowerKVM guest multiple times, the branch instructions recorded in Branch History Rolling Buffer (BHRB) entries were sometimes unmapped before the kernel processed the entries. Consequently, the operating system terminated unexpectedly. This update fixes the bug, and the operating system no longer crashes in the described situation. (BZ#1538031)", "link": "https://access.redhat.com/errata/RHSA-2018:0502", "severity": "High", "fixedby": "0:4.11.0-44.6.1.el7a" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:0654", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. The following packages have been upgraded to a later upstream version: kernel-alt (4.14.0). (BZ#1492717) Security Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, ARM) Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important, ARM) Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important, ARM) * kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate) * kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate) * kernel: Incorrect updates of uninstantiated keys crash the kernel (CVE-2017-15299, Moderate) * kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate) * kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate) * kernel: Arbitrary stack overwrite causing oops via crafted signal frame (CVE-2017-1000255, Moderate) * kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate) * kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate) * kernel: Buffer overflow in mp_override_legacy_irq() (CVE-2017-11473, Low) * kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact (CVE-2018-6927, Low) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Google Project Zero for reporting CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754; Vitaly Mayatskih for reporting CVE-2017-12190; Kirill Tkhai for reporting CVE-2017-15129; Michael Ellerman, Gustavo Romero, Breno Leitao, Paul Mackerras, and Cyril Bur for reporting CVE-2017-1000255; and Armis Labs for reporting CVE-2017-1000410. Additional Changes: See the Red Hat Enterprise Linux 7.5 Release Notes linked from References.", "link": "https://access.redhat.com/errata/RHSA-2018:0654", "severity": "High", "fixedby": "0:4.14.0-49.el7a" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:1374", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Andy Lutomirski for reporting this issue. Bug Fix(es): * Previously, the nfs_commit_inode() function did not respect the FLUSH_SYNC argument and exited even if there were already the in-flight COMMIT requests. As a consequence, the mmap() system call occasionally returned the EBUSY error on NFS, and CPU soft lockups occurred during a writeback on NFS. This update fixes nfs_commit_inode() to respect FLUSH_SYNC. As a result, mmap() does not return EBUSY, and the CPU soft lockups no longer occur during NFS writebacks. (BZ#1559869) * Recent IBM z Systems hardware contains an extension to the time-of-day clock that ensures it will be operational after the year 2042 by avoiding an overflow that would happen without it. However, the KVM hypervisor was previously unable to handle the extension correctly, which lead to guests freezing if their kernel supported the time-of-day clock extension. This update adds support for the extension to the KVM hypervisor, and KVM guests which support it no longer freeze. (BZ#1559871) * This update provides the ability to disable the \"RFI Flush\" mitigation mechanism for the Meltdown vulnerability (CVE-2017-5754) in the kernel. The patches that mitigate the effect of Meltdown may have negative impact on performance when the mechanism they provide is enabled, and at the same time your systems may not need this mitigation if they are secured by other means. The vulnerability mitigation remains enabled by default and must be disabled manually; this restores system performance to original levels, but the system then also remains vulnerable to Meltdown. Instructions describing how to disable RFI Flush, as well as additional information, is provided in the following Red Hat Knowledgebase article: https://access.redhat.com/articles/3311301 (BZ#1561463)", "link": "https://access.redhat.com/errata/RHSA-2018:1374", "severity": "High", "fixedby": "0:4.14.0-49.2.2.el7a" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:2772", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * kernel: Infoleak/use-after-free in __oom_reap_task_mm function in mm/oom_kill.c (CVE-2017-18202) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Previously, on certain little-endian variants of IBM Power Systems, there was no “sysfs spec_store_bypass” file. As a consequence, there was no way to indicate the Speculative Store Bypass Disable (SSBD) mitigation status. This update adds infrastructure code into the kernel to create the /sys/devices/system/cpu/vulnerabilities/* files. As a result, sysfs spec_store_bypass shows whether the SSBD mitigation is disabled or enabled. (BZ#1602340) * Previously, the kernel architectures for IBM z Systems were missing support to display the status of the Spectre v2 mitigations. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spectre_v2 file did not exist. With this update, the kernel now shows the status in the above mentioned file and as a result, the file now reports either \"Vulnerable\" or \"Mitigation: execute trampolines\" message. (BZ#1619667)", "link": "https://access.redhat.com/errata/RHSA-2018:2772", "severity": "High", "fixedby": "0:4.14.0-49.13.1.el7a" }, { "featurename": "kernel-headers", "featureversion": "3.10.0-957.21.3.el7", "vulnerability": "RHSA-2018:1967", "namespace": "centos:7", "description": "The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es): * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC) * This release also includes next iteration of the CVE-2017-5715 mitigation that includes the SMCCC (Secure Monitor Call Calling Convention) 1.1 support. (CVE-2017-5715, ARM) Red Hat would like to thank Google Project Zero for reporting CVE-2017-5715 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639. Bug Fix(es): These updated kernel-alt packages include numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3485851", "link": "https://access.redhat.com/errata/RHSA-2018:1967", "severity": "High", "fixedby": "0:4.14.0-49.8.1.el7a" } ] }
| 19,096 | Common Lisp | .l | 1 | 19,090 | 19,090 | 0.787638 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 9060b8c7df9781ff52267274bd12944fcf229617b687808ad0aef4bcbc421461 | 4,213 | [
-1
] |
4,214 | mysql-aqua.html | atgreen_red-light-green-light/test/mysql-aqua.html | <!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title> | Scan Results</title>
<style>
.hidden{display:none}.pl30{padding-left:30px !important}.pl10{padding-left:10px !important}.severity{color:#fff;border-radius:3px;padding:3px 6px}.severity.negligible{background:#5cef97}.severity.high{background:#e0443d}.severity.medium{background:#f79421}.severity.low{background:#e1c930}progress,sub,sup{vertical-align:baseline}button,hr,input{overflow:visible}[type=checkbox],[type=radio],legend{box-sizing:border-box;padding:0}html{font-family:sans-serif;-ms-text-size-adjust:100%;-webkit-text-size-adjust:100%}article,aside,details,figcaption,figure,footer,header,main,menu,nav,section,summary{display:block}audio,canvas,progress,video{display:inline-block}audio:not([controls]){display:none;height:0}[hidden],template{display:none}a{background-color:transparent;-webkit-text-decoration-skip:objects}a:active,a:hover{outline-width:0}abbr[title]{border-bottom:none;text-decoration:underline;text-decoration:underline dotted}b,strong{font-weight:bolder}dfn{font-style:italic}h1{font-size:2em;margin:.67em 0}mark{background-color:#ff0;color:#000}small{font-size:80%}sub,sup{font-size:75%;line-height:0;position:relative}sub{bottom:-.25em}sup{top:-.5em}img{border-style:none}svg:not(:root){overflow:hidden}code,kbd,pre,samp{font-family:monospace, monospace;font-size:1em}figure{margin:1em 40px}hr{box-sizing:content-box;height:0}button,input,select,textarea{font:inherit;margin:0}optgroup{font-weight:700}button,select{text-transform:none}[type=reset],[type=submit],button,html [type=button]{-webkit-appearance:button}[type=button]::-moz-focus-inner,[type=reset]::-moz-focus-inner,[type=submit]::-moz-focus-inner,button::-moz-focus-inner{border-style:none;padding:0}[type=button]:-moz-focusring,[type=reset]:-moz-focusring,[type=submit]:-moz-focusring,button:-moz-focusring{outline:ButtonText dotted 1px}fieldset{border:1px solid silver;margin:0 2px;padding:.35em .625em .75em}legend{color:inherit;display:table;max-width:100%;white-space:normal}textarea{overflow:auto}[type=number]::-webkit-inner-spin-button,[type=number]::-webkit-outer-spin-button{height:auto}[type=search]{-webkit-appearance:textfield;outline-offset:-2px}[type=search]::-webkit-search-cancel-button,[type=search]::-webkit-search-decoration{-webkit-appearance:none}::-webkit-input-placeholder{color:inherit;opacity:.54}::-webkit-file-upload-button{-webkit-appearance:button;font:inherit}h1{font-weight:700}h2{font-size:1.2em}.success{margin:2em auto;max-width:400px;padding:1em;font-size:1.6em;background-color:#91b94f;color:#fff}table{width:auto;margin:1em auto;border-collapse:collapse}#summary tr:first-child td{padding:.75em;font-size:1.5em;border:1px solid #000;color:#fff;text-shadow:1px 1px 1px #000}#summary tr:first-child td:nth-child(1){background-color:#e0443d}#summary tr:first-child td:nth-child(2){background-color:#f79421}#summary tr:first-child td:nth-child(3){background-color:#e1c930}#summary tr:first-child td:nth-child(4){background-color:#5cef97}#summary tr:first-child td:nth-child(5){background-color:#1280c4}#summary tr:last-child td{padding-top:4px;font-size:.9em;text-transform:uppercase}#disallow{text-align:left;max-width:500px;margin:2em auto 0;background-color:#e0adad;padding:10px;border:1px solid #e0443d}#disallow li{line-height:24px}#disallow p{margin-bottom:10px}.wrapper{height:calc(100% - 190px);overflow:auto}.table-data{margin-top:0;width:calc(100% - 5px);text-align:left;background:#f9f9f9}.table-data caption{margin-bottom:.6em}.table-data td,.table-data th{padding:7px 10px;border:1px solid #1f9fba;position:relative}.table-data th{border:none;background:#fff}.table-data th:first-child{padding-left:32px}.table-data a{text-decoration:none;color:#08b1d5}.table-data a:hover{text-decoration:underline}.table-data tr:hover{background:#d5d2d0}.table-data tbody tr:nth-child(even) td{background-color:#daf1f6}.more-info th{border:1px solid #ccc !important}.more-info td{background:#fff !important;border:1px solid #ccc !important;font-size:14px}.more-info > td{background:#ececec !important}.more-info tr:hover td{background:#f9f9f9 !important}.more-info ul{list-style:none;text-align:left}.more-info{display:none;background:transparent !important;border:1px solid #1f9fba}body > p{margin-top:2em}.bold{font-weight:700}.chevron{color:#08b1d5;font-size:20px;padding:10px;cursor:pointer;position:absolute;left:-5px;top:40%;z-index:10;transform:translateY(-50%)}#logo{display:block;margin:0 auto;width:144px;height:52px;background-repeat:no-repeat;background-image:url(data:image/png;base64,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)}#logo span{display:none}*{margin:0;padding:0}html,body{max-height:100%;overflow:hidden;background:#ccc;font-family:'Lucida Grande', 'Lucida Sans', Arial, sans-serif;color:#464547}.mt20{margin-top:20px}.clearfix::after{display:block;content:"";clear:both}.header{height:50px;line-height:50px;background:#000}.header .logo{width:100px;margin-top:7px;margin-left:10px}.content{margin:30px;background:#fff;height:calc(100vh - 110px)}.tabset{float:left;list-style:none;padding-left:20px}.tabset li{float:left;position:relative}.tab input[type=radio]{display:none}.tab input[type=radio] + label{display:inline-block;padding:10px;color:#999;cursor:pointer}.tab input[type=radio]:checked + label{color:#2b2b2b;border:1px solid #ddd;border-bottom:0;border-radius:3px 3px 0 0}.tab input[type=radio]:checked + label:after{content:"";position:absolute;height:1px;width:calc(100% - 2px);background:#fff;left:1px;bottom:-1px;z-index:1000}.tabs-content{clear:both;height:calc(100% - 20px);overflow:auto;border-top:1px solid #ddd;padding:20px}.tabs-content .tab-content{display:none;height:100%}.tabs-content .tab1{display:block;height:calc(100% - 165px);overflow:auto}.content > .title{padding:15px 20px;margin-bottom:10px;border-bottom:0}.content > .title h1{margin-bottom:5px;font-size:24px}.content > .title span{font-size:16px}.box{padding:25px 20px;border:1px solid #ddd}.image-status{background:#f7f7f7}.image-status .icon-warning-triangle,.image-status .icon-check{width:60px;height:60px;float:left}.image-status h2,.image-status h5{padding-left:70px;margin-top:5px}.image-status h5{font-size:14px;font-weight:normal}.title{padding:0;margin:0;border-bottom:1px solid #ddd;padding-bottom:10px;font-weight:normal;font-size:16px}.vuln-nums{padding:10px}.vuln-nums li{list-style:none;float:left;padding:5px 10px;border-right:1px solid #ddd;font-size:12px}.vuln-nums li:last-child{border-right:none}.square{border-radius:3px;width:15px;height:15px;display:inline-block;position:relative;top:3px}.red{background:#e0443d}.orange{background:#f79421}.yellow{background:#e1c930}.green{background:#a5cf4f}.text-alert{color:#e0443d;fill:#e0443d}.text-success{color:#a5cf4f;fill:#a5cf4f}.assurance-checks li{list-style:none;padding:10px 5px;border-bottom:1px solid #ddd;font-size:14px}.assurance-checks .icon-warning-triangle{width:20px;position:relative;top:3px;margin-right:5px}
</style>
<script>
function changeTab(e){for(var t=document.getElementsByClassName("tab-content"),n=document.getElementsByClassName(e)[0],s=0;s<t.length;s++)t[s].style.display="none";n.style.display="block"}function getDisplay(e){return e.currentStyle?e.currentStyle.display:getComputedStyle(e,null).display}function toggleOpen(e){var t=document.getElementById("show"+e.id);"none"===getDisplay(t)?(e.getElementsByClassName('chevron')[0].innerHTML="▾",t.style.display="table-row"):(e.getElementsByClassName('chevron')[0].innerHTML="▸",t.style.display="none");return false;}function toggleGroupBy(e){var t=document.getElementById("resources"),n=document.getElementById("cves");e.checked?(t.classList.remove("hidden"),n.classList.add("hidden")):(n.classList.remove("hidden"),t.classList.add("hidden"))}
</script>
</head>
<body>
<header class="header">
<svg class="logo" viewBox="0 0 490.42 176" xmlns="http://www.w3.org/2000/svg">
<defs>
<style>.cls-1 {
fill: #f1df36;
}
.cls-2 {
fill: #faaf42;
}
.cls-3 {
fill: #9ad7ec;
}
.cls-4 {
fill: #08b1d5;
}
.cls-5 {
fill: #f69421;
}
.cls-6 {
fill: #1180c4;
}
.cls-7 {
fill: #fff;
}
.cls-8 {
fill: none;
stroke: #f69421;
stroke-miterlimit: 10;
stroke-width: 22px;
}</style>
</defs>
<title>aqua_logo_</title>
<polygon class="cls-1" points="85.58 20 50.78 54 120.38 54 120.38 20"/>
<polygon class="cls-2" points="120.38 122 155.18 88 155.18 54 120.38 54"/>
<polygon class="cls-3" points="50.78 122 50.78 156 85.58 156 120.38 122"/>
<polygon class="cls-4" points="15.98 88 15.98 122 50.78 122 50.78 54"/>
<rect class="cls-5" x="120.38" y="20" width="34.8" height="34"/>
<rect class="cls-6" x="15.98" y="122" width="34.8" height="34"/>
<path class="cls-7" d="M239.94,51.45A25.86,25.86,0,0,0,230.15,47a59.53,59.53,0,0,0-12.93-1.21A70,70,0,0,0,204.48,47c-4.24.79-7.54,1.52-9.82,2.18l-1.08.31v15h2.52l0.28-.12a65.57,65.57,0,0,1,11.17-3.59,45.5,45.5,0,0,1,9.61-1.23,47.4,47.4,0,0,1,6.74.47A12.9,12.9,0,0,1,229,61.79a8.09,8.09,0,0,1,3.07,3.44,14.35,14.35,0,0,1,1.14,6.25v0.92c-5.91.35-11.49,0.86-16.62,1.52a51.69,51.69,0,0,0-14.84,4,23.27,23.27,0,0,0-10.73,9,26,26,0,0,0-3.4,13.6,26.31,26.31,0,0,0,1.86,9.81,23.78,23.78,0,0,0,5,7.87,23.46,23.46,0,0,0,16.65,6.87,31.87,31.87,0,0,0,8.91-1,38,38,0,0,0,6.5-2.69,29.78,29.78,0,0,0,5.1-3.32l1.56-1.23v6.2H248.4V71.94a32.05,32.05,0,0,0-2.06-12.13A19.67,19.67,0,0,0,239.94,51.45Zm-6.68,33.76V103a44,44,0,0,1-8,5.5,20.44,20.44,0,0,1-9.75,2.32c-4.1,0-7.21-.94-9.25-2.79s-3-4.56-3-8.3c0-3.29.89-5.75,2.73-7.53A18.22,18.22,0,0,1,213.43,88a58.31,58.31,0,0,1,10.47-1.86C227.49,85.76,230.62,85.46,233.25,85.21Z"/>
<path class="cls-7" d="M306.7,49.86a40.8,40.8,0,0,0-6.95-3,33.78,33.78,0,0,0-10.13-1.37,28.89,28.89,0,0,0-12.26,2.74A29.53,29.53,0,0,0,267.26,56a39,39,0,0,0-7.07,12.52,50.69,50.69,0,0,0-2.65,17c0,12.05,2.57,21.63,7.63,28.46a24.78,24.78,0,0,0,20.88,10.51,29.1,29.1,0,0,0,11.84-2.37,37.47,37.47,0,0,0,8.28-5.21v32.91h15.21V47.52h-14.1Zm-7.63,10.48A39.15,39.15,0,0,1,306.18,63v39.67a35,35,0,0,1-8.08,5.1,22.6,22.6,0,0,1-9.38,2.08c-5.33,0-9.14-2-11.64-6.13-2.61-4.31-3.94-10.63-3.94-18.8,0-8.33,1.65-14.76,4.9-19.1s7.64-6.35,13.61-6.35A30.68,30.68,0,0,1,299.07,60.35Z"/>
<path class="cls-7" d="M380.35,102.49a42.28,42.28,0,0,1-8.46,5.58,20,20,0,0,1-8.88,2.38,15.39,15.39,0,0,1-6.69-1.14,7.82,7.82,0,0,1-3.41-3.45,17.3,17.3,0,0,1-1.75-6.13,88,88,0,0,1-.41-9.41V47.52H335.54V96.1a41.14,41.14,0,0,0,1.8,12.95,24.82,24.82,0,0,0,5.16,9,20.29,20.29,0,0,0,7.89,5.32,27,27,0,0,0,9.45,1.65,26.25,26.25,0,0,0,12-2.73,50.21,50.21,0,0,0,8.54-5.63v6.34h15.21V47.52H380.35v55Z"/>
<path class="cls-7" d="M463.82,59.81a19.67,19.67,0,0,0-6.4-8.36A25.86,25.86,0,0,0,447.64,47a59.53,59.53,0,0,0-12.93-1.21A70,70,0,0,0,422,47c-4.24.79-7.54,1.52-9.82,2.18l-1.08.31v15h2.52l0.28-.12A65.57,65.57,0,0,1,425,60.78a45.5,45.5,0,0,1,9.61-1.23,47.4,47.4,0,0,1,6.74.47,12.9,12.9,0,0,1,5.15,1.78,8.09,8.09,0,0,1,3.07,3.44,14.35,14.35,0,0,1,1.14,6.25v0.92c-5.91.35-11.49,0.86-16.62,1.52a51.69,51.69,0,0,0-14.84,4,23.27,23.27,0,0,0-10.73,9,26,26,0,0,0-3.4,13.6,26.31,26.31,0,0,0,1.86,9.81,23.78,23.78,0,0,0,5,7.87,23.46,23.46,0,0,0,16.65,6.87,31.87,31.87,0,0,0,8.91-1,38,38,0,0,0,6.5-2.69,29.78,29.78,0,0,0,5.1-3.32l1.56-1.23v6.2h15.14V71.94A32.05,32.05,0,0,0,463.82,59.81Zm-13.08,25.4V103a44,44,0,0,1-8,5.5,20.44,20.44,0,0,1-9.75,2.32c-4.1,0-7.21-.94-9.25-2.79s-3-4.56-3-8.3c0-3.29.89-5.75,2.73-7.53A18.22,18.22,0,0,1,430.92,88a58.31,58.31,0,0,1,10.47-1.86C445,85.76,448.11,85.46,450.74,85.21Z"/>
<rect class="cls-8" x="-604.42" y="-703.27" width="1676" height="1646"/>
</svg>
</header>
<main class="content">
<div class="title">
<h1>Scan Report: </h1>
<span>From Local Docker Engine</span>
</div>
<ul class="tabset">
<li class="tab">
<input type="radio" name="tab" id="tab1" checked>
<label for="tab1" onclick="changeTab('tab1')">Risk</label>
</li>
<li class="tab">
<input type="radio" name="tab" id="tab2">
<label for="tab2" onclick="changeTab('tab2')">Vulnerabilities</label>
</li>
</ul>
<div class="tabs-content">
<div class="tab-content tab1">
<div class="image-status box">
<svg version="1.1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"
class="icon-warning-triangle text-alert">
<path d="M30.587 30.447c-0.009 0-0.017 0-0.027 0h-29.259c-0.469 0-0.905-0.248-1.144-0.652-0.24-0.403-0.248-0.904-0.021-1.315l14.629-26.533c0.467-0.847 1.864-0.847 2.331 0l14.516 26.328c0.191 0.229 0.305 0.524 0.305 0.845 0 0.732-0.596 1.327-1.331 1.327zM15.931 5.34l-12.38 22.453h24.76l-12.38-22.453zM15.931 11.873c0.735 0 1.331 0.593 1.331 1.327v6.633c0 0.732-0.596 1.327-1.331 1.327s-1.329-0.595-1.329-1.327v-6.633c0-0.733 0.595-1.327 1.329-1.327zM16.879 22.871c0.239 0.252 0.385 0.597 0.385 0.943s-0.147 0.689-0.399 0.941c-0.24 0.239-0.585 0.385-0.931 0.385-0.36 0-0.692-0.147-0.944-0.385-0.253-0.252-0.387-0.596-0.387-0.941s0.133-0.691 0.387-0.943c0.491-0.491 1.396-0.491 1.888 0z"></path>
</svg>
<h2 class="text-alert">Image is disallowed</h2>
<h5>Image scanned on August 3, 2018 14:59</h5>
</div>
<div class="image-overview box mt20">
<h4 class="title">Image Overview</h4>
<ul class="vuln-nums clearfix">
<li class="vuln">
<span class="square red"></span>
<span>6 High</span>
</li>
<li class="vuln">
<span class="square orange"></span>
<span>20 Medium</span>
</li>
<li class="vuln">
<span class="square yellow"></span>
<span>35 Low</span>
</li>
<li class="vuln">
<span class="square green"></span>
<span>2 Negligible</span>
</li>
</ul>
</div>
<div class="assurance-checks box mt20">
<h4 class="title">Image Assurance</h4>
<ul>
<li>
<svg version="1.1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"
class="icon-warning-triangle text-alert">
<path d="M30.587 30.447c-0.009 0-0.017 0-0.027 0h-29.259c-0.469 0-0.905-0.248-1.144-0.652-0.24-0.403-0.248-0.904-0.021-1.315l14.629-26.533c0.467-0.847 1.864-0.847 2.331 0l14.516 26.328c0.191 0.229 0.305 0.524 0.305 0.845 0 0.732-0.596 1.327-1.331 1.327zM15.931 5.34l-12.38 22.453h24.76l-12.38-22.453zM15.931 11.873c0.735 0 1.331 0.593 1.331 1.327v6.633c0 0.732-0.596 1.327-1.331 1.327s-1.329-0.595-1.329-1.327v-6.633c0-0.733 0.595-1.327 1.329-1.327zM16.879 22.871c0.239 0.252 0.385 0.597 0.385 0.943s-0.147 0.689-0.399 0.941c-0.24 0.239-0.585 0.385-0.931 0.385-0.36 0-0.692-0.147-0.944-0.385-0.253-0.252-0.387-0.596-0.387-0.941s0.133-0.691 0.387-0.943c0.491-0.491 1.396-0.491 1.888 0z"></path>
</svg>
Image severity <strong>high</strong> exeeds the allowed max severity <strong>high</strong>
</li>
</ul>
</div>
</div>
<div class="tab-content tab2">
<div class="group-by" style="margin-left: 5px;margin-bottom: 20px;">
<input type="checkbox" id="group" onchange="toggleGroupBy(this)">
<label for="group">Group by resource</label>
</div>
<div class="wrapper">
<table id="resources" class="hidden table-data resources">
<thead>
<tr>
<th scope="col">Resource</th>
<th scope="col">Type</th>
<th scope="col">Version</th>
<th scope="col">Format</th>
<th scope="col">Arch</th>
</tr>
</thead>
<tbody>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="1">
<span class="chevron">▸</span>
setup
</a>
</td>
<td>PACKAGE</td>
<td>2.8.71-7.el7</td>
<td>rpm</td>
<td>noarch</td>
</tr>
<tr id="show1" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-1113" target="_blank">CVE-2018-1113</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="4">
<span class="chevron">▸</span>
glibc
</a>
</td>
<td>PACKAGE</td>
<td>2.17-196.el7</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show4" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-11237" target="_blank">CVE-2018-11237</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2017-16997" target="_blank">CVE-2017-16997</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-11236" target="_blank">CVE-2018-11236</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2014-4043" target="_blank">CVE-2014-4043</a></td>
<td><span class="severity low">low</span></td>
<td><span>1</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://rhn.redhat.com/errata/RHSA-2018-0805.html" target="_blank">RHSA-2018:0805</a></td>
<td><span class="severity high">high</span></td>
<td><span>7</span></td>
<td>2.17-222.el7</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="6">
<span class="chevron">▸</span>
bash
</a>
</td>
<td>PACKAGE</td>
<td>4.2.46-29.el7_4</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show6" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2014-6278" target="_blank">CVE-2014-6278</a></td>
<td><span class="severity negligible">negligible</span></td>
<td><span>10</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2014-6277" target="_blank">CVE-2014-6277</a></td>
<td><span class="severity negligible">negligible</span></td>
<td><span>10</span></td>
<td>None</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="15">
<span class="chevron">▸</span>
libgcrypt
</a>
</td>
<td>PACKAGE</td>
<td>1.5.3-14.el7</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show15" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-0495" target="_blank">CVE-2018-0495</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2014-3591" target="_blank">CVE-2014-3591</a></td>
<td><span class="severity low">low</span></td>
<td><span>1.2</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2015-0837" target="_blank">CVE-2015-0837</a></td>
<td><span class="severity low">low</span></td>
<td><span>1.2</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2014-5270" target="_blank">CVE-2014-5270</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>1.9</span></td>
<td>None</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="18">
<span class="chevron">▸</span>
sqlite
</a>
</td>
<td>PACKAGE</td>
<td>3.7.17-8.el7</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show18" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-8740" target="_blank">CVE-2018-8740</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="30">
<span class="chevron">▸</span>
libidn
</a>
</td>
<td>PACKAGE</td>
<td>1.28-4.el7</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show30" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2015-2059" target="_blank">CVE-2015-2059</a></td>
<td><span class="severity low">low</span></td>
<td><span>2.6</span></td>
<td>None</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="44">
<span class="chevron">▸</span>
procps-ng
</a>
</td>
<td>PACKAGE</td>
<td>3.3.10-16.el7</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show44" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-1122" target="_blank">CVE-2018-1122</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-1123" target="_blank">CVE-2018-1123</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-1125" target="_blank">CVE-2018-1125</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://rhn.redhat.com/errata/RHSA-2018-1700.html" target="_blank">RHSA-2018:1700</a></td>
<td><span class="severity high">high</span></td>
<td><span>7</span></td>
<td>3.3.10-17.el7_5.2</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="46">
<span class="chevron">▸</span>
binutils
</a>
</td>
<td>PACKAGE</td>
<td>2.25.1-32.base.el7_4.1</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show46" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-9996" target="_blank">CVE-2018-9996</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-9138" target="_blank">CVE-2018-9138</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-10534" target="_blank">CVE-2018-10534</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-10535" target="_blank">CVE-2018-10535</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-10372" target="_blank">CVE-2018-10372</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-10373" target="_blank">CVE-2018-10373</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-12641" target="_blank">CVE-2018-12641</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-13033" target="_blank">CVE-2018-13033</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-12697" target="_blank">CVE-2018-12697</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-12698" target="_blank">CVE-2018-12698</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-12699" target="_blank">CVE-2018-12699</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-12700" target="_blank">CVE-2018-12700</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-12934" target="_blank">CVE-2018-12934</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-7643" target="_blank">CVE-2018-7643</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-7208" target="_blank">CVE-2018-7208</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-8945" target="_blank">CVE-2018-8945</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-7568" target="_blank">CVE-2018-7568</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-7569" target="_blank">CVE-2018-7569</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-7642" target="_blank">CVE-2018-7642</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="47">
<span class="chevron">▸</span>
nss
</a>
</td>
<td>PACKAGE</td>
<td>3.28.4-15.el7_4</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show47" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-0495" target="_blank">CVE-2018-0495</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2014-3566" target="_blank">CVE-2014-3566</a></td>
<td><span class="severity high">high</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="49">
<span class="chevron">▸</span>
curl
</a>
</td>
<td>PACKAGE</td>
<td>7.29.0-42.el7</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show49" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-1000301" target="_blank">CVE-2018-1000301</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-1000007" target="_blank">CVE-2018-1000007</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-1000120" target="_blank">CVE-2018-1000120</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-1000121" target="_blank">CVE-2018-1000121</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-1000122" target="_blank">CVE-2018-1000122</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://rhn.redhat.com/errata/RHSA-2017-3263.html" target="_blank">RHSA-2017:3263</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>7.29.0-42.el7_4.1</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="56">
<span class="chevron">▸</span>
dracut
</a>
</td>
<td>PACKAGE</td>
<td>033-502.el7</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show56" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2017-5715" target="_blank">CVE-2017-5715</a></td>
<td><span class="severity high">high</span></td>
<td><span>7</span></td>
<td>None</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="57">
<span class="chevron">▸</span>
systemd
</a>
</td>
<td>PACKAGE</td>
<td>219-42.el7_4.4</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show57" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-6954" target="_blank">CVE-2018-6954</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://rhn.redhat.com/errata/RHSA-2018-0260.html" target="_blank">RHSA-2018:0260</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>219-42.el7_4.7</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="59">
<span class="chevron">▸</span>
python
</a>
</td>
<td>PACKAGE</td>
<td>2.7.5-58.el7</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show59" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-1060" target="_blank">CVE-2018-1060</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-1061" target="_blank">CVE-2018-1061</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://rhn.redhat.com/errata/RHSA-2018-2123.html" target="_blank">RHSA-2018:2123</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>4.3</span></td>
<td>2.7.5-69.el7_5</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="73">
<span class="chevron">▸</span>
yum-utils
</a>
</td>
<td>PACKAGE</td>
<td>1.1.31-42.el7</td>
<td>rpm</td>
<td>noarch</td>
</tr>
<tr id="show73" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://rhn.redhat.com/errata/RHSA-2018-2285.html" target="_blank">RHSA-2018:2285</a></td>
<td><span class="severity high">high</span></td>
<td><span>7</span></td>
<td>1.1.31-46.el7_5</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="81">
<span class="chevron">▸</span>
policycoreutils
</a>
</td>
<td>PACKAGE</td>
<td>2.5-17.1.el7</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show81" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://rhn.redhat.com/errata/RHSA-2018-0913.html" target="_blank">RHSA-2018:0913</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>2.5-22.el7</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="84">
<span class="chevron">▸</span>
libevent
</a>
</td>
<td>PACKAGE</td>
<td>2.0.21-4.el7</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show84" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2015-6525" target="_blank">CVE-2015-6525</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5.1</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2014-6272" target="_blank">CVE-2014-6272</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5.1</span></td>
<td>None</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="124">
<span class="chevron">▸</span>
libxml2
</a>
</td>
<td>PACKAGE</td>
<td>2.9.1-6.el7_2.3</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show124" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-14404" target="_blank">CVE-2018-14404</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2017-18258" target="_blank">CVE-2017-18258</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="140">
<span class="chevron">▸</span>
ncurses
</a>
</td>
<td>PACKAGE</td>
<td>5.9-14.20130511.el7_4</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show140" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-10754" target="_blank">CVE-2018-10754</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td class="pl30">
<a href="#" onclick="toggleOpen(this)" id="176">
<span class="chevron">▸</span>
gnupg2
</a>
</td>
<td>PACKAGE</td>
<td>2.0.22-4.el7</td>
<td>rpm</td>
<td>x86_64</td>
</tr>
<tr id="show176" class="more-info">
<td colspan="6">
<table style="width:100%">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2018-9234" target="_blank">CVE-2018-9234</a></td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2014-3591" target="_blank">CVE-2014-3591</a></td>
<td><span class="severity low">low</span></td>
<td><span>1.2</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2015-0837" target="_blank">CVE-2015-0837</a></td>
<td><span class="severity low">low</span></td>
<td><span>1.2</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://access.redhat.com/security/cve/CVE-2014-4617" target="_blank">CVE-2014-4617</a></td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td><a href="https://rhn.redhat.com/errata/RHSA-2018-2181.html" target="_blank">RHSA-2018:2181</a></td>
<td><span class="severity high">high</span></td>
<td><span>7</span></td>
<td>2.0.22-5.el7_5</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
<table id="cves" class="table-data">
<thead>
<tr>
<th scope="col">Name</th>
<th scope="col">Resource</th>
<th scope="col">Severity</th>
<th scope="col">Score</th>
<th scope="col">Fix Version</th>
</tr>
</thead>
<tbody>
<tr>
<tr>
<td>
<a href="https://rhn.redhat.com/errata/RHSA-2018-2181.html" target="_blank">RHSA-2018:2181</a>
</td>
<td>gnupg2</td>
<td><span class="severity high">high</span></td>
<td><span>7</span></td>
<td>2.0.22-5.el7_5</td>
</tr>
<tr>
<td>
<a href="https://rhn.redhat.com/errata/RHSA-2018-1700.html" target="_blank">RHSA-2018:1700</a>
</td>
<td>procps-ng</td>
<td><span class="severity high">high</span></td>
<td><span>7</span></td>
<td>3.3.10-17.el7_5.2</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2017-5715" target="_blank">CVE-2017-5715</a>
</td>
<td>dracut</td>
<td><span class="severity high">high</span></td>
<td><span>7</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://rhn.redhat.com/errata/RHSA-2018-0805.html" target="_blank">RHSA-2018:0805</a>
</td>
<td>glibc</td>
<td><span class="severity high">high</span></td>
<td><span>7</span></td>
<td>2.17-222.el7</td>
</tr>
<tr>
<td>
<a href="https://rhn.redhat.com/errata/RHSA-2018-2285.html" target="_blank">RHSA-2018:2285</a>
</td>
<td>yum-utils</td>
<td><span class="severity high">high</span></td>
<td><span>7</span></td>
<td>1.1.31-46.el7_5</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2015-6525" target="_blank">CVE-2015-6525</a>
</td>
<td>libevent</td>
<td><span class="severity medium">medium</span></td>
<td><span>5.1</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2014-6272" target="_blank">CVE-2014-6272</a>
</td>
<td>libevent</td>
<td><span class="severity medium">medium</span></td>
<td><span>5.1</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-14404" target="_blank">CVE-2018-14404</a>
</td>
<td>libxml2</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-0495" target="_blank">CVE-2018-0495</a>
</td>
<td>libgcrypt</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-0495" target="_blank">CVE-2018-0495</a>
</td>
<td>nss</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-1061" target="_blank">CVE-2018-1061</a>
</td>
<td>python</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-1122" target="_blank">CVE-2018-1122</a>
</td>
<td>procps-ng</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://rhn.redhat.com/errata/RHSA-2018-0260.html" target="_blank">RHSA-2018:0260</a>
</td>
<td>systemd</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>219-42.el7_4.7</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2014-4617" target="_blank">CVE-2014-4617</a>
</td>
<td>gnupg2</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-11236" target="_blank">CVE-2018-11236</a>
</td>
<td>glibc</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-6954" target="_blank">CVE-2018-6954</a>
</td>
<td>systemd</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2017-16997" target="_blank">CVE-2017-16997</a>
</td>
<td>glibc</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-11237" target="_blank">CVE-2018-11237</a>
</td>
<td>glibc</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://rhn.redhat.com/errata/RHSA-2017-3263.html" target="_blank">RHSA-2017:3263</a>
</td>
<td>curl</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>7.29.0-42.el7_4.1</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-1000122" target="_blank">CVE-2018-1000122</a>
</td>
<td>curl</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-1000120" target="_blank">CVE-2018-1000120</a>
</td>
<td>curl</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-1000007" target="_blank">CVE-2018-1000007</a>
</td>
<td>curl</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-1000301" target="_blank">CVE-2018-1000301</a>
</td>
<td>curl</td>
<td><span class="severity medium">medium</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2014-3566" target="_blank">CVE-2014-3566</a>
</td>
<td>nss</td>
<td><span class="severity high">high</span></td>
<td><span>5</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://rhn.redhat.com/errata/RHSA-2018-2123.html" target="_blank">RHSA-2018:2123</a>
</td>
<td>python</td>
<td><span class="severity medium">medium</span></td>
<td><span>4.3</span></td>
<td>2.7.5-69.el7_5</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-12641" target="_blank">CVE-2018-12641</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-12697" target="_blank">CVE-2018-12697</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-12698" target="_blank">CVE-2018-12698</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-12699" target="_blank">CVE-2018-12699</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-12700" target="_blank">CVE-2018-12700</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-12934" target="_blank">CVE-2018-12934</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-13033" target="_blank">CVE-2018-13033</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-7208" target="_blank">CVE-2018-7208</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-8945" target="_blank">CVE-2018-8945</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-7568" target="_blank">CVE-2018-7568</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-7569" target="_blank">CVE-2018-7569</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-7642" target="_blank">CVE-2018-7642</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-10373" target="_blank">CVE-2018-10373</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-7643" target="_blank">CVE-2018-7643</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-10372" target="_blank">CVE-2018-10372</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-10535" target="_blank">CVE-2018-10535</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-10534" target="_blank">CVE-2018-10534</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-1000121" target="_blank">CVE-2018-1000121</a>
</td>
<td>curl</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-9138" target="_blank">CVE-2018-9138</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-9996" target="_blank">CVE-2018-9996</a>
</td>
<td>binutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-1125" target="_blank">CVE-2018-1125</a>
</td>
<td>procps-ng</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-1123" target="_blank">CVE-2018-1123</a>
</td>
<td>procps-ng</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-8740" target="_blank">CVE-2018-8740</a>
</td>
<td>sqlite</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-1060" target="_blank">CVE-2018-1060</a>
</td>
<td>python</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2017-18258" target="_blank">CVE-2017-18258</a>
</td>
<td>libxml2</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-10754" target="_blank">CVE-2018-10754</a>
</td>
<td>ncurses</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-9234" target="_blank">CVE-2018-9234</a>
</td>
<td>gnupg2</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://rhn.redhat.com/errata/RHSA-2018-0913.html" target="_blank">RHSA-2018:0913</a>
</td>
<td>policycoreutils</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>2.5-22.el7</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2018-1113" target="_blank">CVE-2018-1113</a>
</td>
<td>setup</td>
<td><span class="severity low">low</span></td>
<td><span>3</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2015-2059" target="_blank">CVE-2015-2059</a>
</td>
<td>libidn</td>
<td><span class="severity low">low</span></td>
<td><span>2.6</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2014-5270" target="_blank">CVE-2014-5270</a>
</td>
<td>libgcrypt</td>
<td><span class="severity medium">medium</span></td>
<td><span>1.9</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2015-0837" target="_blank">CVE-2015-0837</a>
</td>
<td>libgcrypt</td>
<td><span class="severity low">low</span></td>
<td><span>1.2</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2014-3591" target="_blank">CVE-2014-3591</a>
</td>
<td>libgcrypt</td>
<td><span class="severity low">low</span></td>
<td><span>1.2</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2014-3591" target="_blank">CVE-2014-3591</a>
</td>
<td>gnupg2</td>
<td><span class="severity low">low</span></td>
<td><span>1.2</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2015-0837" target="_blank">CVE-2015-0837</a>
</td>
<td>gnupg2</td>
<td><span class="severity low">low</span></td>
<td><span>1.2</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2014-4043" target="_blank">CVE-2014-4043</a>
</td>
<td>glibc</td>
<td><span class="severity low">low</span></td>
<td><span>1</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2014-6278" target="_blank">CVE-2014-6278</a>
</td>
<td>bash</td>
<td><span class="severity negligible">negligible</span></td>
<td><span>0</span></td>
<td>None</td>
</tr>
<tr>
<td>
<a href="https://access.redhat.com/security/cve/CVE-2014-6277" target="_blank">CVE-2014-6277</a>
</td>
<td>bash</td>
<td><span class="severity negligible">negligible</span></td>
<td><span>0</span></td>
<td>None</td>
</tr>
</tr>
</tbody>
</table>
</div>
</div>
</div>
</main>
</body>
</html>
| 81,264 | Common Lisp | .l | 1,636 | 32.298289 | 9,990 | 0.518243 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 410341537478e3106e8fffb64400d9b9199e8532df0a5aeaec198035608a0711 | 4,214 | [
-1
] |
4,215 | report.html | atgreen_red-light-green-light/test/report.html | <?xml version="1.0"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--
Color mapping
Result enumeration
Class |t|f|u|e|na|ne|
compliance |G|R|B|Y|- |- |
inventory |-|-|B|Y|- |- |
misc |-|-|B|Y|- |- |
patch |R|G|B|Y|- |- |
vuln |R|G|B|Y|- |- |
R = red
G = green
B = blue
Y = yellow
- = grey
-->
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<title>OVAL Results</title>
<style type="text/css">
table { border: 1px solid #000000; width: 100%; border-spacing: 0px; margin: 2px 0px;}
.noborder {border: none;}
.nomargin {margin: 0px;}
td { padding: 0px 4px 1px 4px;}
.SmallLabel { font-family: Geneva, Arial, Helvetica, sans-serif; color: #000000; font-size: 9pt; font-weight: bold; white-space: nowrap;}
.SmallText { font-family: Geneva, Arial, Helvetica, sans-serif; color: #000000; font-size: 9pt;}
.Label { font-family: Geneva, Arial, Helvetica, sans-serif; color: #000000; font-size: 10pt; font-weight: bold; white-space: nowrap;}
.TitleLabel { font-family: Geneva, Arial, Helvetica, sans-serif; color: #ffffff; font-size: 10pt; font-weight: bold; white-space: nowrap;}
.Text { font-family: Geneva, Arial, Helvetica, sans-serif; color: #000000; font-size: 10pt;}
.Title { color: #FFFFFF; background-color: #706c60; padding: 0px 4px 1px 4px; font-size: 10pt; border-bottom: 1px solid #000000;}
.Center { text-align: center;}
a { color:#676c63;}
a.Hover:hover { color:#7b0e0e; text-decoration:underline;}
.LightRow { background-color: #FFFFFF;}
.DarkRow { background-color: #DDDDD8;}
.resultbadA{background-color: #FFBC8F;}
.resultbadB{background-color: #FFE0CC;}
.resultgoodA{background-color: #ACD685;}
.resultgoodB{background-color: #CBE6B3;}
.unknownA{background-color: #AEC8E0;}
.unknownB{background-color: #DAE6F1;}
.errorA{background-color: #FFDD75;}
.errorB{background-color: #FFECB3;}
.otherA{background-color: #EEEEEE;}
.otherB{background-color: #FFFFFF;}
.Classcompliance{background-color: #93C572;}
.Classinventory{background-color: #AEC6CF;}
.Classmiscellaneous{background-color: #9966CC;}
.Classpatch{background-color: #FFDD75;}
.Classvulnerability{background-color: #FF9966;}
.ColorBox{width: 2px;}
</style>
</head>
<body>
<table class="noborder nomargin">
<tr>
<td width="50%">
<table border="1">
<tr class="Title">
<td class="TitleLabel" colspan="5">OVAL Results Generator Information</td>
</tr>
<tr class="DarkRow Center">
<td class="SmallLabel">Schema Version</td>
<td class="SmallLabel">Product Name</td>
<td class="SmallLabel">Product Version</td>
<td class="SmallLabel">Date</td>
<td class="SmallLabel">Time</td>
</tr>
<tr class="LightRow">
<td class="SmallText">5.10</td>
<td class="SmallText">cpe:/a:open-scap:oscap</td>
<td class="SmallText">1.2.17</td>
<td class="SmallText">2018-11-26</td>
<td class="SmallText">07:45:13</td>
</tr>
<tr class="DarkRow Center">
<td class="SmallLabel" style="width: 20%;" title="Non-Compliant/Vulnerable/Unpatched">#✕</td>
<td class="SmallLabel" style="width: 20%;" title="Compliant/Non-Vulnerable/Patched">#✓</td>
<td class="SmallLabel" style="width: 20%;" title="Error">#Error</td>
<td class="SmallLabel" style="width: 20%;" title="Unknown">#Unknown</td>
<td class="SmallLabel" style="width: 20%;" title="Inventory/Miscellaneous class, or Not Applicable/Not Evaluated result">#Other</td>
</tr>
<tr class="LightRow Center" style="height:auto;">
<td class="SmallText resultbadB" title="Non-Compliant/Vulnerable/Unpatched" style="width:20%">2</td>
<td class="SmallText resultgoodB" title="Compliant/Non-Vulnerable/Patched" style="width:20%">699</td>
<td class="SmallText errorB" title="Error" style="width:20%">0</td>
<td class="SmallText unknownB" title="Unknown" style="width:20%">0</td>
<td class="SmallText otherB" title="Inventory/Miscellaneous class, or Not Applicable/Not Evaluated result" style="width:20%">0</td>
</tr>
</table>
</td>
<td width="50%">
<table border="1">
<tr class="Title">
<td class="TitleLabel" colspan="5">OVAL Definition Generator Information</td>
</tr>
<tr class="DarkRow Center">
<td class="SmallLabel">Schema Version</td>
<td class="SmallLabel">Product Name</td>
<td class="SmallLabel">Product Version</td>
<td class="SmallLabel">Date</td>
<td class="SmallLabel">Time</td>
</tr>
<tr class="LightRow">
<td class="SmallText">5.10</td>
<td class="SmallText">Red Hat OVAL Patch Definition Merger</td>
<td class="SmallText">3</td>
<td class="SmallText">2018-11-09</td>
<td class="SmallText">14:08:13</td>
</tr>
<tr class="DarkRow Center">
<td class="SmallLabel" style="width: 20%;">#Definitions</td>
<td class="SmallLabel" style="width: 20%;">#Tests</td>
<td class="SmallLabel" style="width: 20%;">#Objects</td>
<td class="SmallLabel" style="width: 20%;">#States</td>
<td class="SmallLabel" style="width: 20%;">#Variables</td>
</tr>
<tr class="LightRow Center">
<td class="SmallText Center">701 Total<br /><table class="noborder"><tr class="Center"><td class="SmallText Classcompliance" title="compliance" style="width:20%">0</td><td class="SmallText Classinventory" title="inventory" style="width:20%">0</td><td class="SmallText Classmiscellaneous" title="miscellaneous" style="width:20%">0</td><td class="SmallText Classpatch" title="patch" style="width:20%">701</td><td class="SmallText Classvulnerability" title="vulnerability" style="width:20%">0</td></tr></table></td>
<td class="SmallText Center">10025</td>
<td class="SmallText Center">2003</td>
<td class="SmallText Center">2248</td>
<td class="SmallText Center">0</td>
</tr>
</table>
</td>
</tr>
</table>
<hr />
<a class="Hover" name="a_1" id="a_1" style="text-decoration:none;"></a>
<table border="1">
<tr class="Title">
<td class="TitleLabel" colspan="2">System Information</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">Host Name</td>
<td class="Text" width="80%">h0.labdroid.net</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">Operating System</td>
<td class="Text" width="80%">Linux</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">Operating System Version</td>
<td class="Text" width="80%">#1 SMP Thu Oct 4 20:48:51 UTC 2018</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">Architecture</td>
<td class="Text" width="80%">x86_64</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">Interfaces</td>
<td width="80%">
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">lo</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">127.0.0.1</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">00:00:00:00:00:00</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">enp0s25</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">192.168.1.2</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">54:EE:75:10:78:9A</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">docker0</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">172.17.0.1</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">02:42:22:1D:0F:24</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">tun0</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">10.128.0.1</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">8E:20:D3:C3:7A:6F</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">lo</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">::1</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">00:00:00:00:00:00</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">enp0s25</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::3cf9:d42f:8e38:959</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">54:EE:75:10:78:9A</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">vxlan_sys_4789</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::2477:bff:fe7b:6097</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">26:77:0B:7B:60:97</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">tun0</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::8c20:d3ff:fec3:7a6f</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">8E:20:D3:C3:7A:6F</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth55113e9b</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::5c29:18ff:fed4:131c</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">5E:29:18:D4:13:1C</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth346a0feb</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::2c29:bff:fee3:c2f7</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">2E:29:0B:E3:C2:F7</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth8f39b976</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::9441:cbff:fee7:50db</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">96:41:CB:E7:50:DB</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth9ed4d7e3</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::801f:b0ff:fe9a:f371</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">82:1F:B0:9A:F3:71</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">vethe5d572be</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::406b:54ff:fed1:3d12</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">42:6B:54:D1:3D:12</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">vethe4cd63ef</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::f47a:32ff:fe43:1b0</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">F6:7A:32:43:01:B0</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth6933ae50</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::4c18:39ff:fe4e:b651</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">4E:18:39:4E:B6:51</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth0869c1da</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::84c9:1bff:feb2:3b1c</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">86:C9:1B:B2:3B:1C</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth63608d9a</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::c8a7:c5ff:fee4:b6cc</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">CA:A7:C5:E4:B6:CC</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">vetha3286d0f</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::c811:6bff:fe96:3436</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">CA:11:6B:96:34:36</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">vetha8ed389e</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::1c21:a3ff:fe61:ee0d</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">1E:21:A3:61:EE:0D</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth05912159</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::863:60ff:fed2:e2c4</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">0A:63:60:D2:E2:C4</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">vethd1db64d2</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::20a6:86ff:fef9:6200</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">22:A6:86:F9:62:00</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth28f048a6</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::1464:14ff:fee4:b734</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">16:64:14:E4:B7:34</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth55b4df32</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::4808:c0ff:fe1c:b344</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">4A:08:C0:1C:B3:44</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth7a816eb9</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::b426:5aff:fe23:f9f7</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">B6:26:5A:23:F9:F7</td>
</tr>
</table>
<table border="1">
<tr class="LightRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth0e3ee378</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::f4ac:28ff:fe78:af9e</td>
</tr>
<tr class="LightRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">F6:AC:28:78:AF:9E</td>
</tr>
</table>
<table border="1">
<tr class="DarkRow">
<td class="Label" width="20%">Interface Name</td>
<td class="Text" width="80%">veth941e9f86</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">IP Address</td>
<td class="Text" width="80%">fe80::4055:2ff:fedf:c32b</td>
</tr>
<tr class="DarkRow">
<td class="Label" width="20%">MAC Address</td>
<td class="Text" width="80%">42:55:02:DF:C3:2B</td>
</tr>
</table>
</td>
</tr>
</table>
<table border="1">
<tr class="Title">
<td class="TitleLabel" colspan="5">OVAL System Characteristics Generator Information</td>
</tr>
<tr class="DarkRow Center">
<td class="SmallLabel">Schema Version</td>
<td class="SmallLabel">Product Name</td>
<td class="SmallLabel">Product Version</td>
<td class="SmallLabel">Date</td>
<td class="SmallLabel">Time</td>
</tr>
<tr class="LightRow">
<td class="SmallText">5.10</td>
<td class="SmallText">cpe:/a:open-scap:oscap</td>
<td class="SmallText">3</td>
<td class="SmallText">2018-11-26</td>
<td class="SmallText">07:45:12</td>
</tr>
</table>
<table border="1">
<tr class="Title">
<td class="TitleLabel" colspan="5">OVAL Definition Results</td>
</tr>
<tr class="DarkRow">
<td colspan="5">
<table class="noborder nomargin" style="width:auto;">
<tr>
<td>
<table border="1">
<tr class="LightRow">
<td class="resultbadA ColorBox"></td>
<td class="resultbadB ColorBox"></td>
<td class="Text" title="Non-Compliant/Vulnerable/Unpatched">✕</td>
</tr>
</table>
</td>
<td>
<table border="1">
<tr class="LightRow">
<td class="resultgoodA ColorBox"></td>
<td class="resultgoodB ColorBox"></td>
<td class="Text" title="Compliant/Non-Vulnerable/Patched">✓</td>
</tr>
</table>
</td>
<td>
<table border="1">
<tr class="LightRow">
<td class="errorA ColorBox"></td>
<td class="errorB ColorBox"></td>
<td class="Text">Error</td>
</tr>
</table>
</td>
<td>
<table border="1">
<tr class="LightRow">
<td class="unknownA ColorBox"></td>
<td class="unknownB ColorBox"></td>
<td class="Text">Unknown</td>
</tr>
</table>
</td>
<td>
<table border="1">
<tr class="LightRow">
<td class="DarkRow ColorBox"></td>
<td class="LightRow ColorBox"></td>
<td class="Text" title="Inventory/Miscellaneous class, or Not Applicable/Not Evaluated result">Other</td>
</tr>
</table>
</td>
</tr>
</table>
</td>
</tr>
<tr class="TitleLabel">
<td class="Title" align="center">ID</td>
<td class="Title" align="center">Result</td>
<td class="Title" align="center">Class</td>
<td class="Title" align="center">Reference ID</td>
<td class="Title" align="center">Title</td>
</tr>
<tr class="resultbadA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183083</td>
<td class="Text" align="center">true</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3083">RHSA-2018:3083-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8830">CVE-2015-8830</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4913">CVE-2016-4913</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0861">CVE-2017-0861</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10661">CVE-2017-10661</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17805">CVE-2017-17805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18208">CVE-2017-18208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18232">CVE-2017-18232</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18344">CVE-2017-18344</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1092">CVE-2018-1092</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1094">CVE-2018-1094</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1118">CVE-2018-1118</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1120">CVE-2018-1120</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1130">CVE-2018-1130</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5344">CVE-2018-5344</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5391">CVE-2018-5391</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5803">CVE-2018-5803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5848">CVE-2018-5848</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7740">CVE-2018-7740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7757">CVE-2018-7757</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8781">CVE-2018-8781</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10322">CVE-2018-10322</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10878">CVE-2018-10878</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10879">CVE-2018-10879</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10881">CVE-2018-10881</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10883">CVE-2018-10883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10902">CVE-2018-10902</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10940">CVE-2018-10940</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-13405">CVE-2018-13405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000026">CVE-2018-1000026</a>]</td>
<td class="Text">RHSA-2018:3083: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultbadB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182748</td>
<td class="Text" align="center">true</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2748">RHSA-2018:2748-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14634">CVE-2018-14634</a>]</td>
<td class="Text">RHSA-2018:2748: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183532</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3532">RHSA-2018:3532-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12389">CVE-2018-12389</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12390">CVE-2018-12390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12392">CVE-2018-12392</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12393">CVE-2018-12393</a>]</td>
<td class="Text">RHSA-2018:3532: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183521</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3521">RHSA-2018:3521-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3136">CVE-2018-3136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3139">CVE-2018-3139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3149">CVE-2018-3149</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3150">CVE-2018-3150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3169">CVE-2018-3169</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3180">CVE-2018-3180</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3183">CVE-2018-3183</a>]</td>
<td class="Text">RHSA-2018:3521: java-11-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183458</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3458">RHSA-2018:3458-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16541">CVE-2017-16541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12376">CVE-2018-12376</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12377">CVE-2018-12377</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12378">CVE-2018-12378</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12379">CVE-2018-12379</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12383">CVE-2018-12383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12385">CVE-2018-12385</a>]</td>
<td class="Text">RHSA-2018:3458: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183410</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3410">RHSA-2018:3410-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14665">CVE-2018-14665</a>]</td>
<td class="Text">RHSA-2018:3410: xorg-x11-server security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183408</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3408">RHSA-2018:3408-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-17456">CVE-2018-17456</a>]</td>
<td class="Text">RHSA-2018:3408: git security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183350</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3350">RHSA-2018:3350-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3136">CVE-2018-3136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3139">CVE-2018-3139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3149">CVE-2018-3149</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3169">CVE-2018-3169</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3180">CVE-2018-3180</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3214">CVE-2018-3214</a>]</td>
<td class="Text">RHSA-2018:3350: java-1.7.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183347</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3347">RHSA-2018:3347-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000805">CVE-2018-1000805</a>]</td>
<td class="Text">RHSA-2018:3347: python-paramiko security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183335</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3335">RHSA-2018:3335-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4463">CVE-2016-4463</a>]</td>
<td class="Text">RHSA-2018:3335: xerces-c security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183327</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3327">RHSA-2018:3327-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14679">CVE-2018-14679</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14680">CVE-2018-14680</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14681">CVE-2018-14681</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14682">CVE-2018-14682</a>]</td>
<td class="Text">RHSA-2018:3327: libmspack security update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183324</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3324">RHSA-2018:3324-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10906">CVE-2018-10906</a>]</td>
<td class="Text">RHSA-2018:3324: fuse security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183253</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3253">RHSA-2018:3253-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9396">CVE-2016-9396</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000050">CVE-2017-1000050</a>]</td>
<td class="Text">RHSA-2018:3253: jasper security update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183249</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3249">RHSA-2018:3249-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1113">CVE-2018-1113</a>]</td>
<td class="Text">RHSA-2018:3249: setup security and bug fix update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183246</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3246">RHSA-2018:3246-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18198">CVE-2017-18198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18199">CVE-2017-18199</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18201">CVE-2017-18201</a>]</td>
<td class="Text">RHSA-2018:3246: libcdio security update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183242</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3242">RHSA-2018:3242-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10911">CVE-2018-10911</a>]</td>
<td class="Text">RHSA-2018:3242: glusterfs security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183229</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3229">RHSA-2018:3229-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7725">CVE-2018-7725</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7726">CVE-2018-7726</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7727">CVE-2018-7727</a>]</td>
<td class="Text">RHSA-2018:3229: zziplib security update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183221</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3221">RHSA-2018:3221-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3735">CVE-2017-3735</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0495">CVE-2018-0495</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0732">CVE-2018-0732</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0737">CVE-2018-0737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0739">CVE-2018-0739</a>]</td>
<td class="Text">RHSA-2018:3221: openssl security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183158</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3158">RHSA-2018:3158-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10852">CVE-2018-10852</a>]</td>
<td class="Text">RHSA-2018:3158: sssd security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183157</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3157">RHSA-2018:3157-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000007">CVE-2018-1000007</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000120">CVE-2018-1000120</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000121">CVE-2018-1000121</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000122">CVE-2018-1000122</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000301">CVE-2018-1000301</a>]</td>
<td class="Text">RHSA-2018:3157: curl and nss-pem security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183140</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3140">RHSA-2018:3140-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18267">CVE-2017-18267</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10733">CVE-2018-10733</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10767">CVE-2018-10767</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10768">CVE-2018-10768</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12910">CVE-2018-12910</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-13988">CVE-2018-13988</a>]</td>
<td class="Text">RHSA-2018:3140: GNOME security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183127</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3127">RHSA-2018:3127-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14648">CVE-2018-14648</a>]</td>
<td class="Text">RHSA-2018:3127: 389-ds-base security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183113</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3113">RHSA-2018:3113-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6764">CVE-2018-6764</a>]</td>
<td class="Text">RHSA-2018:3113: libvirt security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183107</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3107">RHSA-2018:3107-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14526">CVE-2018-14526</a>]</td>
<td class="Text">RHSA-2018:3107: wpa_supplicant security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183096</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3096">RHSA-2018:3096-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8830">CVE-2015-8830</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4913">CVE-2016-4913</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0861">CVE-2017-0861</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10661">CVE-2017-10661</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17805">CVE-2017-17805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18208">CVE-2017-18208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18232">CVE-2017-18232</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18344">CVE-2017-18344</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1092">CVE-2018-1092</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1094">CVE-2018-1094</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1118">CVE-2018-1118</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1120">CVE-2018-1120</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1130">CVE-2018-1130</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5344">CVE-2018-5344</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5391">CVE-2018-5391</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5803">CVE-2018-5803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5848">CVE-2018-5848</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7740">CVE-2018-7740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7757">CVE-2018-7757</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8781">CVE-2018-8781</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10322">CVE-2018-10322</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10878">CVE-2018-10878</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10879">CVE-2018-10879</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10881">CVE-2018-10881</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10883">CVE-2018-10883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10902">CVE-2018-10902</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10940">CVE-2018-10940</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-13405">CVE-2018-13405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000026">CVE-2018-1000026</a>]</td>
<td class="Text">RHSA-2018:3096: kernel-rt security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183092</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3092">RHSA-2018:3092-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16997">CVE-2017-16997</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6485">CVE-2018-6485</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11236">CVE-2018-11236</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11237">CVE-2018-11237</a>]</td>
<td class="Text">RHSA-2018:3092: glibc security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183090</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3090">RHSA-2018:3090-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0739">CVE-2018-0739</a>]</td>
<td class="Text">RHSA-2018:3090: ovmf security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183073</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3073">RHSA-2018:3073-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-10071">CVE-2014-10071</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-10072">CVE-2014-10072</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18205">CVE-2017-18205</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18206">CVE-2017-18206</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1071">CVE-2018-1071</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1083">CVE-2018-1083</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1100">CVE-2018-1100</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7549">CVE-2018-7549</a>]</td>
<td class="Text">RHSA-2018:3073: zsh security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183071</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3071">RHSA-2018:3071-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5729">CVE-2018-5729</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5730">CVE-2018-5730</a>]</td>
<td class="Text">RHSA-2018:3071: krb5 security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183065</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3065">RHSA-2018:3065-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5800">CVE-2018-5800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5801">CVE-2018-5801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5802">CVE-2018-5802</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5805">CVE-2018-5805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5806">CVE-2018-5806</a>]</td>
<td class="Text">RHSA-2018:3065: libkdcraw security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183062</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3062">RHSA-2018:3062-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15124">CVE-2017-15124</a>]</td>
<td class="Text">RHSA-2018:3062: qemu-kvm-ma security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183059</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3059">RHSA-2018:3059-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-9262">CVE-2015-9262</a>]</td>
<td class="Text">RHSA-2018:3059: X.org X11 security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183056</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3056">RHSA-2018:3056-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1050">CVE-2018-1050</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1139">CVE-2018-1139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10858">CVE-2018-10858</a>]</td>
<td class="Text">RHSA-2018:3056: samba security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183054</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3054">RHSA-2018:3054-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10119">CVE-2018-10119</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10120">CVE-2018-10120</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10583">CVE-2018-10583</a>]</td>
<td class="Text">RHSA-2018:3054: libreoffice security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183052</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3052">RHSA-2018:3052-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-0494">CVE-2018-0494</a>]</td>
<td class="Text">RHSA-2018:3052: wget security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183050</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3050">RHSA-2018:3050-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10844">CVE-2018-10844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10845">CVE-2018-10845</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10846">CVE-2018-10846</a>]</td>
<td class="Text">RHSA-2018:3050: gnutls security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183041</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3041">RHSA-2018:3041-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1060">CVE-2018-1060</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1061">CVE-2018-1061</a>]</td>
<td class="Text">RHSA-2018:3041: python security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183032</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3032">RHSA-2018:3032-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7208">CVE-2018-7208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7568">CVE-2018-7568</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7569">CVE-2018-7569</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7642">CVE-2018-7642</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7643">CVE-2018-7643</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8945">CVE-2018-8945</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10372">CVE-2018-10372</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10373">CVE-2018-10373</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10534">CVE-2018-10534</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10535">CVE-2018-10535</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-13033">CVE-2018-13033</a>]</td>
<td class="Text">RHSA-2018:3032: binutils security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20183005</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:3005">RHSA-2018:3005-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12389">CVE-2018-12389</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12390">CVE-2018-12390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12392">CVE-2018-12392</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12393">CVE-2018-12393</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12395">CVE-2018-12395</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12396">CVE-2018-12396</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12397">CVE-2018-12397</a>]</td>
<td class="Text">RHSA-2018:3005: firefox security and bug fix update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182942</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2942">RHSA-2018:2942-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3136">CVE-2018-3136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3139">CVE-2018-3139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3149">CVE-2018-3149</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3169">CVE-2018-3169</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3180">CVE-2018-3180</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3183">CVE-2018-3183</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3214">CVE-2018-3214</a>]</td>
<td class="Text">RHSA-2018:2942: java-1.8.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182921</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2921">RHSA-2018:2921-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1336">CVE-2018-1336</a>]</td>
<td class="Text">RHSA-2018:2921: tomcat security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182918</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2918">RHSA-2018:2918-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10194">CVE-2018-10194</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-15910">CVE-2018-15910</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-16509">CVE-2018-16509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-16542">CVE-2018-16542</a>]</td>
<td class="Text">RHSA-2018:2918: ghostscript security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182916</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2916">RHSA-2018:2916-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15705">CVE-2017-15705</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11781">CVE-2018-11781</a>]</td>
<td class="Text">RHSA-2018:2916: spamassassin security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182884</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2884">RHSA-2018:2884-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12386">CVE-2018-12386</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12387">CVE-2018-12387</a>]</td>
<td class="Text">RHSA-2018:2884: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182835</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2835">RHSA-2018:2835-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12383">CVE-2018-12383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12385">CVE-2018-12385</a>]</td>
<td class="Text">RHSA-2018:2835: firefox security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182768</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2768">RHSA-2018:2768-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12384">CVE-2018-12384</a>]</td>
<td class="Text">RHSA-2018:2768: nss security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182766</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2766">RHSA-2018:2766-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6560">CVE-2018-6560</a>]</td>
<td class="Text">RHSA-2018:2766: flatpak security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182763</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2763">RHSA-2018:2763-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14634">CVE-2018-14634</a>]</td>
<td class="Text">RHSA-2018:2763: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182762</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2762">RHSA-2018:2762-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11806">CVE-2018-11806</a>]</td>
<td class="Text">RHSA-2018:2762: qemu-kvm-ma security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182757</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2757">RHSA-2018:2757-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10850">CVE-2018-10850</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10935">CVE-2018-10935</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14624">CVE-2018-14624</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14638">CVE-2018-14638</a>]</td>
<td class="Text">RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182731</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2731">RHSA-2018:2731-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10873">CVE-2018-10873</a>]</td>
<td class="Text">RHSA-2018:2731: spice and spice-gtk security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182692</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2692">RHSA-2018:2692-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16541">CVE-2017-16541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12376">CVE-2018-12376</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12377">CVE-2018-12377</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12378">CVE-2018-12378</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12379">CVE-2018-12379</a>]</td>
<td class="Text">RHSA-2018:2692: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182570</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2570">RHSA-2018:2570-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5740">CVE-2018-5740</a>]</td>
<td class="Text">RHSA-2018:2570: bind security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182557</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2557">RHSA-2018:2557-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10915">CVE-2018-10915</a>]</td>
<td class="Text">RHSA-2018:2557: postgresql security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182526</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2526">RHSA-2018:2526-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14354">CVE-2018-14354</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14357">CVE-2018-14357</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-14362">CVE-2018-14362</a>]</td>
<td class="Text">RHSA-2018:2526: mutt security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182462</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2462">RHSA-2018:2462-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7550">CVE-2018-7550</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11806">CVE-2018-11806</a>]</td>
<td class="Text">RHSA-2018:2462: qemu-kvm security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182439</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2439">RHSA-2018:2439-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3636">CVE-2017-3636</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3641">CVE-2017-3641</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3651">CVE-2017-3651</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3653">CVE-2017-3653</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10268">CVE-2017-10268</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10378">CVE-2017-10378</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10379">CVE-2017-10379</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10384">CVE-2017-10384</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2562">CVE-2018-2562</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2622">CVE-2018-2622</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2640">CVE-2018-2640</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2665">CVE-2018-2665</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2668">CVE-2018-2668</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2755">CVE-2018-2755</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2761">CVE-2018-2761</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2767">CVE-2018-2767</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2771">CVE-2018-2771</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2781">CVE-2018-2781</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2813">CVE-2018-2813</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2817">CVE-2018-2817</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2819">CVE-2018-2819</a>]</td>
<td class="Text">RHSA-2018:2439: mariadb security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182395</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2395">RHSA-2018:2395-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13215">CVE-2017-13215</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3620">CVE-2018-3620</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3646">CVE-2018-3646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3693">CVE-2018-3693</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5390">CVE-2018-5390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7566">CVE-2018-7566</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10675">CVE-2018-10675</a>]</td>
<td class="Text">RHSA-2018:2395: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182384</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2384">RHSA-2018:2384-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13215">CVE-2017-13215</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3620">CVE-2018-3620</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3646">CVE-2018-3646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3693">CVE-2018-3693</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5390">CVE-2018-5390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7566">CVE-2018-7566</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10675">CVE-2018-10675</a>]</td>
<td class="Text">RHSA-2018:2384: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182286</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2286">RHSA-2018:2286-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2952">CVE-2018-2952</a>]</td>
<td class="Text">RHSA-2018:2286: java-1.7.0-openjdk security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182285</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2285">RHSA-2018:2285-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-10897">CVE-2018-10897</a>]</td>
<td class="Text">RHSA-2018:2285: yum-utils security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182252</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2252">RHSA-2018:2252-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5188">CVE-2018-5188</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12359">CVE-2018-12359</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12360">CVE-2018-12360</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12362">CVE-2018-12362</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12363">CVE-2018-12363</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12364">CVE-2018-12364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12365">CVE-2018-12365</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12366">CVE-2018-12366</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12372">CVE-2018-12372</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12373">CVE-2018-12373</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12374">CVE-2018-12374</a>]</td>
<td class="Text">RHSA-2018:2252: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182242</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2242">RHSA-2018:2242-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2952">CVE-2018-2952</a>]</td>
<td class="Text">RHSA-2018:2242: java-1.8.0-openjdk security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182240</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2240">RHSA-2018:2240-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17833">CVE-2017-17833</a>]</td>
<td class="Text">RHSA-2018:2240: openslp security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182181</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2181">RHSA-2018:2181-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12020">CVE-2018-12020</a>]</td>
<td class="Text">RHSA-2018:2181: gnupg2 security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182123</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2123">RHSA-2018:2123-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2183">CVE-2016-2183</a>]</td>
<td class="Text">RHSA-2018:2123: python security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182113</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2113">RHSA-2018:2113-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7762">CVE-2017-7762</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5156">CVE-2018-5156</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5188">CVE-2018-5188</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6126">CVE-2018-6126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12359">CVE-2018-12359</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12360">CVE-2018-12360</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12362">CVE-2018-12362</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12363">CVE-2018-12363</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12364">CVE-2018-12364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12365">CVE-2018-12365</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-12366">CVE-2018-12366</a>]</td>
<td class="Text">RHSA-2018:2113: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182003</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2003">RHSA-2018:2003-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11600">CVE-2017-11600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td>
<td class="Text">RHSA-2018:2003: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20182001</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:2001">RHSA-2018:2001-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td>
<td class="Text">RHSA-2018:2001: qemu-kvm security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181997</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1997">RHSA-2018:1997-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td>
<td class="Text">RHSA-2018:1997: libvirt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181979</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1979">RHSA-2018:1979-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1080">CVE-2018-1080</a>]</td>
<td class="Text">RHSA-2018:1979: pki-core security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181965</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1965">RHSA-2018:1965-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11600">CVE-2017-11600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td>
<td class="Text">RHSA-2018:1965: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181957</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1957">RHSA-2018:1957-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-11235">CVE-2018-11235</a>]</td>
<td class="Text">RHSA-2018:1957: git security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181944</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1944">RHSA-2018:1944-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3665">CVE-2018-3665</a>]</td>
<td class="Text">RHSA-2018:1944: kernel-rt security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181852</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1852">RHSA-2018:1852-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3665">CVE-2018-3665</a>]</td>
<td class="Text">RHSA-2018:1852: kernel security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181836</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1836">RHSA-2018:1836-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1002200">CVE-2018-1002200</a>]</td>
<td class="Text">RHSA-2018:1836: plexus-archiver security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181780</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1780">RHSA-2018:1780-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5003">CVE-2016-5003</a>]</td>
<td class="Text">RHSA-2018:1780: xmlrpc security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181725</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1725">RHSA-2018:1725-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5150">CVE-2018-5150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5154">CVE-2018-5154</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5155">CVE-2018-5155</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5159">CVE-2018-5159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5161">CVE-2018-5161</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5162">CVE-2018-5162</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5168">CVE-2018-5168</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5170">CVE-2018-5170</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5178">CVE-2018-5178</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5183">CVE-2018-5183</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5184">CVE-2018-5184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5185">CVE-2018-5185</a>]</td>
<td class="Text">RHSA-2018:1725: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181700</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1700">RHSA-2018:1700-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1124">CVE-2018-1124</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1126">CVE-2018-1126</a>]</td>
<td class="Text">RHSA-2018:1700: procps-ng security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181649</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1649">RHSA-2018:1649-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td>
<td class="Text">RHSA-2018:1649: java-1.8.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181648</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1648">RHSA-2018:1648-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td>
<td class="Text">RHSA-2018:1648: java-1.7.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181633</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1633">RHSA-2018:1633-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td>
<td class="Text">RHSA-2018:1633: qemu-kvm security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181632</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1632">RHSA-2018:1632-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td>
<td class="Text">RHSA-2018:1632: libvirt security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181630</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1630">RHSA-2018:1630-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td>
<td class="Text">RHSA-2018:1630: kernel-rt security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181629</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1629">RHSA-2018:1629-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-3639">CVE-2018-3639</a>]</td>
<td class="Text">RHSA-2018:1629: kernel security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181453</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1453">RHSA-2018:1453-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1111">CVE-2018-1111</a>]</td>
<td class="Text">RHSA-2018:1453: dhcp security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181416</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1416">RHSA-2018:1416-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7858">CVE-2018-7858</a>]</td>
<td class="Text">RHSA-2018:1416: qemu-kvm security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181415</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1415">RHSA-2018:1415-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5150">CVE-2018-5150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5154">CVE-2018-5154</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5155">CVE-2018-5155</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5157">CVE-2018-5157</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5158">CVE-2018-5158</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5159">CVE-2018-5159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5168">CVE-2018-5168</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5178">CVE-2018-5178</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5183">CVE-2018-5183</a>]</td>
<td class="Text">RHSA-2018:1415: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181396</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1396">RHSA-2018:1396-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1064">CVE-2018-1064</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5748">CVE-2018-5748</a>]</td>
<td class="Text">RHSA-2018:1396: libvirt security and bug fix update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181380</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1380">RHSA-2018:1380-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1089">CVE-2018-1089</a>]</td>
<td class="Text">RHSA-2018:1380: 389-ds-base security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181355</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1355">RHSA-2018:1355-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16939">CVE-2017-16939</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1068">CVE-2018-1068</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1087">CVE-2018-1087</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8897">CVE-2018-8897</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000199">CVE-2018-1000199</a>]</td>
<td class="Text">RHSA-2018:1355: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181318</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1318">RHSA-2018:1318-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16939">CVE-2017-16939</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1068">CVE-2018-1068</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1087">CVE-2018-1087</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1091">CVE-2018-1091</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8897">CVE-2018-8897</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000199">CVE-2018-1000199</a>]</td>
<td class="Text">RHSA-2018:1318: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181278</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1278">RHSA-2018:1278-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2790">CVE-2018-2790</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2794">CVE-2018-2794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2795">CVE-2018-2795</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2796">CVE-2018-2796</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2797">CVE-2018-2797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2798">CVE-2018-2798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2799">CVE-2018-2799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2800">CVE-2018-2800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2814">CVE-2018-2814</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2815">CVE-2018-2815</a>]</td>
<td class="Text">RHSA-2018:1278: java-1.7.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181224</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1224">RHSA-2018:1224-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1106">CVE-2018-1106</a>]</td>
<td class="Text">RHSA-2018:1224: PackageKit security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181223</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1223">RHSA-2018:1223-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000140">CVE-2018-1000140</a>]</td>
<td class="Text">RHSA-2018:1223: librelp security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181200</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1200">RHSA-2018:1200-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000156">CVE-2018-1000156</a>]</td>
<td class="Text">RHSA-2018:1200: patch security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181191</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1191">RHSA-2018:1191-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2790">CVE-2018-2790</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2794">CVE-2018-2794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2795">CVE-2018-2795</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2796">CVE-2018-2796</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2797">CVE-2018-2797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2798">CVE-2018-2798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2799">CVE-2018-2799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2800">CVE-2018-2800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2814">CVE-2018-2814</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2815">CVE-2018-2815</a>]</td>
<td class="Text">RHSA-2018:1191: java-1.8.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181169</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1169">RHSA-2018:1169-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1084">CVE-2018-1084</a>]</td>
<td class="Text">RHSA-2018:1169: corosync security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181099</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1099">RHSA-2018:1099-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5148">CVE-2018-5148</a>]</td>
<td class="Text">RHSA-2018:1099: firefox security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181062</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1062">RHSA-2018:1062-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3672">CVE-2016-3672</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7913">CVE-2016-7913</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8633">CVE-2016-8633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7294">CVE-2017-7294</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8824">CVE-2017-8824</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9725">CVE-2017-9725</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12154">CVE-2017-12154</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12190">CVE-2017-12190</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13166">CVE-2017-13166</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13305">CVE-2017-13305</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14140">CVE-2017-14140</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15116">CVE-2017-15116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15121">CVE-2017-15121</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15126">CVE-2017-15126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15127">CVE-2017-15127</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15129">CVE-2017-15129</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15265">CVE-2017-15265</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15274">CVE-2017-15274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17448">CVE-2017-17448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17449">CVE-2017-17449</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17558">CVE-2017-17558</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18017">CVE-2017-18017</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18203">CVE-2017-18203</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18270">CVE-2017-18270</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000252">CVE-2017-1000252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000407">CVE-2017-1000407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000410">CVE-2017-1000410</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5750">CVE-2018-5750</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6927">CVE-2018-6927</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000004">CVE-2018-1000004</a>]</td>
<td class="Text">RHSA-2018:1062: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181060</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1060">RHSA-2018:1060-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1079">CVE-2018-1079</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1086">CVE-2018-1086</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000119">CVE-2018-1000119</a>]</td>
<td class="Text">RHSA-2018:1060: pcs security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181058</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1058">RHSA-2018:1058-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5146">CVE-2018-5146</a>]</td>
<td class="Text">RHSA-2018:1058: libvorbis security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20181055</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:1055">RHSA-2018:1055-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-7225">CVE-2018-7225</a>]</td>
<td class="Text">RHSA-2018:1055: libvncserver security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180998</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0998">RHSA-2018:0998-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3736">CVE-2017-3736</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3737">CVE-2017-3737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3738">CVE-2017-3738</a>]</td>
<td class="Text">RHSA-2018:0998: openssl security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180980</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0980">RHSA-2018:0980-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15906">CVE-2017-15906</a>]</td>
<td class="Text">RHSA-2018:0980: openssh security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180913</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0913">RHSA-2018:0913-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1063">CVE-2018-1063</a>]</td>
<td class="Text">RHSA-2018:0913: policycoreutils security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180878</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0878">RHSA-2018:0878-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15041">CVE-2017-15041</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15042">CVE-2017-15042</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6574">CVE-2018-6574</a>]</td>
<td class="Text">RHSA-2018:0878: golang security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180855</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0855">RHSA-2018:0855-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6462">CVE-2017-6462</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6463">CVE-2017-6463</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6464">CVE-2017-6464</a>]</td>
<td class="Text">RHSA-2018:0855: ntp security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180849</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0849">RHSA-2018:0849-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11671">CVE-2017-11671</a>]</td>
<td class="Text">RHSA-2018:0849: gcc security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180842</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0842">RHSA-2018:0842-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15131">CVE-2017-15131</a>]</td>
<td class="Text">RHSA-2018:0842: xdg-user-dirs security and bug fix update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180816</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0816">RHSA-2018:0816-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13672">CVE-2017-13672</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13711">CVE-2017-13711</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15124">CVE-2017-15124</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15268">CVE-2017-15268</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5683">CVE-2018-5683</a>]</td>
<td class="Text">RHSA-2018:0816: qemu-kvm security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180805</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0805">RHSA-2018:0805-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9402">CVE-2014-9402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5180">CVE-2015-5180</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12132">CVE-2017-12132</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15670">CVE-2017-15670</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15804">CVE-2017-15804</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000001">CVE-2018-1000001</a>]</td>
<td class="Text">RHSA-2018:0805: glibc security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180676</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0676">RHSA-2018:0676-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3672">CVE-2016-3672</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7913">CVE-2016-7913</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8633">CVE-2016-8633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7294">CVE-2017-7294</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8824">CVE-2017-8824</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9725">CVE-2017-9725</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12154">CVE-2017-12154</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12190">CVE-2017-12190</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13166">CVE-2017-13166</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13305">CVE-2017-13305</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14140">CVE-2017-14140</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15116">CVE-2017-15116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15121">CVE-2017-15121</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15126">CVE-2017-15126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15127">CVE-2017-15127</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15129">CVE-2017-15129</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15265">CVE-2017-15265</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15274">CVE-2017-15274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17448">CVE-2017-17448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17449">CVE-2017-17449</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17558">CVE-2017-17558</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18017">CVE-2017-18017</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18203">CVE-2017-18203</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000252">CVE-2017-1000252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000407">CVE-2017-1000407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000410">CVE-2017-1000410</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5750">CVE-2018-5750</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6927">CVE-2018-6927</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000004">CVE-2018-1000004</a>]</td>
<td class="Text">RHSA-2018:0676: kernel-rt security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180666</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0666">RHSA-2018:0666-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7562">CVE-2017-7562</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11368">CVE-2017-11368</a>]</td>
<td class="Text">RHSA-2018:0666: krb5 security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180648</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0648">RHSA-2018:0648-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5125">CVE-2018-5125</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5127">CVE-2018-5127</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5129">CVE-2018-5129</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5144">CVE-2018-5144</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5145">CVE-2018-5145</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5146">CVE-2018-5146</a>]</td>
<td class="Text">RHSA-2018:0648: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180592</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0592">RHSA-2018:0592-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-8088">CVE-2018-8088</a>]</td>
<td class="Text">RHSA-2018:0592: slf4j security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180549</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0549">RHSA-2018:0549-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5146">CVE-2018-5146</a>]</td>
<td class="Text">RHSA-2018:0549: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180527</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0527">RHSA-2018:0527-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5125">CVE-2018-5125</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5127">CVE-2018-5127</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5129">CVE-2018-5129</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5130">CVE-2018-5130</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5131">CVE-2018-5131</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5144">CVE-2018-5144</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5145">CVE-2018-5145</a>]</td>
<td class="Text">RHSA-2018:0527: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180505</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0505">RHSA-2018:0505-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5950">CVE-2018-5950</a>]</td>
<td class="Text">RHSA-2018:0505: mailman security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180483</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0483">RHSA-2018:0483-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5732">CVE-2018-5732</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5733">CVE-2018-5733</a>]</td>
<td class="Text">RHSA-2018:0483: dhcp security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180418</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0418">RHSA-2018:0418-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-6871">CVE-2018-6871</a>]</td>
<td class="Text">RHSA-2018:0418: libreoffice security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180414</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0414">RHSA-2018:0414-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15135">CVE-2017-15135</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1054">CVE-2018-1054</a>]</td>
<td class="Text">RHSA-2018:0414: 389-ds-base security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180412</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0412">RHSA-2018:0412-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7518">CVE-2017-7518</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12188">CVE-2017-12188</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-18270">CVE-2017-18270</a>]</td>
<td class="Text">RHSA-2018:0412: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180406</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0406">RHSA-2018:0406-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7890">CVE-2017-7890</a>]</td>
<td class="Text">RHSA-2018:0406: php security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180395</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0395">RHSA-2018:0395-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7518">CVE-2017-7518</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12188">CVE-2017-12188</a>]</td>
<td class="Text">RHSA-2018:0395: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180378</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0378">RHSA-2018:0378-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0898">CVE-2017-0898</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0899">CVE-2017-0899</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0900">CVE-2017-0900</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0901">CVE-2017-0901</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0902">CVE-2017-0902</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0903">CVE-2017-0903</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10784">CVE-2017-10784</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14033">CVE-2017-14033</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14064">CVE-2017-14064</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17405">CVE-2017-17405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-17790">CVE-2017-17790</a>]</td>
<td class="Text">RHSA-2018:0378: ruby security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180377</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0377">RHSA-2018:0377-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5379">CVE-2018-5379</a>]</td>
<td class="Text">RHSA-2018:0377: quagga security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180350</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0350">RHSA-2018:0350-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5345">CVE-2018-5345</a>]</td>
<td class="Text">RHSA-2018:0350: gcab security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180349</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0349">RHSA-2018:0349-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2579">CVE-2018-2579</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2588">CVE-2018-2588</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2599">CVE-2018-2599</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2602">CVE-2018-2602</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2603">CVE-2018-2603</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2618">CVE-2018-2618</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2629">CVE-2018-2629</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2633">CVE-2018-2633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2634">CVE-2018-2634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2637">CVE-2018-2637</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2641">CVE-2018-2641</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2663">CVE-2018-2663</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2677">CVE-2018-2677</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2678">CVE-2018-2678</a>]</td>
<td class="Text">RHSA-2018:0349: java-1.7.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180262</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0262">RHSA-2018:0262-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5089">CVE-2018-5089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5095">CVE-2018-5095</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5096">CVE-2018-5096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5097">CVE-2018-5097</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5098">CVE-2018-5098</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5099">CVE-2018-5099</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5102">CVE-2018-5102</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5103">CVE-2018-5103</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5104">CVE-2018-5104</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5117">CVE-2018-5117</a>]</td>
<td class="Text">RHSA-2018:0262: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180260</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0260">RHSA-2018:0260-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1049">CVE-2018-1049</a>]</td>
<td class="Text">RHSA-2018:0260: systemd security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180223</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0223">RHSA-2018:0223-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14604">CVE-2017-14604</a>]</td>
<td class="Text">RHSA-2018:0223: nautilus security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180163</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0163">RHSA-2018:0163-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15134">CVE-2017-15134</a>]</td>
<td class="Text">RHSA-2018:0163: 389-ds-base security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180158</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0158">RHSA-2018:0158-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3144">CVE-2017-3144</a>]</td>
<td class="Text">RHSA-2018:0158: dhcp security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180152</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0152">RHSA-2018:0152-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8539">CVE-2015-8539</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7472">CVE-2017-7472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12192">CVE-2017-12192</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12193">CVE-2017-12193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15649">CVE-2017-15649</a>]</td>
<td class="Text">RHSA-2018:0152: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180151</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0151">RHSA-2018:0151-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8539">CVE-2015-8539</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7472">CVE-2017-7472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12192">CVE-2017-12192</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12193">CVE-2017-12193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15649">CVE-2017-15649</a>]</td>
<td class="Text">RHSA-2018:0151: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180122</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0122">RHSA-2018:0122-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5089">CVE-2018-5089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5091">CVE-2018-5091</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5095">CVE-2018-5095</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5096">CVE-2018-5096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5097">CVE-2018-5097</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5098">CVE-2018-5098</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5099">CVE-2018-5099</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5102">CVE-2018-5102</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5103">CVE-2018-5103</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5104">CVE-2018-5104</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-5117">CVE-2018-5117</a>]</td>
<td class="Text">RHSA-2018:0122: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180102</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0102">RHSA-2018:0102-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3145">CVE-2017-3145</a>]</td>
<td class="Text">RHSA-2018:0102: bind security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180095</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0095">RHSA-2018:0095-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2579">CVE-2018-2579</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2582">CVE-2018-2582</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2588">CVE-2018-2588</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2599">CVE-2018-2599</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2602">CVE-2018-2602</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2603">CVE-2018-2603</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2618">CVE-2018-2618</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2629">CVE-2018-2629</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2633">CVE-2018-2633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2634">CVE-2018-2634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2637">CVE-2018-2637</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2641">CVE-2018-2641</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2663">CVE-2018-2663</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2677">CVE-2018-2677</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-2678">CVE-2018-2678</a>]</td>
<td class="Text">RHSA-2018:0095: java-1.8.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180094</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0094">RHSA-2018:0094-01</a>]</td>
<td class="Text">RHSA-2018:0094: linux-firmware security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180093</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0093">RHSA-2018:0093-01</a>]</td>
<td class="Text">RHSA-2018:0093: microcode_ctl security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180061</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0061">RHSA-2018:0061-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7829">CVE-2017-7829</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7846">CVE-2017-7846</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7847">CVE-2017-7847</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7848">CVE-2017-7848</a>]</td>
<td class="Text">RHSA-2018:0061: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180029</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0029">RHSA-2018:0029-03</a>]</td>
<td class="Text">RHSA-2018:0029: libvirt security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180023</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0023">RHSA-2018:0023-01</a>]</td>
<td class="Text">RHSA-2018:0023: qemu-kvm security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180016</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0016">RHSA-2018:0016-01</a>]</td>
<td class="Text">RHSA-2018:0016: kernel-rt security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180014</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0014">RHSA-2018:0014-01</a>]</td>
<td class="Text">RHSA-2018:0014: linux-firmware security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180012</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0012">RHSA-2018:0012-01</a>]</td>
<td class="Text">RHSA-2018:0012: microcode_ctl security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20180007</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2018:0007">RHSA-2018:0007-01</a>]</td>
<td class="Text">RHSA-2018:0007: kernel security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173402</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3402">RHSA-2017:3402-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12172">CVE-2017-12172</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15097">CVE-2017-15097</a>]</td>
<td class="Text">RHSA-2017:3402: postgresql security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173392</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3392">RHSA-2017:3392-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10193">CVE-2017-10193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10198">CVE-2017-10198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10274">CVE-2017-10274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10281">CVE-2017-10281</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10285">CVE-2017-10285</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10295">CVE-2017-10295</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10345">CVE-2017-10345</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10346">CVE-2017-10346</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10347">CVE-2017-10347</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10348">CVE-2017-10348</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10349">CVE-2017-10349</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10350">CVE-2017-10350</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10355">CVE-2017-10355</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10356">CVE-2017-10356</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10357">CVE-2017-10357</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10388">CVE-2017-10388</a>]</td>
<td class="Text">RHSA-2017:3392: java-1.7.0-openjdk security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173384</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3384">RHSA-2017:3384-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15101">CVE-2017-15101</a>]</td>
<td class="Text">RHSA-2017:3384: liblouis security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173382</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3382">RHSA-2017:3382-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7843">CVE-2017-7843</a>]</td>
<td class="Text">RHSA-2017:3382: firefox security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173379</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3379">RHSA-2017:3379-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12173">CVE-2017-12173</a>]</td>
<td class="Text">RHSA-2017:3379: sssd security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173372</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3372">RHSA-2017:3372-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7826">CVE-2017-7826</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7828">CVE-2017-7828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7830">CVE-2017-7830</a>]</td>
<td class="Text">RHSA-2017:3372: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173368</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3368">RHSA-2017:3368-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14167">CVE-2017-14167</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15289">CVE-2017-15289</a>]</td>
<td class="Text">RHSA-2017:3368: qemu-kvm security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173322</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3322">RHSA-2017:3322-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000380">CVE-2017-1000380</a>]</td>
<td class="Text">RHSA-2017:3322: kernel-rt security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173315</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3315">RHSA-2017:3315-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000380">CVE-2017-1000380</a>]</td>
<td class="Text">RHSA-2017:3315: kernel security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173270</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3270">RHSA-2017:3270-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12613">CVE-2017-12613</a>]</td>
<td class="Text">RHSA-2017:3270: apr security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173269</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3269">RHSA-2017:3269-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-16844">CVE-2017-16844</a>]</td>
<td class="Text">RHSA-2017:3269: procmail security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173263</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3263">RHSA-2017:3263-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000257">CVE-2017-1000257</a>]</td>
<td class="Text">RHSA-2017:3263: curl security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173260</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3260">RHSA-2017:3260-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14746">CVE-2017-14746</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-15275">CVE-2017-15275</a>]</td>
<td class="Text">RHSA-2017:3260: samba security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173247</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3247">RHSA-2017:3247-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7826">CVE-2017-7826</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7828">CVE-2017-7828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7830">CVE-2017-7830</a>]</td>
<td class="Text">RHSA-2017:3247: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173221</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3221">RHSA-2017:3221-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10167">CVE-2016-10167</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10168">CVE-2016-10168</a>]</td>
<td class="Text">RHSA-2017:3221: php security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173111</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3111">RHSA-2017:3111-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8184">CVE-2014-8184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13738">CVE-2017-13738</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13740">CVE-2017-13740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13741">CVE-2017-13741</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13742">CVE-2017-13742</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13743">CVE-2017-13743</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13744">CVE-2017-13744</a>]</td>
<td class="Text">RHSA-2017:3111: liblouis security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173081</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3081">RHSA-2017:3081-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5647">CVE-2017-5647</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7674">CVE-2017-7674</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12615">CVE-2017-12615</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12617">CVE-2017-12617</a>]</td>
<td class="Text">RHSA-2017:3081: tomcat security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20173075</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:3075">RHSA-2017:3075-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13089">CVE-2017-13089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13090">CVE-2017-13090</a>]</td>
<td class="Text">RHSA-2017:3075: wget security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172998</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2998">RHSA-2017:2998-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10274">CVE-2017-10274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10281">CVE-2017-10281</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10285">CVE-2017-10285</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10295">CVE-2017-10295</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10345">CVE-2017-10345</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10346">CVE-2017-10346</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10347">CVE-2017-10347</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10348">CVE-2017-10348</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10349">CVE-2017-10349</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10350">CVE-2017-10350</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10355">CVE-2017-10355</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10356">CVE-2017-10356</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10357">CVE-2017-10357</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10388">CVE-2017-10388</a>]</td>
<td class="Text">RHSA-2017:2998: java-1.8.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172931</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2931">RHSA-2017:2931-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8399">CVE-2016-8399</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7184">CVE-2017-7184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7541">CVE-2017-7541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7542">CVE-2017-7542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7558">CVE-2017-7558</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11176">CVE-2017-11176</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14106">CVE-2017-14106</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000111">CVE-2017-1000111</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000112">CVE-2017-1000112</a>]</td>
<td class="Text">RHSA-2017:2931: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172930</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2930">RHSA-2017:2930-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8399">CVE-2016-8399</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7184">CVE-2017-7184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7541">CVE-2017-7541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7542">CVE-2017-7542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7558">CVE-2017-7558</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-11176">CVE-2017-11176</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14106">CVE-2017-14106</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000111">CVE-2017-1000111</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000112">CVE-2017-1000112</a>]</td>
<td class="Text">RHSA-2017:2930: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172907</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2907">RHSA-2017:2907-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13077">CVE-2017-13077</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13078">CVE-2017-13078</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13080">CVE-2017-13080</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13082">CVE-2017-13082</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13086">CVE-2017-13086</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13087">CVE-2017-13087</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13088">CVE-2017-13088</a>]</td>
<td class="Text">RHSA-2017:2907: wpa_supplicant security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172885</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2885">RHSA-2017:2885-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7793">CVE-2017-7793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7810">CVE-2017-7810</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7814">CVE-2017-7814</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7818">CVE-2017-7818</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7819">CVE-2017-7819</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7823">CVE-2017-7823</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7824">CVE-2017-7824</a>]</td>
<td class="Text">RHSA-2017:2885: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172882</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2882">RHSA-2017:2882-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9798">CVE-2017-9798</a>]</td>
<td class="Text">RHSA-2017:2882: httpd security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172836</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2836">RHSA-2017:2836-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14491">CVE-2017-14491</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14492">CVE-2017-14492</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14493">CVE-2017-14493</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14494">CVE-2017-14494</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14495">CVE-2017-14495</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14496">CVE-2017-14496</a>]</td>
<td class="Text">RHSA-2017:2836: dnsmasq security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172832</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2832">RHSA-2017:2832-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7805">CVE-2017-7805</a>]</td>
<td class="Text">RHSA-2017:2832: nss security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172831</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2831">RHSA-2017:2831-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7793">CVE-2017-7793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7810">CVE-2017-7810</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7814">CVE-2017-7814</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7818">CVE-2017-7818</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7819">CVE-2017-7819</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7823">CVE-2017-7823</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7824">CVE-2017-7824</a>]</td>
<td class="Text">RHSA-2017:2831: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172790</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2790">RHSA-2017:2790-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12150">CVE-2017-12150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12151">CVE-2017-12151</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-12163">CVE-2017-12163</a>]</td>
<td class="Text">RHSA-2017:2790: samba security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172788</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2788">RHSA-2017:2788-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7555">CVE-2017-7555</a>]</td>
<td class="Text">RHSA-2017:2788: augeas security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172771</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2771">RHSA-2017:2771-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-14482">CVE-2017-14482</a>]</td>
<td class="Text">RHSA-2017:2771: emacs security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172728</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2728">RHSA-2017:2728-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7546">CVE-2017-7546</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7547">CVE-2017-7547</a>]</td>
<td class="Text">RHSA-2017:2728: postgresql security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172704</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2704">RHSA-2017:2704-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000251">CVE-2017-1000251</a>]</td>
<td class="Text">RHSA-2017:2704: kernel-rt security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172685</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2685">RHSA-2017:2685-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000250">CVE-2017-1000250</a>]</td>
<td class="Text">RHSA-2017:2685: bluez security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172679</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2679">RHSA-2017:2679-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000251">CVE-2017-1000251</a>]</td>
<td class="Text">RHSA-2017:2679: kernel security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172585</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2585">RHSA-2017:2585-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7533">CVE-2017-7533</a>]</td>
<td class="Text">RHSA-2017:2585: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172569</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2569">RHSA-2017:2569-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7551">CVE-2017-7551</a>]</td>
<td class="Text">RHSA-2017:2569: 389-ds-base security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172551</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2551">RHSA-2017:2551-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9775">CVE-2017-9775</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9776">CVE-2017-9776</a>]</td>
<td class="Text">RHSA-2017:2551: poppler security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172534</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2534">RHSA-2017:2534-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7753">CVE-2017-7753</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7779">CVE-2017-7779</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7784">CVE-2017-7784</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7785">CVE-2017-7785</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7786">CVE-2017-7786</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7787">CVE-2017-7787</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7791">CVE-2017-7791</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7792">CVE-2017-7792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7800">CVE-2017-7800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7801">CVE-2017-7801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7802">CVE-2017-7802</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7803">CVE-2017-7803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7807">CVE-2017-7807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7809">CVE-2017-7809</a>]</td>
<td class="Text">RHSA-2017:2534: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172492</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2492">RHSA-2017:2492-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000061">CVE-2017-1000061</a>]</td>
<td class="Text">RHSA-2017:2492: xmlsec1 security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172489</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2489">RHSA-2017:2489-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000115">CVE-2017-1000115</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000116">CVE-2017-1000116</a>]</td>
<td class="Text">RHSA-2017:2489: mercurial security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172486</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2486">RHSA-2017:2486-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3253">CVE-2015-3253</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6814">CVE-2016-6814</a>]</td>
<td class="Text">RHSA-2017:2486: groovy security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172484</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2484">RHSA-2017:2484-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000117">CVE-2017-1000117</a>]</td>
<td class="Text">RHSA-2017:2484: git security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172480</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2480">RHSA-2017:2480-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9800">CVE-2017-9800</a>]</td>
<td class="Text">RHSA-2017:2480: subversion security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172479</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2479">RHSA-2017:2479-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3167">CVE-2017-3167</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3169">CVE-2017-3169</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7668">CVE-2017-7668</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7679">CVE-2017-7679</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9788">CVE-2017-9788</a>]</td>
<td class="Text">RHSA-2017:2479: httpd security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172473</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2473">RHSA-2017:2473-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7533">CVE-2017-7533</a>]</td>
<td class="Text">RHSA-2017:2473: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172471</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2471">RHSA-2017:2471-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7506">CVE-2017-7506</a>]</td>
<td class="Text">RHSA-2017:2471: spice security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172459</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2459">RHSA-2017:2459-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2885">CVE-2017-2885</a>]</td>
<td class="Text">RHSA-2017:2459: libsoup security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172456</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2456">RHSA-2017:2456-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7753">CVE-2017-7753</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7779">CVE-2017-7779</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7784">CVE-2017-7784</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7785">CVE-2017-7785</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7786">CVE-2017-7786</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7787">CVE-2017-7787</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7791">CVE-2017-7791</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7792">CVE-2017-7792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7798">CVE-2017-7798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7800">CVE-2017-7800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7801">CVE-2017-7801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7802">CVE-2017-7802</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7803">CVE-2017-7803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7807">CVE-2017-7807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7809">CVE-2017-7809</a>]</td>
<td class="Text">RHSA-2017:2456: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172445</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2445">RHSA-2017:2445-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10664">CVE-2017-10664</a>]</td>
<td class="Text">RHSA-2017:2445: qemu-kvm security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172424</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2424">RHSA-2017:2424-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10053">CVE-2017-10053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10067">CVE-2017-10067</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10074">CVE-2017-10074</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10081">CVE-2017-10081</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10087">CVE-2017-10087</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10089">CVE-2017-10089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10090">CVE-2017-10090</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10096">CVE-2017-10096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10101">CVE-2017-10101</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10102">CVE-2017-10102</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10107">CVE-2017-10107</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10108">CVE-2017-10108</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10109">CVE-2017-10109</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10110">CVE-2017-10110</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10115">CVE-2017-10115</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10116">CVE-2017-10116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10135">CVE-2017-10135</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10243">CVE-2017-10243</a>]</td>
<td class="Text">RHSA-2017:2424: java-1.7.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172423</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2423">RHSA-2017:2423-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5645">CVE-2017-5645</a>]</td>
<td class="Text">RHSA-2017:2423: log4j security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172389</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2389">RHSA-2017:2389-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10978">CVE-2017-10978</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10983">CVE-2017-10983</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10984">CVE-2017-10984</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10985">CVE-2017-10985</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10986">CVE-2017-10986</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10987">CVE-2017-10987</a>]</td>
<td class="Text">RHSA-2017:2389: freeradius security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172388</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2388">RHSA-2017:2388-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000083">CVE-2017-1000083</a>]</td>
<td class="Text">RHSA-2017:2388: evince security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172335</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2335">RHSA-2017:2335-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7537">CVE-2017-7537</a>]</td>
<td class="Text">RHSA-2017:2335: pki-core security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172299</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2299">RHSA-2017:2299-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-0553">CVE-2017-0553</a>]</td>
<td class="Text">RHSA-2017:2299: NetworkManager and libnl3 security, bug fix and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172292</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2292">RHSA-2017:2292-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7444">CVE-2016-7444</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5334">CVE-2017-5334</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5335">CVE-2017-5335</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5336">CVE-2017-5336</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5337">CVE-2017-5337</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7507">CVE-2017-7507</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7869">CVE-2017-7869</a>]</td>
<td class="Text">RHSA-2017:2292: gnutls security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172285</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2285">RHSA-2017:2285-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7488">CVE-2017-7488</a>]</td>
<td class="Text">RHSA-2017:2285: authconfig security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172258</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2258">RHSA-2017:2258-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5884">CVE-2017-5884</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5885">CVE-2017-5885</a>]</td>
<td class="Text">RHSA-2017:2258: gtk-vnc security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172247</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2247">RHSA-2017:2247-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0762">CVE-2016-0762</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5018">CVE-2016-5018</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6794">CVE-2016-6794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6796">CVE-2016-6796</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6797">CVE-2016-6797</a>]</td>
<td class="Text">RHSA-2017:2247: tomcat security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172192</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2192">RHSA-2017:2192-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5483">CVE-2016-5483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5617">CVE-2016-5617</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6664">CVE-2016-6664</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3238">CVE-2017-3238</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3243">CVE-2017-3243</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3244">CVE-2017-3244</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3258">CVE-2017-3258</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3265">CVE-2017-3265</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3291">CVE-2017-3291</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3302">CVE-2017-3302</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3308">CVE-2017-3308</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3309">CVE-2017-3309</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3312">CVE-2017-3312</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3313">CVE-2017-3313</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3317">CVE-2017-3317</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3318">CVE-2017-3318</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3453">CVE-2017-3453</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3456">CVE-2017-3456</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3464">CVE-2017-3464</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3600">CVE-2017-3600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3651">CVE-2017-3651</a>]</td>
<td class="Text">RHSA-2017:2192: mariadb security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172180</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2180">RHSA-2017:2180-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7207">CVE-2017-7207</a>]</td>
<td class="Text">RHSA-2017:2180: ghostscript security and bug fix update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172128</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2128">RHSA-2017:2128-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7496">CVE-2015-7496</a>]</td>
<td class="Text">RHSA-2017:2128: gdm and gnome-session security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172077</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2077">RHSA-2017:2077-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7970">CVE-2014-7970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7975">CVE-2014-7975</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8839">CVE-2015-8839</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8970">CVE-2015-8970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6213">CVE-2016-6213</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7042">CVE-2016-7042</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7097">CVE-2016-7097</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8645">CVE-2016-8645</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9576">CVE-2016-9576</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9588">CVE-2016-9588</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9604">CVE-2016-9604</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9685">CVE-2016-9685</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9806">CVE-2016-9806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10088">CVE-2016-10088</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10147">CVE-2016-10147</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10200">CVE-2016-10200</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2596">CVE-2017-2596</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2647">CVE-2017-2647</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2671">CVE-2017-2671</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5551">CVE-2017-5551</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5970">CVE-2017-5970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6001">CVE-2017-6001</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6951">CVE-2017-6951</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7187">CVE-2017-7187</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7495">CVE-2017-7495</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7616">CVE-2017-7616</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7889">CVE-2017-7889</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8797">CVE-2017-8797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8890">CVE-2017-8890</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9074">CVE-2017-9074</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9075">CVE-2017-9075</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9076">CVE-2017-9076</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9077">CVE-2017-9077</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9242">CVE-2017-9242</a>]</td>
<td class="Text">RHSA-2017:2077: kernel-rt security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172060</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2060">RHSA-2017:2060-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9446">CVE-2016-9446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9810">CVE-2016-9810</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9811">CVE-2016-9811</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10198">CVE-2016-10198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10199">CVE-2016-10199</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5837">CVE-2017-5837</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5838">CVE-2017-5838</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5839">CVE-2017-5839</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5840">CVE-2017-5840</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5841">CVE-2017-5841</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5842">CVE-2017-5842</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5843">CVE-2017-5843</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5844">CVE-2017-5844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5845">CVE-2017-5845</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5848">CVE-2017-5848</a>]</td>
<td class="Text">RHSA-2017:2060: GStreamer security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172029</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2029">RHSA-2017:2029-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6210">CVE-2016-6210</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6515">CVE-2016-6515</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10009">CVE-2016-10009</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10011">CVE-2016-10011</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10012">CVE-2016-10012</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10708">CVE-2016-10708</a>]</td>
<td class="Text">RHSA-2017:2029: openssh security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172016</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2016">RHSA-2017:2016-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7167">CVE-2016-7167</a>]</td>
<td class="Text">RHSA-2017:2016: curl security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172004</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2004">RHSA-2017:2004-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9938">CVE-2014-9938</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8386">CVE-2017-8386</a>]</td>
<td class="Text">RHSA-2017:2004: git security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20172000</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:2000">RHSA-2017:2000-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10207">CVE-2016-10207</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5581">CVE-2017-5581</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7392">CVE-2017-7392</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7393">CVE-2017-7393</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7394">CVE-2017-7394</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7395">CVE-2017-7395</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7396">CVE-2017-7396</a>]</td>
<td class="Text">RHSA-2017:2000: tigervnc and fltk security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171983</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1983">RHSA-2017:1983-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7484">CVE-2017-7484</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7486">CVE-2017-7486</a>]</td>
<td class="Text">RHSA-2017:1983: postgresql security and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171975</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1975">RHSA-2017:1975-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7870">CVE-2017-7870</a>]</td>
<td class="Text">RHSA-2017:1975: libreoffice security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171950</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1950">RHSA-2017:1950-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9461">CVE-2017-9461</a>]</td>
<td class="Text">RHSA-2017:1950: samba security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171931</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1931">RHSA-2017:1931-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0634">CVE-2016-0634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7543">CVE-2016-7543</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9401">CVE-2016-9401</a>]</td>
<td class="Text">RHSA-2017:1931: bash security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171916</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1916">RHSA-2017:1916-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9761">CVE-2014-9761</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8776">CVE-2015-8776</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8777">CVE-2015-8777</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8778">CVE-2015-8778</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8779">CVE-2015-8779</a>]</td>
<td class="Text">RHSA-2017:1916: glibc security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171871</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1871">RHSA-2017:1871-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0261">CVE-2015-0261</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2153">CVE-2015-2153</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2154">CVE-2015-2154</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2155">CVE-2015-2155</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7922">CVE-2016-7922</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7923">CVE-2016-7923</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7924">CVE-2016-7924</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7925">CVE-2016-7925</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7926">CVE-2016-7926</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7927">CVE-2016-7927</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7928">CVE-2016-7928</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7929">CVE-2016-7929</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7930">CVE-2016-7930</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7931">CVE-2016-7931</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7932">CVE-2016-7932</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7933">CVE-2016-7933</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7934">CVE-2016-7934</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7935">CVE-2016-7935</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7936">CVE-2016-7936</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7937">CVE-2016-7937</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7938">CVE-2016-7938</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7939">CVE-2016-7939</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7940">CVE-2016-7940</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7973">CVE-2016-7973</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7974">CVE-2016-7974</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7975">CVE-2016-7975</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7983">CVE-2016-7983</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7984">CVE-2016-7984</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7985">CVE-2016-7985</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7986">CVE-2016-7986</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7992">CVE-2016-7992</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7993">CVE-2016-7993</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8574">CVE-2016-8574</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8575">CVE-2016-8575</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5202">CVE-2017-5202</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5203">CVE-2017-5203</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5204">CVE-2017-5204</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5205">CVE-2017-5205</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5341">CVE-2017-5341</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5342">CVE-2017-5342</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5482">CVE-2017-5482</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5483">CVE-2017-5483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5484">CVE-2017-5484</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5485">CVE-2017-5485</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5486">CVE-2017-5486</a>]</td>
<td class="Text">RHSA-2017:1871: tcpdump security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171868</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1868">RHSA-2017:1868-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9365">CVE-2014-9365</a>]</td>
<td class="Text">RHSA-2017:1868: python security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171865</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1865">RHSA-2017:1865-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10164">CVE-2016-10164</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2625">CVE-2017-2625</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2626">CVE-2017-2626</a>]</td>
<td class="Text">RHSA-2017:1865: X.org X11 libraries security, bug fix and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171860</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1860">RHSA-2017:1860-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2806">CVE-2015-2806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3622">CVE-2015-3622</a>]</td>
<td class="Text">RHSA-2017:1860: libtasn1 security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171859</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1859">RHSA-2017:1859-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8932">CVE-2017-8932</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000098">CVE-2017-1000098</a>]</td>
<td class="Text">RHSA-2017:1859: golang security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171856</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1856">RHSA-2017:1856-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4020">CVE-2016-4020</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2633">CVE-2017-2633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5898">CVE-2017-5898</a>]</td>
<td class="Text">RHSA-2017:1856: qemu-kvm security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171854</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1854">RHSA-2017:1854-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3694">CVE-2014-3694</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3695">CVE-2014-3695</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3696">CVE-2014-3696</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3698">CVE-2014-3698</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2640">CVE-2017-2640</a>]</td>
<td class="Text">RHSA-2017:1854: pidgin security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171852</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1852">RHSA-2017:1852-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9287">CVE-2017-9287</a>]</td>
<td class="Text">RHSA-2017:1852: openldap security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171842</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1842">RHSA-2017:1842-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7970">CVE-2014-7970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7975">CVE-2014-7975</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8839">CVE-2015-8839</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8970">CVE-2015-8970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6213">CVE-2016-6213</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7042">CVE-2016-7042</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7097">CVE-2016-7097</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8645">CVE-2016-8645</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9576">CVE-2016-9576</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9588">CVE-2016-9588</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9604">CVE-2016-9604</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9685">CVE-2016-9685</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9806">CVE-2016-9806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10088">CVE-2016-10088</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10147">CVE-2016-10147</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10200">CVE-2016-10200</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2596">CVE-2017-2596</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2647">CVE-2017-2647</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2671">CVE-2017-2671</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5551">CVE-2017-5551</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5970">CVE-2017-5970</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6001">CVE-2017-6001</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6951">CVE-2017-6951</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7187">CVE-2017-7187</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7495">CVE-2017-7495</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7616">CVE-2017-7616</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7889">CVE-2017-7889</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8797">CVE-2017-8797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8890">CVE-2017-8890</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9074">CVE-2017-9074</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9075">CVE-2017-9075</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9076">CVE-2017-9076</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9077">CVE-2017-9077</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9242">CVE-2017-9242</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000379">CVE-2017-1000379</a>]</td>
<td class="Text">RHSA-2017:1842: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171809</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1809">RHSA-2017:1809-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5648">CVE-2017-5648</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5664">CVE-2017-5664</a>]</td>
<td class="Text">RHSA-2017:1809: tomcat security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171793</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1793">RHSA-2017:1793-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7771">CVE-2017-7771</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7772">CVE-2017-7772</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7773">CVE-2017-7773</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7774">CVE-2017-7774</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7775">CVE-2017-7775</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7776">CVE-2017-7776</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7777">CVE-2017-7777</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7778">CVE-2017-7778</a>]</td>
<td class="Text">RHSA-2017:1793: graphite2 security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171789</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1789">RHSA-2017:1789-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10053">CVE-2017-10053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10067">CVE-2017-10067</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10074">CVE-2017-10074</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10078">CVE-2017-10078</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10081">CVE-2017-10081</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10087">CVE-2017-10087</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10089">CVE-2017-10089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10090">CVE-2017-10090</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10096">CVE-2017-10096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10101">CVE-2017-10101</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10102">CVE-2017-10102</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10107">CVE-2017-10107</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10108">CVE-2017-10108</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10109">CVE-2017-10109</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10110">CVE-2017-10110</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10111">CVE-2017-10111</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10115">CVE-2017-10115</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10116">CVE-2017-10116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10135">CVE-2017-10135</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10193">CVE-2017-10193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10198">CVE-2017-10198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-10243">CVE-2017-10243</a>]</td>
<td class="Text">RHSA-2017:1789: java-1.8.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171681</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1681">RHSA-2017:1681-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9524">CVE-2017-9524</a>]</td>
<td class="Text">RHSA-2017:1681: qemu-kvm security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171680</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1680">RHSA-2017:1680-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3142">CVE-2017-3142</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3143">CVE-2017-3143</a>]</td>
<td class="Text">RHSA-2017:1680: bind security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171616</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1616">RHSA-2017:1616-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2583">CVE-2017-2583</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6214">CVE-2017-6214</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7477">CVE-2017-7477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7645">CVE-2017-7645</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7895">CVE-2017-7895</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000364">CVE-2017-1000364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000379">CVE-2017-1000379</a>]</td>
<td class="Text">RHSA-2017:1616: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171615</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1615">RHSA-2017:1615-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2583">CVE-2017-2583</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6214">CVE-2017-6214</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7477">CVE-2017-7477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7645">CVE-2017-7645</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7895">CVE-2017-7895</a>]</td>
<td class="Text">RHSA-2017:1615: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171581</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1581">RHSA-2017:1581-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9148">CVE-2017-9148</a>]</td>
<td class="Text">RHSA-2017:1581: freeradius security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171576</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1576">RHSA-2017:1576-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-9462">CVE-2017-9462</a>]</td>
<td class="Text">RHSA-2017:1576: mercurial security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171574</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1574">RHSA-2017:1574-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000368">CVE-2017-1000368</a>]</td>
<td class="Text">RHSA-2017:1574: sudo security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171561</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1561">RHSA-2017:1561-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5470">CVE-2017-5470</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5472">CVE-2017-5472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7749">CVE-2017-7749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7750">CVE-2017-7750</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7751">CVE-2017-7751</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7752">CVE-2017-7752</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7754">CVE-2017-7754</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7756">CVE-2017-7756</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7757">CVE-2017-7757</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7758">CVE-2017-7758</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7764">CVE-2017-7764</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7771">CVE-2017-7771</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7772">CVE-2017-7772</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7773">CVE-2017-7773</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7774">CVE-2017-7774</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7775">CVE-2017-7775</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7776">CVE-2017-7776</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7777">CVE-2017-7777</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7778">CVE-2017-7778</a>]</td>
<td class="Text">RHSA-2017:1561: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171484</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1484">RHSA-2017:1484-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000364">CVE-2017-1000364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000379">CVE-2017-1000379</a>]</td>
<td class="Text">RHSA-2017:1484: kernel security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171481</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1481">RHSA-2017:1481-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000366">CVE-2017-1000366</a>]</td>
<td class="Text">RHSA-2017:1481: glibc security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171440</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1440">RHSA-2017:1440-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5470">CVE-2017-5470</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5472">CVE-2017-5472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7749">CVE-2017-7749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7750">CVE-2017-7750</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7751">CVE-2017-7751</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7752">CVE-2017-7752</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7754">CVE-2017-7754</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7756">CVE-2017-7756</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7757">CVE-2017-7757</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7758">CVE-2017-7758</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7764">CVE-2017-7764</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7771">CVE-2017-7771</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7772">CVE-2017-7772</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7773">CVE-2017-7773</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7774">CVE-2017-7774</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7775">CVE-2017-7775</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7776">CVE-2017-7776</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7777">CVE-2017-7777</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7778">CVE-2017-7778</a>]</td>
<td class="Text">RHSA-2017:1440: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171430</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1430">RHSA-2017:1430-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7718">CVE-2017-7718</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7980">CVE-2017-7980</a>]</td>
<td class="Text">RHSA-2017:1430: qemu-kvm security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171382</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1382">RHSA-2017:1382-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-1000367">CVE-2017-1000367</a>]</td>
<td class="Text">RHSA-2017:1382: sudo security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171365</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1365">RHSA-2017:1365-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7502">CVE-2017-7502</a>]</td>
<td class="Text">RHSA-2017:1365: nss security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171308</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1308">RHSA-2017:1308-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7910">CVE-2016-7910</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8646">CVE-2016-8646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10208">CVE-2016-10208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5986">CVE-2017-5986</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7308">CVE-2017-7308</a>]</td>
<td class="Text">RHSA-2017:1308: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171298</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1298">RHSA-2017:1298-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7910">CVE-2016-7910</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8646">CVE-2016-8646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10208">CVE-2016-10208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7308">CVE-2017-7308</a>]</td>
<td class="Text">RHSA-2017:1298: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171270</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1270">RHSA-2017:1270-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-7494">CVE-2017-7494</a>]</td>
<td class="Text">RHSA-2017:1270: samba security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171265</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1265">RHSA-2017:1265-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2125">CVE-2016-2125</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2126">CVE-2016-2126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2619">CVE-2017-2619</a>]</td>
<td class="Text">RHSA-2017:1265: samba security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171264</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1264">RHSA-2017:1264-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8422">CVE-2017-8422</a>]</td>
<td class="Text">RHSA-2017:1264: kdelibs security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171263</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1263">RHSA-2017:1263-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8779">CVE-2017-8779</a>]</td>
<td class="Text">RHSA-2017:1263: libtirpc security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171262</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1262">RHSA-2017:1262-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8779">CVE-2017-8779</a>]</td>
<td class="Text">RHSA-2017:1262: rpcbind security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171230</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1230">RHSA-2017:1230-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-8291">CVE-2017-8291</a>]</td>
<td class="Text">RHSA-2017:1230: ghostscript security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171208</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1208">RHSA-2017:1208-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5203">CVE-2015-5203</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5221">CVE-2015-5221</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1577">CVE-2016-1577</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1867">CVE-2016-1867</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2089">CVE-2016-2089</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2116">CVE-2016-2116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8654">CVE-2016-8654</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8690">CVE-2016-8690</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8691">CVE-2016-8691</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8692">CVE-2016-8692</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8693">CVE-2016-8693</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8883">CVE-2016-8883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8884">CVE-2016-8884</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8885">CVE-2016-8885</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9262">CVE-2016-9262</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9387">CVE-2016-9387</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9388">CVE-2016-9388</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9389">CVE-2016-9389</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9390">CVE-2016-9390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9391">CVE-2016-9391</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9392">CVE-2016-9392</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9393">CVE-2016-9393</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9394">CVE-2016-9394</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9560">CVE-2016-9560</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9583">CVE-2016-9583</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9591">CVE-2016-9591</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9600">CVE-2016-9600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10248">CVE-2016-10248</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10249">CVE-2016-10249</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10251">CVE-2016-10251</a>]</td>
<td class="Text">RHSA-2017:1208: jasper security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171204</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1204">RHSA-2017:1204-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3509">CVE-2017-3509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3511">CVE-2017-3511</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3526">CVE-2017-3526</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3533">CVE-2017-3533</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3539">CVE-2017-3539</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3544">CVE-2017-3544</a>]</td>
<td class="Text">RHSA-2017:1204: java-1.7.0-openjdk security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171201</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1201">RHSA-2017:1201-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10195">CVE-2016-10195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10196">CVE-2016-10196</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10197">CVE-2016-10197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5429">CVE-2017-5429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5432">CVE-2017-5432</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5433">CVE-2017-5433</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5434">CVE-2017-5434</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5435">CVE-2017-5435</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5436">CVE-2017-5436</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5438">CVE-2017-5438</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5439">CVE-2017-5439</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5440">CVE-2017-5440</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5441">CVE-2017-5441</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5442">CVE-2017-5442</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5443">CVE-2017-5443</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5444">CVE-2017-5444</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5445">CVE-2017-5445</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5446">CVE-2017-5446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5447">CVE-2017-5447</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5449">CVE-2017-5449</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5451">CVE-2017-5451</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5454">CVE-2017-5454</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5459">CVE-2017-5459</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5460">CVE-2017-5460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5464">CVE-2017-5464</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5465">CVE-2017-5465</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5466">CVE-2017-5466</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5467">CVE-2017-5467</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5469">CVE-2017-5469</a>]</td>
<td class="Text">RHSA-2017:1201: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171108</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1108">RHSA-2017:1108-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3509">CVE-2017-3509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3511">CVE-2017-3511</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3526">CVE-2017-3526</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3533">CVE-2017-3533</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3539">CVE-2017-3539</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3544">CVE-2017-3544</a>]</td>
<td class="Text">RHSA-2017:1108: java-1.8.0-openjdk security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171106</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1106">RHSA-2017:1106-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10195">CVE-2016-10195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10196">CVE-2016-10196</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10197">CVE-2016-10197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5429">CVE-2017-5429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5430">CVE-2017-5430</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5432">CVE-2017-5432</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5433">CVE-2017-5433</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5434">CVE-2017-5434</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5435">CVE-2017-5435</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5436">CVE-2017-5436</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5438">CVE-2017-5438</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5439">CVE-2017-5439</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5440">CVE-2017-5440</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5441">CVE-2017-5441</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5442">CVE-2017-5442</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5443">CVE-2017-5443</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5444">CVE-2017-5444</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5445">CVE-2017-5445</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5446">CVE-2017-5446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5447">CVE-2017-5447</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5448">CVE-2017-5448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5449">CVE-2017-5449</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5451">CVE-2017-5451</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5454">CVE-2017-5454</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5455">CVE-2017-5455</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5456">CVE-2017-5456</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5459">CVE-2017-5459</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5460">CVE-2017-5460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5464">CVE-2017-5464</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5465">CVE-2017-5465</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5466">CVE-2017-5466</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5467">CVE-2017-5467</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5469">CVE-2017-5469</a>]</td>
<td class="Text">RHSA-2017:1106: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171100</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1100">RHSA-2017:1100-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5461">CVE-2017-5461</a>]</td>
<td class="Text">RHSA-2017:1100: nss and nss-util security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20171095</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:1095">RHSA-2017:1095-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3136">CVE-2017-3136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3137">CVE-2017-3137</a>]</td>
<td class="Text">RHSA-2017:1095: bind security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170987</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0987">RHSA-2017:0987-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9603">CVE-2016-9603</a>]</td>
<td class="Text">RHSA-2017:0987: qemu-kvm security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170935</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0935">RHSA-2017:0935-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6816">CVE-2016-6816</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8745">CVE-2016-8745</a>]</td>
<td class="Text">RHSA-2017:0935: tomcat security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170933</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0933">RHSA-2017:0933-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8650">CVE-2016-8650</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9793">CVE-2016-9793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2618">CVE-2017-2618</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2636">CVE-2017-2636</a>]</td>
<td class="Text">RHSA-2017:0933: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170931</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0931">RHSA-2017:0931-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8650">CVE-2016-8650</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9793">CVE-2016-9793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2618">CVE-2017-2618</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2636">CVE-2017-2636</a>]</td>
<td class="Text">RHSA-2017:0931: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170920</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0920">RHSA-2017:0920-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2668">CVE-2017-2668</a>]</td>
<td class="Text">RHSA-2017:0920: 389-ds-base security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170914</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0914">RHSA-2017:0914-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3157">CVE-2017-3157</a>]</td>
<td class="Text">RHSA-2017:0914: libreoffice security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170907</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0907">RHSA-2017:0907-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2616">CVE-2017-2616</a>]</td>
<td class="Text">RHSA-2017:0907: util-linux security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170906</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0906">RHSA-2017:0906-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0736">CVE-2016-0736</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2161">CVE-2016-2161</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8743">CVE-2016-8743</a>]</td>
<td class="Text">RHSA-2017:0906: httpd security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170838</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0838">RHSA-2017:0838-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5139">CVE-2016-5139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5158">CVE-2016-5158</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5159">CVE-2016-5159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7163">CVE-2016-7163</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9573">CVE-2016-9573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9675">CVE-2016-9675</a>]</td>
<td class="Text">RHSA-2017:0838: openjpeg security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170837</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0837">RHSA-2017:0837-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5208">CVE-2017-5208</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5332">CVE-2017-5332</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5333">CVE-2017-5333</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6009">CVE-2017-6009</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6010">CVE-2017-6010</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6011">CVE-2017-6011</a>]</td>
<td class="Text">RHSA-2017:0837: icoutils security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170558</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0558">RHSA-2017:0558-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5428">CVE-2017-5428</a>]</td>
<td class="Text">RHSA-2017:0558: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170498</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0498">RHSA-2017:0498-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5398">CVE-2017-5398</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5400">CVE-2017-5400</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5401">CVE-2017-5401</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5402">CVE-2017-5402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5404">CVE-2017-5404</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5405">CVE-2017-5405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5407">CVE-2017-5407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5408">CVE-2017-5408</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5410">CVE-2017-5410</a>]</td>
<td class="Text">RHSA-2017:0498: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170461</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0461">RHSA-2017:0461-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5398">CVE-2017-5398</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5400">CVE-2017-5400</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5401">CVE-2017-5401</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5402">CVE-2017-5402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5404">CVE-2017-5404</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5405">CVE-2017-5405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5407">CVE-2017-5407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5408">CVE-2017-5408</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5410">CVE-2017-5410</a>]</td>
<td class="Text">RHSA-2017:0461: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170396</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0396">RHSA-2017:0396-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2615">CVE-2017-2615</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2620">CVE-2017-2620</a>]</td>
<td class="Text">RHSA-2017:0396: qemu-kvm security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170388</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0388">RHSA-2017:0388-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-2590">CVE-2017-2590</a>]</td>
<td class="Text">RHSA-2017:0388: ipa security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170387</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0387">RHSA-2017:0387-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8630">CVE-2016-8630</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8655">CVE-2016-8655</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9083">CVE-2016-9083</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9084">CVE-2016-9084</a>]</td>
<td class="Text">RHSA-2017:0387: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170386</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0386">RHSA-2017:0386-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8630">CVE-2016-8630</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8655">CVE-2016-8655</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9083">CVE-2016-9083</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9084">CVE-2016-9084</a>]</td>
<td class="Text">RHSA-2017:0386: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170372</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0372">RHSA-2017:0372-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5195">CVE-2016-5195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7039">CVE-2016-7039</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8666">CVE-2016-8666</a>]</td>
<td class="Text">RHSA-2017:0372: kernel-aarch64 security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170295</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0295">RHSA-2017:0295-09</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6074">CVE-2017-6074</a>]</td>
<td class="Text">RHSA-2017:0295: kernel-rt security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170294</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0294">RHSA-2017:0294-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-6074">CVE-2017-6074</a>]</td>
<td class="Text">RHSA-2017:0294: kernel security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170286</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0286">RHSA-2017:0286-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8610">CVE-2016-8610</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3731">CVE-2017-3731</a>]</td>
<td class="Text">RHSA-2017:0286: openssl security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170276</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0276">RHSA-2017:0276-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3135">CVE-2017-3135</a>]</td>
<td class="Text">RHSA-2017:0276: bind security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170269</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0269">RHSA-2017:0269-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5546">CVE-2016-5546</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5547">CVE-2016-5547</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5548">CVE-2016-5548</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5552">CVE-2016-5552</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3231">CVE-2017-3231</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3241">CVE-2017-3241</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3252">CVE-2017-3252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3253">CVE-2017-3253</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3261">CVE-2017-3261</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3272">CVE-2017-3272</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3289">CVE-2017-3289</a>]</td>
<td class="Text">RHSA-2017:0269: java-1.7.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170254</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0254">RHSA-2017:0254-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9577">CVE-2016-9577</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9578">CVE-2016-9578</a>]</td>
<td class="Text">RHSA-2017:0254: spice security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170252</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0252">RHSA-2017:0252-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7426">CVE-2016-7426</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7429">CVE-2016-7429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7433">CVE-2016-7433</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9310">CVE-2016-9310</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9311">CVE-2016-9311</a>]</td>
<td class="Text">RHSA-2017:0252: ntp security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170238</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0238">RHSA-2017:0238-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5373">CVE-2017-5373</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5375">CVE-2017-5375</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5376">CVE-2017-5376</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5378">CVE-2017-5378</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5380">CVE-2017-5380</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5383">CVE-2017-5383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5390">CVE-2017-5390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5396">CVE-2017-5396</a>]</td>
<td class="Text">RHSA-2017:0238: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170225</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0225">RHSA-2017:0225-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8870">CVE-2015-8870</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5652">CVE-2016-5652</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9533">CVE-2016-9533</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9534">CVE-2016-9534</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9535">CVE-2016-9535</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9536">CVE-2016-9536</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9537">CVE-2016-9537</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9540">CVE-2016-9540</a>]</td>
<td class="Text">RHSA-2017:0225: libtiff security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170190</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0190">RHSA-2017:0190-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5373">CVE-2017-5373</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5375">CVE-2017-5375</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5376">CVE-2017-5376</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5378">CVE-2017-5378</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5380">CVE-2017-5380</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5383">CVE-2017-5383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5386">CVE-2017-5386</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5390">CVE-2017-5390</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-5396">CVE-2017-5396</a>]</td>
<td class="Text">RHSA-2017:0190: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170182</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0182">RHSA-2017:0182-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10002">CVE-2016-10002</a>]</td>
<td class="Text">RHSA-2017:0182: squid security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170180</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0180">RHSA-2017:0180-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5546">CVE-2016-5546</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5547">CVE-2016-5547</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5548">CVE-2016-5548</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5552">CVE-2016-5552</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3231">CVE-2017-3231</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3241">CVE-2017-3241</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3252">CVE-2017-3252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3253">CVE-2017-3253</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3261">CVE-2017-3261</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3272">CVE-2017-3272</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-3289">CVE-2017-3289</a>]</td>
<td class="Text">RHSA-2017:0180: java-1.8.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170091</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0091">RHSA-2017:0091-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6828">CVE-2016-6828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7117">CVE-2016-7117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9555">CVE-2016-9555</a>]</td>
<td class="Text">RHSA-2017:0091: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170086</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0086">RHSA-2017:0086-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6828">CVE-2016-6828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7117">CVE-2016-7117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9555">CVE-2016-9555</a>]</td>
<td class="Text">RHSA-2017:0086: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170083</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0083">RHSA-2017:0083-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2857">CVE-2016-2857</a>]</td>
<td class="Text">RHSA-2017:0083: qemu-kvm security and bug fix update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170062</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0062">RHSA-2017:0062-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9131">CVE-2016-9131</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9147">CVE-2016-9147</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9444">CVE-2016-9444</a>]</td>
<td class="Text">RHSA-2017:0062: bind security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170061</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0061">RHSA-2017:0061-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5542">CVE-2016-5542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5554">CVE-2016-5554</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5573">CVE-2016-5573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5582">CVE-2016-5582</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5597">CVE-2016-5597</a>]</td>
<td class="Text">RHSA-2017:0061: java-1.6.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170021</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0021">RHSA-2017:0021-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9445">CVE-2016-9445</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9809">CVE-2016-9809</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9812">CVE-2016-9812</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9813">CVE-2016-9813</a>]</td>
<td class="Text">RHSA-2017:0021: gstreamer1-plugins-bad-free security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170020</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0020">RHSA-2017:0020-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9634">CVE-2016-9634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9635">CVE-2016-9635</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9636">CVE-2016-9636</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9807">CVE-2016-9807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9808">CVE-2016-9808</a>]</td>
<td class="Text">RHSA-2017:0020: gstreamer1-plugins-good security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170019</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0019">RHSA-2017:0019-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9634">CVE-2016-9634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9635">CVE-2016-9635</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9636">CVE-2016-9636</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9807">CVE-2016-9807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9808">CVE-2016-9808</a>]</td>
<td class="Text">RHSA-2017:0019: gstreamer-plugins-good security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170018</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0018">RHSA-2017:0018-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9445">CVE-2016-9445</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9447">CVE-2016-9447</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9809">CVE-2016-9809</a>]</td>
<td class="Text">RHSA-2017:0018: gstreamer-plugins-bad-free security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170013</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0013">RHSA-2017:0013-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-5653">CVE-2013-5653</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7977">CVE-2016-7977</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7978">CVE-2016-7978</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7979">CVE-2016-7979</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8602">CVE-2016-8602</a>]</td>
<td class="Text">RHSA-2017:0013: ghostscript security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20170001</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2017:0001">RHSA-2017:0001-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7030">CVE-2016-7030</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9575">CVE-2016-9575</a>]</td>
<td class="Text">RHSA-2017:0001: ipa security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162973</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2973">RHSA-2016:2973-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9893">CVE-2016-9893</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9895">CVE-2016-9895</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9899">CVE-2016-9899</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9900">CVE-2016-9900</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9901">CVE-2016-9901</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9902">CVE-2016-9902</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9905">CVE-2016-9905</a>]</td>
<td class="Text">RHSA-2016:2973: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162972</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2972">RHSA-2016:2972-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1248">CVE-2016-1248</a>]</td>
<td class="Text">RHSA-2016:2972: vim security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162946</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2946">RHSA-2016:2946-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9893">CVE-2016-9893</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9895">CVE-2016-9895</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9897">CVE-2016-9897</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9898">CVE-2016-9898</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9899">CVE-2016-9899</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9900">CVE-2016-9900</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9901">CVE-2016-9901</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9902">CVE-2016-9902</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9904">CVE-2016-9904</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9905">CVE-2016-9905</a>]</td>
<td class="Text">RHSA-2016:2946: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162872</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2872">RHSA-2016:2872-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7032">CVE-2016-7032</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7076">CVE-2016-7076</a>]</td>
<td class="Text">RHSA-2016:2872: sudo security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162850</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2850">RHSA-2016:2850-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9079">CVE-2016-9079</a>]</td>
<td class="Text">RHSA-2016:2850: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162843</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2843">RHSA-2016:2843-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9079">CVE-2016-9079</a>]</td>
<td class="Text">RHSA-2016:2843: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162825</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2825">RHSA-2016:2825-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5290">CVE-2016-5290</a>]</td>
<td class="Text">RHSA-2016:2825: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162824</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2824">RHSA-2016:2824-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0718">CVE-2016-0718</a>]</td>
<td class="Text">RHSA-2016:2824: expat security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162819</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2819">RHSA-2016:2819-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8704">CVE-2016-8704</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8705">CVE-2016-8705</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8706">CVE-2016-8706</a>]</td>
<td class="Text">RHSA-2016:2819: memcached security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162809</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2809">RHSA-2016:2809-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8638">CVE-2016-8638</a>]</td>
<td class="Text">RHSA-2016:2809: ipsilon security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162780</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2780">RHSA-2016:2780-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5290">CVE-2016-5290</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5291">CVE-2016-5291</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5296">CVE-2016-5296</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5297">CVE-2016-5297</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9064">CVE-2016-9064</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9066">CVE-2016-9066</a>]</td>
<td class="Text">RHSA-2016:2780: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162779</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2779">RHSA-2016:2779-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2834">CVE-2016-2834</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5285">CVE-2016-5285</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8635">CVE-2016-8635</a>]</td>
<td class="Text">RHSA-2016:2779: nss and nss-util security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162702</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2702">RHSA-2016:2702-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7545">CVE-2016-7545</a>]</td>
<td class="Text">RHSA-2016:2702: policycoreutils security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162674</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2674">RHSA-2016:2674-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6313">CVE-2016-6313</a>]</td>
<td class="Text">RHSA-2016:2674: libgcrypt security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162658</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2658">RHSA-2016:2658-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5542">CVE-2016-5542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5554">CVE-2016-5554</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5573">CVE-2016-5573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5582">CVE-2016-5582</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5597">CVE-2016-5597</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10165">CVE-2016-10165</a>]</td>
<td class="Text">RHSA-2016:2658: java-1.7.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162615</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2615">RHSA-2016:2615-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8864">CVE-2016-8864</a>]</td>
<td class="Text">RHSA-2016:2615: bind security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162614</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2614">RHSA-2016:2614-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7035">CVE-2016-7035</a>]</td>
<td class="Text">RHSA-2016:2614: pacemaker security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162610</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2610">RHSA-2016:2610-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7795">CVE-2016-7795</a>]</td>
<td class="Text">RHSA-2016:2610: systemd security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162607</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2607">RHSA-2016:2607-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8165">CVE-2014-8165</a>]</td>
<td class="Text">RHSA-2016:2607: powerpc-utils-python security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162606</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2606">RHSA-2016:2606-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5423">CVE-2016-5423</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5424">CVE-2016-5424</a>]</td>
<td class="Text">RHSA-2016:2606: postgresql security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162605</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2605">RHSA-2016:2605-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5011">CVE-2016-5011</a>]</td>
<td class="Text">RHSA-2016:2605: util-linux security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162604</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2604">RHSA-2016:2604-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7050">CVE-2016-7050</a>]</td>
<td class="Text">RHSA-2016:2604: resteasy-base security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162603</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2603">RHSA-2016:2603-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5361">CVE-2016-5361</a>]</td>
<td class="Text">RHSA-2016:2603: libreswan security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162602</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2602">RHSA-2016:2602-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3099">CVE-2016-3099</a>]</td>
<td class="Text">RHSA-2016:2602: mod_nss security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162601</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2601">RHSA-2016:2601-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5384">CVE-2016-5384</a>]</td>
<td class="Text">RHSA-2016:2601: fontconfig security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162600</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2600">RHSA-2016:2600-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2569">CVE-2016-2569</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2570">CVE-2016-2570</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2571">CVE-2016-2571</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2572">CVE-2016-2572</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3948">CVE-2016-3948</a>]</td>
<td class="Text">RHSA-2016:2600: squid security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162599</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2599">RHSA-2016:2599-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0230">CVE-2014-0230</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5174">CVE-2015-5174</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5345">CVE-2015-5345</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5351">CVE-2015-5351</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0706">CVE-2016-0706</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0714">CVE-2016-0714</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0763">CVE-2016-0763</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3092">CVE-2016-3092</a>]</td>
<td class="Text">RHSA-2016:2599: tomcat security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162598</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2598">RHSA-2016:2598-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5399">CVE-2016-5399</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5766">CVE-2016-5766</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5767">CVE-2016-5767</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5768">CVE-2016-5768</a>]</td>
<td class="Text">RHSA-2016:2598: php security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162597</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2597">RHSA-2016:2597-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5410">CVE-2016-5410</a>]</td>
<td class="Text">RHSA-2016:2597: firewalld security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162596</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2596">RHSA-2016:2596-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0720">CVE-2016-0720</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0721">CVE-2016-0721</a>]</td>
<td class="Text">RHSA-2016:2596: pcs security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162595</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2595">RHSA-2016:2595-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3492">CVE-2016-3492</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5612">CVE-2016-5612</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5616">CVE-2016-5616</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5624">CVE-2016-5624</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5626">CVE-2016-5626</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5629">CVE-2016-5629</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6662">CVE-2016-6662</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6663">CVE-2016-6663</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8283">CVE-2016-8283</a>]</td>
<td class="Text">RHSA-2016:2595: mariadb security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162594</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2594">RHSA-2016:2594-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4992">CVE-2016-4992</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5405">CVE-2016-5405</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5416">CVE-2016-5416</a>]</td>
<td class="Text">RHSA-2016:2594: 389-ds-base security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162593</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2593">RHSA-2016:2593-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7091">CVE-2016-7091</a>]</td>
<td class="Text">RHSA-2016:2593: sudo security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162592</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2592">RHSA-2016:2592-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4455">CVE-2016-4455</a>]</td>
<td class="Text">RHSA-2016:2592: subscription-manager security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162591</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2591">RHSA-2016:2591-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3119">CVE-2016-3119</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3120">CVE-2016-3120</a>]</td>
<td class="Text">RHSA-2016:2591: krb5 security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162590</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2590">RHSA-2016:2590-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2774">CVE-2016-2774</a>]</td>
<td class="Text">RHSA-2016:2590: dhcp security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162589</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2589">RHSA-2016:2589-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4994">CVE-2016-4994</a>]</td>
<td class="Text">RHSA-2016:2589: gimp security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162588</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2588">RHSA-2016:2588-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8325">CVE-2015-8325</a>]</td>
<td class="Text">RHSA-2016:2588: openssh security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162587</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2587">RHSA-2016:2587-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4971">CVE-2016-4971</a>]</td>
<td class="Text">RHSA-2016:2587: wget security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162586</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2586">RHSA-2016:2586-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5636">CVE-2016-5636</a>]</td>
<td class="Text">RHSA-2016:2586: python security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162585</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2585">RHSA-2016:2585-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1981">CVE-2016-1981</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3712">CVE-2016-3712</a>]</td>
<td class="Text">RHSA-2016:2585: qemu-kvm security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162584</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2584">RHSA-2016:2584-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4312">CVE-2013-4312</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8374">CVE-2015-8374</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8543">CVE-2015-8543</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8746">CVE-2015-8746</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8812">CVE-2015-8812</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8844">CVE-2015-8844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8845">CVE-2015-8845</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8956">CVE-2015-8956</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2053">CVE-2016-2053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2069">CVE-2016-2069</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2117">CVE-2016-2117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2384">CVE-2016-2384</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2847">CVE-2016-2847</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3070">CVE-2016-3070</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3156">CVE-2016-3156</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3699">CVE-2016-3699</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3841">CVE-2016-3841</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4569">CVE-2016-4569</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4578">CVE-2016-4578</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4581">CVE-2016-4581</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4794">CVE-2016-4794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5829">CVE-2016-5829</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6136">CVE-2016-6136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6198">CVE-2016-6198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6327">CVE-2016-6327</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6480">CVE-2016-6480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13167">CVE-2017-13167</a>]</td>
<td class="Text">RHSA-2016:2584: kernel-rt security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162583</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2583">RHSA-2016:2583-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5194">CVE-2015-5194</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5195">CVE-2015-5195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5196">CVE-2015-5196</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5219">CVE-2015-5219</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7691">CVE-2015-7691</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7692">CVE-2015-7692</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7701">CVE-2015-7701</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7702">CVE-2015-7702</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7703">CVE-2015-7703</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7852">CVE-2015-7852</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7974">CVE-2015-7974</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7977">CVE-2015-7977</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7978">CVE-2015-7978</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7979">CVE-2015-7979</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8158">CVE-2015-8158</a>]</td>
<td class="Text">RHSA-2016:2583: ntp security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162582</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2582">RHSA-2016:2582-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8803">CVE-2015-8803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8804">CVE-2015-8804</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8805">CVE-2015-8805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6489">CVE-2016-6489</a>]</td>
<td class="Text">RHSA-2016:2582: nettle security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162581</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2581">RHSA-2016:2581-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0764">CVE-2016-0764</a>]</td>
<td class="Text">RHSA-2016:2581: NetworkManager security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162580</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2580">RHSA-2016:2580-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8868">CVE-2015-8868</a>]</td>
<td class="Text">RHSA-2016:2580: poppler security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162579</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2579">RHSA-2016:2579-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0794">CVE-2016-0794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0795">CVE-2016-0795</a>]</td>
<td class="Text">RHSA-2016:2579: libreoffice security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162578</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2578">RHSA-2016:2578-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7797">CVE-2016-7797</a>]</td>
<td class="Text">RHSA-2016:2578: pacemaker security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162577</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2577">RHSA-2016:2577-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5160">CVE-2015-5160</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5313">CVE-2015-5313</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5008">CVE-2016-5008</a>]</td>
<td class="Text">RHSA-2016:2577: libvirt security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162576</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2576">RHSA-2016:2576-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8869">CVE-2015-8869</a>]</td>
<td class="Text">RHSA-2016:2576: libguestfs and virt-p2v security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162575</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2575">RHSA-2016:2575-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5419">CVE-2016-5419</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5420">CVE-2016-5420</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7141">CVE-2016-7141</a>]</td>
<td class="Text">RHSA-2016:2575: curl security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162574</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2574">RHSA-2016:2574-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4312">CVE-2013-4312</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8374">CVE-2015-8374</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8543">CVE-2015-8543</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8746">CVE-2015-8746</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8812">CVE-2015-8812</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8844">CVE-2015-8844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8845">CVE-2015-8845</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8956">CVE-2015-8956</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2053">CVE-2016-2053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2069">CVE-2016-2069</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2117">CVE-2016-2117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2384">CVE-2016-2384</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2847">CVE-2016-2847</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3044">CVE-2016-3044</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3070">CVE-2016-3070</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3156">CVE-2016-3156</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3699">CVE-2016-3699</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3841">CVE-2016-3841</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4569">CVE-2016-4569</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4578">CVE-2016-4578</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4581">CVE-2016-4581</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4794">CVE-2016-4794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5412">CVE-2016-5412</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5828">CVE-2016-5828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5829">CVE-2016-5829</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6136">CVE-2016-6136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6198">CVE-2016-6198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6327">CVE-2016-6327</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6480">CVE-2016-6480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7914">CVE-2016-7914</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7915">CVE-2016-7915</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-9794">CVE-2016-9794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2017-13167">CVE-2017-13167</a>]</td>
<td class="Text">RHSA-2016:2574: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162573</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2573">RHSA-2016:2573-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3075">CVE-2016-3075</a>]</td>
<td class="Text">RHSA-2016:2573: glibc security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162110</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2110">RHSA-2016:2110-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5195">CVE-2016-5195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7039">CVE-2016-7039</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8666">CVE-2016-8666</a>]</td>
<td class="Text">RHSA-2016:2110: kernel-rt security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162098</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2098">RHSA-2016:2098-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5195">CVE-2016-5195</a>]</td>
<td class="Text">RHSA-2016:2098: kernel security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162079</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2079">RHSA-2016:2079-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5542">CVE-2016-5542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5554">CVE-2016-5554</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5573">CVE-2016-5573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5582">CVE-2016-5582</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5597">CVE-2016-5597</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-10165">CVE-2016-10165</a>]</td>
<td class="Text">RHSA-2016:2079: java-1.8.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162047</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2047">RHSA-2016:2047-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7039">CVE-2016-7039</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-8666">CVE-2016-8666</a>]</td>
<td class="Text">RHSA-2016:2047: kernel security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20162046</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:2046">RHSA-2016:2046-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7810">CVE-2014-7810</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5346">CVE-2015-5346</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5388">CVE-2016-5388</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5425">CVE-2016-5425</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6325">CVE-2016-6325</a>]</td>
<td class="Text">RHSA-2016:2046: tomcat security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161985</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1985">RHSA-2016:1985-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5257">CVE-2016-5257</a>]</td>
<td class="Text">RHSA-2016:1985: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161978</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1978">RHSA-2016:1978-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1000111">CVE-2016-1000111</a>]</td>
<td class="Text">RHSA-2016:1978: python-twisted-web security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161944</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1944">RHSA-2016:1944-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2776">CVE-2016-2776</a>]</td>
<td class="Text">RHSA-2016:1944: bind security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161940</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1940">RHSA-2016:1940-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2177">CVE-2016-2177</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2178">CVE-2016-2178</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2179">CVE-2016-2179</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2180">CVE-2016-2180</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2181">CVE-2016-2181</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2182">CVE-2016-2182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6302">CVE-2016-6302</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6304">CVE-2016-6304</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6306">CVE-2016-6306</a>]</td>
<td class="Text">RHSA-2016:1940: openssl security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161912</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1912">RHSA-2016:1912-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5250">CVE-2016-5250</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5257">CVE-2016-5257</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5261">CVE-2016-5261</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5270">CVE-2016-5270</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5272">CVE-2016-5272</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5274">CVE-2016-5274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5276">CVE-2016-5276</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5277">CVE-2016-5277</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5278">CVE-2016-5278</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5280">CVE-2016-5280</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5281">CVE-2016-5281</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5284">CVE-2016-5284</a>]</td>
<td class="Text">RHSA-2016:1912: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161875</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1875">RHSA-2016:1875-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3134">CVE-2016-3134</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4997">CVE-2016-4997</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4998">CVE-2016-4998</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6197">CVE-2016-6197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6198">CVE-2016-6198</a>]</td>
<td class="Text">RHSA-2016:1875: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161847</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1847">RHSA-2016:1847-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3134">CVE-2016-3134</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4997">CVE-2016-4997</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4998">CVE-2016-4998</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6197">CVE-2016-6197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6198">CVE-2016-6198</a>]</td>
<td class="Text">RHSA-2016:1847: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161844</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1844">RHSA-2016:1844-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8916">CVE-2015-8916</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8917">CVE-2015-8917</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8919">CVE-2015-8919</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8920">CVE-2015-8920</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8921">CVE-2015-8921</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8922">CVE-2015-8922</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8923">CVE-2015-8923</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8924">CVE-2015-8924</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8925">CVE-2015-8925</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8926">CVE-2015-8926</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8928">CVE-2015-8928</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8930">CVE-2015-8930</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8931">CVE-2015-8931</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8932">CVE-2015-8932</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8934">CVE-2015-8934</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1541">CVE-2016-1541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4300">CVE-2016-4300</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4302">CVE-2016-4302</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4809">CVE-2016-4809</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5418">CVE-2016-5418</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5844">CVE-2016-5844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-6250">CVE-2016-6250</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-7166">CVE-2016-7166</a>]</td>
<td class="Text">RHSA-2016:1844: libarchive security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161809</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1809">RHSA-2016:1809-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2836">CVE-2016-2836</a>]</td>
<td class="Text">RHSA-2016:1809: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161797</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1797">RHSA-2016:1797-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5404">CVE-2016-5404</a>]</td>
<td class="Text">RHSA-2016:1797: ipa security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161776</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1776">RHSA-2016:1776-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3458">CVE-2016-3458</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3500">CVE-2016-3500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3508">CVE-2016-3508</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3550">CVE-2016-3550</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3606">CVE-2016-3606</a>]</td>
<td class="Text">RHSA-2016:1776: java-1.6.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161633</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1633">RHSA-2016:1633-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5696">CVE-2016-5696</a>]</td>
<td class="Text">RHSA-2016:1633: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161632</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1632">RHSA-2016:1632-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5696">CVE-2016-5696</a>]</td>
<td class="Text">RHSA-2016:1632: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161626</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1626">RHSA-2016:1626-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0772">CVE-2016-0772</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5699">CVE-2016-5699</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1000110">CVE-2016-1000110</a>]</td>
<td class="Text">RHSA-2016:1626: python security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161613</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1613">RHSA-2016:1613-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5385">CVE-2016-5385</a>]</td>
<td class="Text">RHSA-2016:1613: php security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161606</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1606">RHSA-2016:1606-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5126">CVE-2016-5126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5403">CVE-2016-5403</a>]</td>
<td class="Text">RHSA-2016:1606: qemu-kvm security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161602</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1602">RHSA-2016:1602-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0640">CVE-2016-0640</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0641">CVE-2016-0641</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0643">CVE-2016-0643</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0644">CVE-2016-0644</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0646">CVE-2016-0646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0647">CVE-2016-0647</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0648">CVE-2016-0648</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0649">CVE-2016-0649</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0650">CVE-2016-0650</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0666">CVE-2016-0666</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3452">CVE-2016-3452</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3477">CVE-2016-3477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3521">CVE-2016-3521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3615">CVE-2016-3615</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5440">CVE-2016-5440</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5444">CVE-2016-5444</a>]</td>
<td class="Text">RHSA-2016:1602: mariadb security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161551</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1551">RHSA-2016:1551-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2830">CVE-2016-2830</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2836">CVE-2016-2836</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2837">CVE-2016-2837</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2838">CVE-2016-2838</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5252">CVE-2016-5252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5254">CVE-2016-5254</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5258">CVE-2016-5258</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5259">CVE-2016-5259</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5262">CVE-2016-5262</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5263">CVE-2016-5263</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5264">CVE-2016-5264</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5265">CVE-2016-5265</a>]</td>
<td class="Text">RHSA-2016:1551: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161546</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1546">RHSA-2016:1546-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8127">CVE-2014-8127</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8129">CVE-2014-8129</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8130">CVE-2014-8130</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9330">CVE-2014-9330</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9655">CVE-2014-9655</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1547">CVE-2015-1547</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7554">CVE-2015-7554</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8665">CVE-2015-8665</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8668">CVE-2015-8668</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8683">CVE-2015-8683</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8781">CVE-2015-8781</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8782">CVE-2015-8782</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8783">CVE-2015-8783</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8784">CVE-2015-8784</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3632">CVE-2016-3632</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3945">CVE-2016-3945</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3990">CVE-2016-3990</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3991">CVE-2016-3991</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5320">CVE-2016-5320</a>]</td>
<td class="Text">RHSA-2016:1546: libtiff security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161541</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1541">RHSA-2016:1541-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8660">CVE-2015-8660</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4470">CVE-2016-4470</a>]</td>
<td class="Text">RHSA-2016:1541: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161539</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1539">RHSA-2016:1539-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8660">CVE-2015-8660</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2143">CVE-2016-2143</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4470">CVE-2016-4470</a>]</td>
<td class="Text">RHSA-2016:1539: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161538</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1538">RHSA-2016:1538-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5739">CVE-2015-5739</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5740">CVE-2015-5740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5741">CVE-2015-5741</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3959">CVE-2016-3959</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5386">CVE-2016-5386</a>]</td>
<td class="Text">RHSA-2016:1538: golang security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161504</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1504">RHSA-2016:1504-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3458">CVE-2016-3458</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3500">CVE-2016-3500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3508">CVE-2016-3508</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3550">CVE-2016-3550</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3598">CVE-2016-3598</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3606">CVE-2016-3606</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3610">CVE-2016-3610</a>]</td>
<td class="Text">RHSA-2016:1504: java-1.7.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161486</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1486">RHSA-2016:1486-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2119">CVE-2016-2119</a>]</td>
<td class="Text">RHSA-2016:1486: samba security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161458</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1458">RHSA-2016:1458-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3458">CVE-2016-3458</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3500">CVE-2016-3500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3508">CVE-2016-3508</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3550">CVE-2016-3550</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3587">CVE-2016-3587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3598">CVE-2016-3598</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3606">CVE-2016-3606</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3610">CVE-2016-3610</a>]</td>
<td class="Text">RHSA-2016:1458: java-1.8.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161422</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1422">RHSA-2016:1422-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5387">CVE-2016-5387</a>]</td>
<td class="Text">RHSA-2016:1422: httpd security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161392</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1392">RHSA-2016:1392-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2818">CVE-2016-2818</a>]</td>
<td class="Text">RHSA-2016:1392: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161301</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1301">RHSA-2016:1301-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8767">CVE-2015-8767</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3707">CVE-2016-3707</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4565">CVE-2016-4565</a>]</td>
<td class="Text">RHSA-2016:1301: kernel-rt security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161296</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1296">RHSA-2016:1296-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8869">CVE-2015-8869</a>]</td>
<td class="Text">RHSA-2016:1296: ocaml security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161293</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1293">RHSA-2016:1293-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4444">CVE-2016-4444</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4446">CVE-2016-4446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4989">CVE-2016-4989</a>]</td>
<td class="Text">RHSA-2016:1293: setroubleshoot and setroubleshoot-plugins security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161292</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1292">RHSA-2016:1292-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1762">CVE-2016-1762</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1833">CVE-2016-1833</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1834">CVE-2016-1834</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1835">CVE-2016-1835</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1836">CVE-2016-1836</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1837">CVE-2016-1837</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1838">CVE-2016-1838</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1839">CVE-2016-1839</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1840">CVE-2016-1840</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3627">CVE-2016-3627</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3705">CVE-2016-3705</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4447">CVE-2016-4447</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4448">CVE-2016-4448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4449">CVE-2016-4449</a>]</td>
<td class="Text">RHSA-2016:1292: libxml2 security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161277</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1277">RHSA-2016:1277-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8767">CVE-2015-8767</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4565">CVE-2016-4565</a>]</td>
<td class="Text">RHSA-2016:1277: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161237</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1237">RHSA-2016:1237-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8895">CVE-2015-8895</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8896">CVE-2015-8896</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8897">CVE-2015-8897</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8898">CVE-2015-8898</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5118">CVE-2016-5118</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5239">CVE-2016-5239</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-5240">CVE-2016-5240</a>]</td>
<td class="Text">RHSA-2016:1237: ImageMagick security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161217</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1217">RHSA-2016:1217-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2818">CVE-2016-2818</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2819">CVE-2016-2819</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2821">CVE-2016-2821</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2822">CVE-2016-2822</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2828">CVE-2016-2828</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2831">CVE-2016-2831</a>]</td>
<td class="Text">RHSA-2016:1217: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161205</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1205">RHSA-2016:1205-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0749">CVE-2016-0749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2150">CVE-2016-2150</a>]</td>
<td class="Text">RHSA-2016:1205: spice security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161141</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1141">RHSA-2016:1141-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7979">CVE-2015-7979</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1547">CVE-2016-1547</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1548">CVE-2016-1548</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1550">CVE-2016-1550</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2518">CVE-2016-2518</a>]</td>
<td class="Text">RHSA-2016:1141: ntp security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161139</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1139">RHSA-2016:1139-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4051">CVE-2016-4051</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4052">CVE-2016-4052</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4053">CVE-2016-4053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4054">CVE-2016-4054</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4553">CVE-2016-4553</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4554">CVE-2016-4554</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4555">CVE-2016-4555</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-4556">CVE-2016-4556</a>]</td>
<td class="Text">RHSA-2016:1139: squid security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161086</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1086">RHSA-2016:1086-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3698">CVE-2016-3698</a>]</td>
<td class="Text">RHSA-2016:1086: libndp security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161051</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1051">RHSA-2016:1051-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0758">CVE-2016-0758</a>]</td>
<td class="Text">RHSA-2016:1051: kernel-rt security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161041</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1041">RHSA-2016:1041-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2805">CVE-2016-2805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2807">CVE-2016-2807</a>]</td>
<td class="Text">RHSA-2016:1041: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161033</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1033">RHSA-2016:1033-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0758">CVE-2016-0758</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3044">CVE-2016-3044</a>]</td>
<td class="Text">RHSA-2016:1033: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20161025</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:1025">RHSA-2016:1025-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2328">CVE-2015-2328</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3217">CVE-2015-3217</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5073">CVE-2015-5073</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8385">CVE-2015-8385</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8386">CVE-2015-8386</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8388">CVE-2015-8388</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8391">CVE-2015-8391</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3191">CVE-2016-3191</a>]</td>
<td class="Text">RHSA-2016:1025: pcre security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160726</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0726">RHSA-2016:0726-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3714">CVE-2016-3714</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3715">CVE-2016-3715</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3716">CVE-2016-3716</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3717">CVE-2016-3717</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3718">CVE-2016-3718</a>]</td>
<td class="Text">RHSA-2016:0726: ImageMagick security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160724</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0724">RHSA-2016:0724-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3710">CVE-2016-3710</a>]</td>
<td class="Text">RHSA-2016:0724: qemu-kvm security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160723</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0723">RHSA-2016:0723-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0686">CVE-2016-0686</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0687">CVE-2016-0687</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0695">CVE-2016-0695</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3425">CVE-2016-3425</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3427">CVE-2016-3427</a>]</td>
<td class="Text">RHSA-2016:0723: java-1.6.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160722</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0722">RHSA-2016:0722-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0799">CVE-2016-0799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2105">CVE-2016-2105</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2106">CVE-2016-2106</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2107">CVE-2016-2107</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2108">CVE-2016-2108</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2109">CVE-2016-2109</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2842">CVE-2016-2842</a>]</td>
<td class="Text">RHSA-2016:0722: openssl security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160706</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0706">RHSA-2016:0706-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3068">CVE-2016-3068</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3069">CVE-2016-3069</a>]</td>
<td class="Text">RHSA-2016:0706: mercurial security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160695</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0695">RHSA-2016:0695-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1526">CVE-2016-1526</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2805">CVE-2016-2805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2806">CVE-2016-2806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2807">CVE-2016-2807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2808">CVE-2016-2808</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2814">CVE-2016-2814</a>]</td>
<td class="Text">RHSA-2016:0695: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160685</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0685">RHSA-2016:0685-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1978">CVE-2016-1978</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1979">CVE-2016-1979</a>]</td>
<td class="Text">RHSA-2016:0685: nss, nspr, nss-softokn, and nss-util security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160676</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0676">RHSA-2016:0676-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0686">CVE-2016-0686</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0687">CVE-2016-0687</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0695">CVE-2016-0695</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3425">CVE-2016-3425</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3427">CVE-2016-3427</a>]</td>
<td class="Text">RHSA-2016:0676: java-1.7.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160650</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0650">RHSA-2016:0650-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0686">CVE-2016-0686</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0687">CVE-2016-0687</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0695">CVE-2016-0695</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3425">CVE-2016-3425</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3426">CVE-2016-3426</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3427">CVE-2016-3427</a>]</td>
<td class="Text">RHSA-2016:0650: java-1.8.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160612</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0612">RHSA-2016:0612-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5370">CVE-2015-5370</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2110">CVE-2016-2110</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2111">CVE-2016-2111</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2112">CVE-2016-2112</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2113">CVE-2016-2113</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2114">CVE-2016-2114</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2115">CVE-2016-2115</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2118">CVE-2016-2118</a>]</td>
<td class="Text">RHSA-2016:0612: samba and samba4 security, bug fix, and enhancement update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160594</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0594">RHSA-2016:0594-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1521">CVE-2016-1521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1522">CVE-2016-1522</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1523">CVE-2016-1523</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1526">CVE-2016-1526</a>]</td>
<td class="Text">RHSA-2016:0594: graphite2 security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160534</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0534">RHSA-2016:0534-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4792">CVE-2015-4792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4802">CVE-2015-4802</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4815">CVE-2015-4815</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4816">CVE-2015-4816</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4819">CVE-2015-4819</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4826">CVE-2015-4826</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4830">CVE-2015-4830</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4836">CVE-2015-4836</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4858">CVE-2015-4858</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4861">CVE-2015-4861</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4870">CVE-2015-4870</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4879">CVE-2015-4879</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4913">CVE-2015-4913</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0505">CVE-2016-0505</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0546">CVE-2016-0546</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0596">CVE-2016-0596</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0597">CVE-2016-0597</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0598">CVE-2016-0598</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0600">CVE-2016-0600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0606">CVE-2016-0606</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0608">CVE-2016-0608</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0609">CVE-2016-0609</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0616">CVE-2016-0616</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0642">CVE-2016-0642</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0651">CVE-2016-0651</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2047">CVE-2016-2047</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3471">CVE-2016-3471</a>]</td>
<td class="Text">RHSA-2016:0534: mariadb security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160532</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0532">RHSA-2016:0532-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8629">CVE-2015-8629</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8630">CVE-2015-8630</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8631">CVE-2015-8631</a>]</td>
<td class="Text">RHSA-2016:0532: krb5 security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160513</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0513">RHSA-2016:0513-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0636">CVE-2016-0636</a>]</td>
<td class="Text">RHSA-2016:0513: java-1.8.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160512</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0512">RHSA-2016:0512-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0636">CVE-2016-0636</a>]</td>
<td class="Text">RHSA-2016:0512: java-1.7.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160496</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0496">RHSA-2016:0496-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2315">CVE-2016-2315</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2324">CVE-2016-2324</a>]</td>
<td class="Text">RHSA-2016:0496: git security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160465</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0465">RHSA-2016:0465-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1908">CVE-2016-1908</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-3115">CVE-2016-3115</a>]</td>
<td class="Text">RHSA-2016:0465: openssh security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160460</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0460">RHSA-2016:0460-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1952">CVE-2016-1952</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1954">CVE-2016-1954</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1957">CVE-2016-1957</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1960">CVE-2016-1960</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1961">CVE-2016-1961</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1964">CVE-2016-1964</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1966">CVE-2016-1966</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1974">CVE-2016-1974</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1977">CVE-2016-1977</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2790">CVE-2016-2790</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2791">CVE-2016-2791</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2792">CVE-2016-2792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2793">CVE-2016-2793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2794">CVE-2016-2794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2795">CVE-2016-2795</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2796">CVE-2016-2796</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2797">CVE-2016-2797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2798">CVE-2016-2798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2799">CVE-2016-2799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2800">CVE-2016-2800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2801">CVE-2016-2801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2802">CVE-2016-2802</a>]</td>
<td class="Text">RHSA-2016:0460: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160459</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0459">RHSA-2016:0459-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1285">CVE-2016-1285</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1286">CVE-2016-1286</a>]</td>
<td class="Text">RHSA-2016:0459: bind security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160448</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0448">RHSA-2016:0448-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7560">CVE-2015-7560</a>]</td>
<td class="Text">RHSA-2016:0448: samba security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160430</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0430">RHSA-2016:0430-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0729">CVE-2016-0729</a>]</td>
<td class="Text">RHSA-2016:0430: xerces-c security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160428</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0428">RHSA-2016:0428-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0787">CVE-2016-0787</a>]</td>
<td class="Text">RHSA-2016:0428: libssh2 security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160373</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0373">RHSA-2016:0373-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1952">CVE-2016-1952</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1954">CVE-2016-1954</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1957">CVE-2016-1957</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1958">CVE-2016-1958</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1960">CVE-2016-1960</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1961">CVE-2016-1961</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1962">CVE-2016-1962</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1964">CVE-2016-1964</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1965">CVE-2016-1965</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1966">CVE-2016-1966</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1973">CVE-2016-1973</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1974">CVE-2016-1974</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1977">CVE-2016-1977</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2790">CVE-2016-2790</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2791">CVE-2016-2791</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2792">CVE-2016-2792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2793">CVE-2016-2793</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2794">CVE-2016-2794</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2795">CVE-2016-2795</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2796">CVE-2016-2796</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2797">CVE-2016-2797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2798">CVE-2016-2798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2799">CVE-2016-2799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2800">CVE-2016-2800</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2801">CVE-2016-2801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-2802">CVE-2016-2802</a>]</td>
<td class="Text">RHSA-2016:0373: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160372</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0372">RHSA-2016:0372-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0293">CVE-2015-0293</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3197">CVE-2015-3197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0703">CVE-2016-0703</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0704">CVE-2016-0704</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0800">CVE-2016-0800</a>]</td>
<td class="Text">RHSA-2016:0372: openssl098e security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160370</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0370">RHSA-2016:0370-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1950">CVE-2016-1950</a>]</td>
<td class="Text">RHSA-2016:0370: nss-util security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160346</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0346">RHSA-2016:0346-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0773">CVE-2016-0773</a>]</td>
<td class="Text">RHSA-2016:0346: postgresql security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160301</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0301">RHSA-2016:0301-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3197">CVE-2015-3197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0702">CVE-2016-0702</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0705">CVE-2016-0705</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0797">CVE-2016-0797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0800">CVE-2016-0800</a>]</td>
<td class="Text">RHSA-2016:0301: openssl security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160258</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0258">RHSA-2016:0258-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1521">CVE-2016-1521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1522">CVE-2016-1522</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1523">CVE-2016-1523</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1930">CVE-2016-1930</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1935">CVE-2016-1935</a>]</td>
<td class="Text">RHSA-2016:0258: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160212</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0212">RHSA-2016:0212-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5157">CVE-2015-5157</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7872">CVE-2015-7872</a>]</td>
<td class="Text">RHSA-2016:0212: kernel-rt security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160204</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0204">RHSA-2016:0204-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0741">CVE-2016-0741</a>]</td>
<td class="Text">RHSA-2016:0204: 389-ds-base security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160197</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0197">RHSA-2016:0197-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1521">CVE-2016-1521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1522">CVE-2016-1522</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1523">CVE-2016-1523</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1969">CVE-2016-1969</a>]</td>
<td class="Text">RHSA-2016:0197: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160189</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0189">RHSA-2016:0189-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3256">CVE-2015-3256</a>]</td>
<td class="Text">RHSA-2016:0189: polkit security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160188</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0188">RHSA-2016:0188-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7529">CVE-2015-7529</a>]</td>
<td class="Text">RHSA-2016:0188: sos security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160185</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0185">RHSA-2016:0185-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5157">CVE-2015-5157</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7872">CVE-2015-7872</a>]</td>
<td class="Text">RHSA-2016:0185: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160176</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0176">RHSA-2016:0176-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5229">CVE-2015-5229</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7547">CVE-2015-7547</a>]</td>
<td class="Text">RHSA-2016:0176: glibc security and bug fix update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160083</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0083">RHSA-2016:0083-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1714">CVE-2016-1714</a>]</td>
<td class="Text">RHSA-2016:0083: qemu-kvm security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160073</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0073">RHSA-2016:0073-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8704">CVE-2015-8704</a>]</td>
<td class="Text">RHSA-2016:0073: bind security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160071</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0071">RHSA-2016:0071-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1930">CVE-2016-1930</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-1935">CVE-2016-1935</a>]</td>
<td class="Text">RHSA-2016:0071: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160067</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0067">RHSA-2016:0067-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0402">CVE-2016-0402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0448">CVE-2016-0448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0466">CVE-2016-0466</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0483">CVE-2016-0483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0494">CVE-2016-0494</a>]</td>
<td class="Text">RHSA-2016:0067: java-1.6.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160065</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0065">RHSA-2016:0065-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0728">CVE-2016-0728</a>]</td>
<td class="Text">RHSA-2016:0065: kernel-rt security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160064</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0064">RHSA-2016:0064-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0728">CVE-2016-0728</a>]</td>
<td class="Text">RHSA-2016:0064: kernel security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160063</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0063">RHSA-2016:0063-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8138">CVE-2015-8138</a>]</td>
<td class="Text">RHSA-2016:0063: ntp security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160054</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0054">RHSA-2016:0054-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4871">CVE-2015-4871</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7575">CVE-2015-7575</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0402">CVE-2016-0402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0448">CVE-2016-0448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0466">CVE-2016-0466</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0483">CVE-2016-0483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0494">CVE-2016-0494</a>]</td>
<td class="Text">RHSA-2016:0054: java-1.7.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160049</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0049">RHSA-2016:0049-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7575">CVE-2015-7575</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0402">CVE-2016-0402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0448">CVE-2016-0448</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0466">CVE-2016-0466</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0475">CVE-2016-0475</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0483">CVE-2016-0483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0494">CVE-2016-0494</a>]</td>
<td class="Text">RHSA-2016:0049: java-1.8.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160043</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0043">RHSA-2016:0043-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0777">CVE-2016-0777</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0778">CVE-2016-0778</a>]</td>
<td class="Text">RHSA-2016:0043: openssh security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160012</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0012">RHSA-2016:0012-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7575">CVE-2015-7575</a>]</td>
<td class="Text">RHSA-2016:0012: gnutls security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160009</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0009">RHSA-2016:0009-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3223">CVE-2015-3223</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5330">CVE-2015-5330</a>]</td>
<td class="Text">RHSA-2016:0009: libldb security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160008</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0008">RHSA-2016:0008-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7575">CVE-2015-7575</a>]</td>
<td class="Text">RHSA-2016:0008: openssl security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160007</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0007">RHSA-2016:0007-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7575">CVE-2015-7575</a>]</td>
<td class="Text">RHSA-2016:0007: nss security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160006</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0006">RHSA-2016:0006-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5252">CVE-2015-5252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5296">CVE-2015-5296</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5299">CVE-2015-5299</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5330">CVE-2015-5330</a>]</td>
<td class="Text">RHSA-2016:0006: samba security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160005</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0005">RHSA-2016:0005-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7236">CVE-2015-7236</a>]</td>
<td class="Text">RHSA-2016:0005: rpcbind security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20160001</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2016:0001">RHSA-2016:0001-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7201">CVE-2015-7201</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7205">CVE-2015-7205</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7212">CVE-2015-7212</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7213">CVE-2015-7213</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7214">CVE-2015-7214</a>]</td>
<td class="Text">RHSA-2016:0001: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152657</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2657">RHSA-2015:2657-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7201">CVE-2015-7201</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7205">CVE-2015-7205</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7210">CVE-2015-7210</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7212">CVE-2015-7212</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7213">CVE-2015-7213</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7214">CVE-2015-7214</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7222">CVE-2015-7222</a>]</td>
<td class="Text">RHSA-2015:2657: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152655</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2655">RHSA-2015:2655-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8000">CVE-2015-8000</a>]</td>
<td class="Text">RHSA-2015:2655: bind security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152623</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2623">RHSA-2015:2623-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8370">CVE-2015-8370</a>]</td>
<td class="Text">RHSA-2015:2623: grub2 security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152619</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2619">RHSA-2015:2619-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4551">CVE-2015-4551</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5212">CVE-2015-5212</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5213">CVE-2015-5213</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5214">CVE-2015-5214</a>]</td>
<td class="Text">RHSA-2015:2619: libreoffice security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152617</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2617">RHSA-2015:2617-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3194">CVE-2015-3194</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3195">CVE-2015-3195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3196">CVE-2015-3196</a>]</td>
<td class="Text">RHSA-2015:2617: openssl security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152596</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2596">RHSA-2015:2596-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8126">CVE-2015-8126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8472">CVE-2015-8472</a>]</td>
<td class="Text">RHSA-2015:2596: libpng security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152595</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2595">RHSA-2015:2595-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7981">CVE-2015-7981</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8126">CVE-2015-8126</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8472">CVE-2015-8472</a>]</td>
<td class="Text">RHSA-2015:2595: libpng12 security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152561</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2561">RHSA-2015:2561-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7545">CVE-2015-7545</a>]</td>
<td class="Text">RHSA-2015:2561: git security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152552</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2552">RHSA-2015:2552-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5307">CVE-2015-5307</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8104">CVE-2015-8104</a>]</td>
<td class="Text">RHSA-2015:2552: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152550</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2550">RHSA-2015:2550-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1819">CVE-2015-1819</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5312">CVE-2015-5312</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7497">CVE-2015-7497</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7498">CVE-2015-7498</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7499">CVE-2015-7499</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7500">CVE-2015-7500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7941">CVE-2015-7941</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7942">CVE-2015-7942</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8241">CVE-2015-8241</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8242">CVE-2015-8242</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8317">CVE-2015-8317</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8710">CVE-2015-8710</a>]</td>
<td class="Text">RHSA-2015:2550: libxml2 security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152522</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2522">RHSA-2015:2522-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7501">CVE-2015-7501</a>]</td>
<td class="Text">RHSA-2015:2522: apache-commons-collections security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152519</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2519">RHSA-2015:2519-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4513">CVE-2015-4513</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7189">CVE-2015-7189</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7193">CVE-2015-7193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7197">CVE-2015-7197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7198">CVE-2015-7198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7199">CVE-2015-7199</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7200">CVE-2015-7200</a>]</td>
<td class="Text">RHSA-2015:2519: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152505</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2505">RHSA-2015:2505-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5273">CVE-2015-5273</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5287">CVE-2015-5287</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5302">CVE-2015-5302</a>]</td>
<td class="Text">RHSA-2015:2505: abrt and libreport security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152455</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2455">RHSA-2015:2455-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8602">CVE-2014-8602</a>]</td>
<td class="Text">RHSA-2015:2455: unbound security and bug fix update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152417</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2417">RHSA-2015:2417-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8169">CVE-2014-8169</a>]</td>
<td class="Text">RHSA-2015:2417: autofs security, bug fix and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152411</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2411">RHSA-2015:2411-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-7421">CVE-2013-7421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8171">CVE-2014-8171</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9419">CVE-2014-9419</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9644">CVE-2014-9644</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2925">CVE-2015-2925</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3339">CVE-2015-3339</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4170">CVE-2015-4170</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5283">CVE-2015-5283</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7613">CVE-2015-7613</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7837">CVE-2015-7837</a>]</td>
<td class="Text">RHSA-2015:2411: kernel-rt security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152401</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2401">RHSA-2015:2401-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5281">CVE-2015-5281</a>]</td>
<td class="Text">RHSA-2015:2401: grub2 security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152393</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2393">RHSA-2015:2393-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8710">CVE-2014-8710</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8711">CVE-2014-8711</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8712">CVE-2014-8712</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8713">CVE-2014-8713</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8714">CVE-2014-8714</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0562">CVE-2015-0562</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0563">CVE-2015-0563</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0564">CVE-2015-0564</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2188">CVE-2015-2188</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2189">CVE-2015-2189</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2191">CVE-2015-2191</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3182">CVE-2015-3182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3810">CVE-2015-3810</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3811">CVE-2015-3811</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3812">CVE-2015-3812</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3813">CVE-2015-3813</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6243">CVE-2015-6243</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6244">CVE-2015-6244</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6245">CVE-2015-6245</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6246">CVE-2015-6246</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6248">CVE-2015-6248</a>]</td>
<td class="Text">RHSA-2015:2393: wireshark security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152383</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2383">RHSA-2015:2383-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1867">CVE-2015-1867</a>]</td>
<td class="Text">RHSA-2015:2383: pacemaker security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152378</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2378">RHSA-2015:2378-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3455">CVE-2015-3455</a>]</td>
<td class="Text">RHSA-2015:2378: squid security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152369</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2369">RHSA-2015:2369-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3248">CVE-2015-3248</a>]</td>
<td class="Text">RHSA-2015:2369: openhpi security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152360</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2360">RHSA-2015:2360-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3258">CVE-2015-3258</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3279">CVE-2015-3279</a>]</td>
<td class="Text">RHSA-2015:2360: cups-filters security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152355</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2355">RHSA-2015:2355-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5292">CVE-2015-5292</a>]</td>
<td class="Text">RHSA-2015:2355: sssd security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152345</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2345">RHSA-2015:2345-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3565">CVE-2014-3565</a>]</td>
<td class="Text">RHSA-2015:2345: net-snmp security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152315</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2315">RHSA-2015:2315-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0272">CVE-2015-0272</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2924">CVE-2015-2924</a>]</td>
<td class="Text">RHSA-2015:2315: NetworkManager security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152290</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2290">RHSA-2015:2290-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3225">CVE-2015-3225</a>]</td>
<td class="Text">RHSA-2015:2290: pcs security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152248</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2248">RHSA-2015:2248-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8119">CVE-2014-8119</a>]</td>
<td class="Text">RHSA-2015:2248: netcf security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152241</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2241">RHSA-2015:2241-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1821">CVE-2015-1821</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1822">CVE-2015-1822</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1853">CVE-2015-1853</a>]</td>
<td class="Text">RHSA-2015:2241: chrony security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152237</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2237">RHSA-2015:2237-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2675">CVE-2015-2675</a>]</td>
<td class="Text">RHSA-2015:2237: rest security update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152233</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2233">RHSA-2015:2233-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8240">CVE-2014-8240</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8241">CVE-2014-8241</a>]</td>
<td class="Text">RHSA-2015:2233: tigervnc security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152231</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2231">RHSA-2015:2231-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9297">CVE-2014-9297</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9298">CVE-2014-9298</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9750">CVE-2014-9750</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9751">CVE-2014-9751</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1798">CVE-2015-1798</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1799">CVE-2015-1799</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3405">CVE-2015-3405</a>]</td>
<td class="Text">RHSA-2015:2231: ntp security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152199</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2199">RHSA-2015:2199-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-7423">CVE-2013-7423</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1472">CVE-2015-1472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1473">CVE-2015-1473</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1781">CVE-2015-1781</a>]</td>
<td class="Text">RHSA-2015:2199: glibc security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152184</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2184">RHSA-2015:2184-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2704">CVE-2015-2704</a>]</td>
<td class="Text">RHSA-2015:2184: realmd security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152180</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2180">RHSA-2015:2180-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-0334">CVE-2013-0334</a>]</td>
<td class="Text">RHSA-2015:2180: rubygem-bundler and rubygem-thor security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152172</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2172">RHSA-2015:2172-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5277">CVE-2015-5277</a>]</td>
<td class="Text">RHSA-2015:2172: glibc security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152159</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2159">RHSA-2015:2159-06</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3613">CVE-2014-3613</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3707">CVE-2014-3707</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8150">CVE-2014-8150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3143">CVE-2015-3143</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3148">CVE-2015-3148</a>]</td>
<td class="Text">RHSA-2015:2159: curl security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152155</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2155">RHSA-2015:2155-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0207">CVE-2014-0207</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0237">CVE-2014-0237</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0238">CVE-2014-0238</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3478">CVE-2014-3478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3479">CVE-2014-3479</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3480">CVE-2014-3480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3487">CVE-2014-3487</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3538">CVE-2014-3538</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3587">CVE-2014-3587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3710">CVE-2014-3710</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8116">CVE-2014-8116</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8117">CVE-2014-8117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9652">CVE-2014-9652</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9653">CVE-2014-9653</a>]</td>
<td class="Text">RHSA-2015:2155: file security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152154</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2154">RHSA-2015:2154-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5355">CVE-2014-5355</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2694">CVE-2015-2694</a>]</td>
<td class="Text">RHSA-2015:2154: krb5 security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152152</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2152">RHSA-2015:2152-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2010-5313">CVE-2010-5313</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-7421">CVE-2013-7421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3647">CVE-2014-3647</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7842">CVE-2014-7842</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8171">CVE-2014-8171</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9419">CVE-2014-9419</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9644">CVE-2014-9644</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0239">CVE-2015-0239</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2925">CVE-2015-2925</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3288">CVE-2015-3288</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3339">CVE-2015-3339</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4170">CVE-2015-4170</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5283">CVE-2015-5283</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6526">CVE-2015-6526</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7553">CVE-2015-7553</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7613">CVE-2015-7613</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7837">CVE-2015-7837</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-8215">CVE-2015-8215</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0774">CVE-2016-0774</a>]</td>
<td class="Text">RHSA-2015:2152: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152151</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2151">RHSA-2015:2151-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2012-2150">CVE-2012-2150</a>]</td>
<td class="Text">RHSA-2015:2151: xfsprogs security, bug fix and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152140</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2140">RHSA-2015:2140-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1782">CVE-2015-1782</a>]</td>
<td class="Text">RHSA-2015:2140: libssh2 security and bug fix update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152131</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2131">RHSA-2015:2131-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8182">CVE-2014-8182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3276">CVE-2015-3276</a>]</td>
<td class="Text">RHSA-2015:2131: openldap security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152111</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2111">RHSA-2015:2111-07</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1345">CVE-2015-1345</a>]</td>
<td class="Text">RHSA-2015:2111: grep security and bug fix update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152108</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2108">RHSA-2015:2108-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9112">CVE-2014-9112</a>]</td>
<td class="Text">RHSA-2015:2108: cpio security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152101</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2101">RHSA-2015:2101-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-1752">CVE-2013-1752</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-1753">CVE-2013-1753</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4616">CVE-2014-4616</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4650">CVE-2014-4650</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7185">CVE-2014-7185</a>]</td>
<td class="Text">RHSA-2015:2101: python security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152088</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2088">RHSA-2015:2088-06</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5600">CVE-2015-5600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6563">CVE-2015-6563</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6564">CVE-2015-6564</a>]</td>
<td class="Text">RHSA-2015:2088: openssh security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152086</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2086">RHSA-2015:2086-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4734">CVE-2015-4734</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4803">CVE-2015-4803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4805">CVE-2015-4805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4806">CVE-2015-4806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4835">CVE-2015-4835</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4842">CVE-2015-4842</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4843">CVE-2015-4843</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4844">CVE-2015-4844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4860">CVE-2015-4860</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4872">CVE-2015-4872</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4881">CVE-2015-4881</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4882">CVE-2015-4882</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4883">CVE-2015-4883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4893">CVE-2015-4893</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4903">CVE-2015-4903</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4911">CVE-2015-4911</a>]</td>
<td class="Text">RHSA-2015:2086: java-1.6.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152079</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2079">RHSA-2015:2079-09</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8484">CVE-2014-8484</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8485">CVE-2014-8485</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8501">CVE-2014-8501</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8502">CVE-2014-8502</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8503">CVE-2014-8503</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8504">CVE-2014-8504</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8737">CVE-2014-8737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8738">CVE-2014-8738</a>]</td>
<td class="Text">RHSA-2015:2079: binutils security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20152078</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:2078">RHSA-2015:2078-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5288">CVE-2015-5288</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5289">CVE-2015-5289</a>]</td>
<td class="Text">RHSA-2015:2078: postgresql security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151982</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1982">RHSA-2015:1982-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4513">CVE-2015-4513</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7188">CVE-2015-7188</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7189">CVE-2015-7189</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7193">CVE-2015-7193</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7194">CVE-2015-7194</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7196">CVE-2015-7196</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7197">CVE-2015-7197</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7198">CVE-2015-7198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7199">CVE-2015-7199</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7200">CVE-2015-7200</a>]</td>
<td class="Text">RHSA-2015:1982: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151981</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1981">RHSA-2015:1981-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7181">CVE-2015-7181</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7182">CVE-2015-7182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7183">CVE-2015-7183</a>]</td>
<td class="Text">RHSA-2015:1981: nss, nss-util, and nspr security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151979</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1979">RHSA-2015:1979-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3240">CVE-2015-3240</a>]</td>
<td class="Text">RHSA-2015:1979: libreswan security and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151978</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1978">RHSA-2015:1978-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8559">CVE-2014-8559</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5156">CVE-2015-5156</a>]</td>
<td class="Text">RHSA-2015:1978: kernel security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151977</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1977">RHSA-2015:1977-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8559">CVE-2014-8559</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5156">CVE-2015-5156</a>]</td>
<td class="Text">RHSA-2015:1977: kernel-rt security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151943</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1943">RHSA-2015:1943-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1779">CVE-2015-1779</a>]</td>
<td class="Text">RHSA-2015:1943: qemu-kvm security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151930</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1930">RHSA-2015:1930-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5300">CVE-2015-5300</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7704">CVE-2015-7704</a>]</td>
<td class="Text">RHSA-2015:1930: ntp security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151920</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1920">RHSA-2015:1920-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4734">CVE-2015-4734</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4803">CVE-2015-4803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4805">CVE-2015-4805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4806">CVE-2015-4806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4835">CVE-2015-4835</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4840">CVE-2015-4840</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4842">CVE-2015-4842</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4843">CVE-2015-4843</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4844">CVE-2015-4844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4860">CVE-2015-4860</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4872">CVE-2015-4872</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4881">CVE-2015-4881</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4882">CVE-2015-4882</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4883">CVE-2015-4883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4893">CVE-2015-4893</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4903">CVE-2015-4903</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4911">CVE-2015-4911</a>]</td>
<td class="Text">RHSA-2015:1920: java-1.7.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151919</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1919">RHSA-2015:1919-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4734">CVE-2015-4734</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4803">CVE-2015-4803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4805">CVE-2015-4805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4806">CVE-2015-4806</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4835">CVE-2015-4835</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4840">CVE-2015-4840</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4842">CVE-2015-4842</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4843">CVE-2015-4843</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4844">CVE-2015-4844</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4860">CVE-2015-4860</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4868">CVE-2015-4868</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4872">CVE-2015-4872</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4881">CVE-2015-4881</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4882">CVE-2015-4882</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4883">CVE-2015-4883</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4893">CVE-2015-4893</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4903">CVE-2015-4903</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4911">CVE-2015-4911</a>]</td>
<td class="Text">RHSA-2015:1919: java-1.8.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151917</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1917">RHSA-2015:1917-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0848">CVE-2015-0848</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4588">CVE-2015-4588</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4695">CVE-2015-4695</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4696">CVE-2015-4696</a>]</td>
<td class="Text">RHSA-2015:1917: libwmf security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151890</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1890">RHSA-2015:1890-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5260">CVE-2015-5260</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5261">CVE-2015-5261</a>]</td>
<td class="Text">RHSA-2015:1890: spice security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151852</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1852">RHSA-2015:1852-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4500">CVE-2015-4500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4509">CVE-2015-4509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4517">CVE-2015-4517</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4519">CVE-2015-4519</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4520">CVE-2015-4520</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4521">CVE-2015-4521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4522">CVE-2015-4522</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7174">CVE-2015-7174</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7175">CVE-2015-7175</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7176">CVE-2015-7176</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7177">CVE-2015-7177</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7180">CVE-2015-7180</a>]</td>
<td class="Text">RHSA-2015:1852: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151840</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1840">RHSA-2015:1840-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-6908">CVE-2015-6908</a>]</td>
<td class="Text">RHSA-2015:1840: openldap security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151834</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1834">RHSA-2015:1834-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4500">CVE-2015-4500</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4506">CVE-2015-4506</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4509">CVE-2015-4509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4511">CVE-2015-4511</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4517">CVE-2015-4517</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4519">CVE-2015-4519</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4520">CVE-2015-4520</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4521">CVE-2015-4521</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4522">CVE-2015-4522</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7174">CVE-2015-7174</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7175">CVE-2015-7175</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7176">CVE-2015-7176</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7177">CVE-2015-7177</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-7180">CVE-2015-7180</a>]</td>
<td class="Text">RHSA-2015:1834: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151793</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1793">RHSA-2015:1793-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5165">CVE-2015-5165</a>]</td>
<td class="Text">RHSA-2015:1793: qemu-kvm security fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151788</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1788">RHSA-2015:1788-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9585">CVE-2014-9585</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0275">CVE-2015-0275</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1333">CVE-2015-1333</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3212">CVE-2015-3212</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4700">CVE-2015-4700</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5364">CVE-2015-5364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5366">CVE-2015-5366</a>]</td>
<td class="Text">RHSA-2015:1788: kernel-rt security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151778</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1778">RHSA-2015:1778-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9585">CVE-2014-9585</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0275">CVE-2015-0275</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1333">CVE-2015-1333</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3212">CVE-2015-3212</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4700">CVE-2015-4700</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5364">CVE-2015-5364</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5366">CVE-2015-5366</a>]</td>
<td class="Text">RHSA-2015:1778: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151742</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1742">RHSA-2015:1742-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0248">CVE-2015-0248</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0251">CVE-2015-0251</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3184">CVE-2015-3184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3187">CVE-2015-3187</a>]</td>
<td class="Text">RHSA-2015:1742: subversion security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151741</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1741">RHSA-2015:1741-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3281">CVE-2015-3281</a>]</td>
<td class="Text">RHSA-2015:1741: haproxy security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151714</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1714">RHSA-2015:1714-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3247">CVE-2015-3247</a>]</td>
<td class="Text">RHSA-2015:1714: spice security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151708</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1708">RHSA-2015:1708-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1802">CVE-2015-1802</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1803">CVE-2015-1803</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1804">CVE-2015-1804</a>]</td>
<td class="Text">RHSA-2015:1708: libXfont security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151705</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1705">RHSA-2015:1705-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5722">CVE-2015-5722</a>]</td>
<td class="Text">RHSA-2015:1705: bind security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151700</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1700">RHSA-2015:1700-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5189">CVE-2015-5189</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5190">CVE-2015-5190</a>]</td>
<td class="Text">RHSA-2015:1700: pcs security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151699</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1699">RHSA-2015:1699-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2730">CVE-2015-2730</a>]</td>
<td class="Text">RHSA-2015:1699: nss-softokn security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151695</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1695">RHSA-2015:1695-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0254">CVE-2015-0254</a>]</td>
<td class="Text">RHSA-2015:1695: jakarta-taglibs-standard security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151694</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1694">RHSA-2015:1694-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4491">CVE-2015-4491</a>]</td>
<td class="Text">RHSA-2015:1694: gdk-pixbuf2 security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151693</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1693">RHSA-2015:1693-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4497">CVE-2015-4497</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4498">CVE-2015-4498</a>]</td>
<td class="Text">RHSA-2015:1693: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151682</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1682">RHSA-2015:1682-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4473">CVE-2015-4473</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4487">CVE-2015-4487</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4488">CVE-2015-4488</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4489">CVE-2015-4489</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4491">CVE-2015-4491</a>]</td>
<td class="Text">RHSA-2015:1682: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151667</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1667">RHSA-2015:1667-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3183">CVE-2015-3183</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3185">CVE-2015-3185</a>]</td>
<td class="Text">RHSA-2015:1667: httpd security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151665</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1665">RHSA-2015:1665-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0433">CVE-2015-0433</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0441">CVE-2015-0441</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0499">CVE-2015-0499</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0501">CVE-2015-0501</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0505">CVE-2015-0505</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2568">CVE-2015-2568</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2571">CVE-2015-2571</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2573">CVE-2015-2573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2582">CVE-2015-2582</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2620">CVE-2015-2620</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2643">CVE-2015-2643</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2648">CVE-2015-2648</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3152">CVE-2015-3152</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4737">CVE-2015-4737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4752">CVE-2015-4752</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4757">CVE-2015-4757</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4864">CVE-2015-4864</a>]</td>
<td class="Text">RHSA-2015:1665: mariadb security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151640</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1640">RHSA-2015:1640-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3238">CVE-2015-3238</a>]</td>
<td class="Text">RHSA-2015:1640: pam security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151636</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1636">RHSA-2015:1636-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5621">CVE-2015-5621</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2018-1000116">CVE-2018-1000116</a>]</td>
<td class="Text">RHSA-2015:1636: net-snmp security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151635</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1635">RHSA-2015:1635-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3414">CVE-2015-3414</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3415">CVE-2015-3415</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3416">CVE-2015-3416</a>]</td>
<td class="Text">RHSA-2015:1635: sqlite security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151586</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1586">RHSA-2015:1586-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4473">CVE-2015-4473</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4475">CVE-2015-4475</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4478">CVE-2015-4478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4479">CVE-2015-4479</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4480">CVE-2015-4480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4484">CVE-2015-4484</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4485">CVE-2015-4485</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4486">CVE-2015-4486</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4487">CVE-2015-4487</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4488">CVE-2015-4488</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4489">CVE-2015-4489</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4491">CVE-2015-4491</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4492">CVE-2015-4492</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4493">CVE-2015-4493</a>]</td>
<td class="Text">RHSA-2015:1586: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151581</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1581">RHSA-2015:1581-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4495">CVE-2015-4495</a>]</td>
<td class="Text">RHSA-2015:1581: firefox security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151565</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1565">RHSA-2015:1565-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9715">CVE-2014-9715</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2666">CVE-2015-2666</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2922">CVE-2015-2922</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3636">CVE-2015-3636</a>]</td>
<td class="Text">RHSA-2015:1565: kernel-rt security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151534</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1534">RHSA-2015:1534-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9715">CVE-2014-9715</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2666">CVE-2015-2666</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2922">CVE-2015-2922</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3636">CVE-2015-3636</a>]</td>
<td class="Text">RHSA-2015:1534: kernel security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151526</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1526">RHSA-2015:1526-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2590">CVE-2015-2590</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2601">CVE-2015-2601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2621">CVE-2015-2621</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2625">CVE-2015-2625</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2628">CVE-2015-2628</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2632">CVE-2015-2632</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2808">CVE-2015-2808</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4000">CVE-2015-4000</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4731">CVE-2015-4731</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4732">CVE-2015-4732</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4733">CVE-2015-4733</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4748">CVE-2015-4748</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4749">CVE-2015-4749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4760">CVE-2015-4760</a>]</td>
<td class="Text">RHSA-2015:1526: java-1.6.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151513</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1513">RHSA-2015:1513-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5477">CVE-2015-5477</a>]</td>
<td class="Text">RHSA-2015:1513: bind security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151510</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1510">RHSA-2015:1510-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3213">CVE-2015-3213</a>]</td>
<td class="Text">RHSA-2015:1510: clutter security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151507</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1507">RHSA-2015:1507-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3214">CVE-2015-3214</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-5154">CVE-2015-5154</a>]</td>
<td class="Text">RHSA-2015:1507: qemu-kvm security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151483</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1483">RHSA-2015:1483-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3245">CVE-2015-3245</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3246">CVE-2015-3246</a>]</td>
<td class="Text">RHSA-2015:1483: libuser security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151455</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1455">RHSA-2015:1455-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2724">CVE-2015-2724</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2725">CVE-2015-2725</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2731">CVE-2015-2731</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2734">CVE-2015-2734</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2735">CVE-2015-2735</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2736">CVE-2015-2736</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2737">CVE-2015-2737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2738">CVE-2015-2738</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2739">CVE-2015-2739</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2740">CVE-2015-2740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2741">CVE-2015-2741</a>]</td>
<td class="Text">RHSA-2015:1455: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151443</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1443">RHSA-2015:1443-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4620">CVE-2015-4620</a>]</td>
<td class="Text">RHSA-2015:1443: bind security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151229</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1229">RHSA-2015:1229-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2590">CVE-2015-2590</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2601">CVE-2015-2601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2621">CVE-2015-2621</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2625">CVE-2015-2625</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2628">CVE-2015-2628</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2632">CVE-2015-2632</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2808">CVE-2015-2808</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4000">CVE-2015-4000</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4731">CVE-2015-4731</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4732">CVE-2015-4732</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4733">CVE-2015-4733</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4748">CVE-2015-4748</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4749">CVE-2015-4749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4760">CVE-2015-4760</a>]</td>
<td class="Text">RHSA-2015:1229: java-1.7.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151228</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1228">RHSA-2015:1228-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2590">CVE-2015-2590</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2601">CVE-2015-2601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2621">CVE-2015-2621</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2625">CVE-2015-2625</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2628">CVE-2015-2628</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2632">CVE-2015-2632</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2659">CVE-2015-2659</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2808">CVE-2015-2808</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3149">CVE-2015-3149</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4000">CVE-2015-4000</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4731">CVE-2015-4731</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4732">CVE-2015-4732</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4733">CVE-2015-4733</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4748">CVE-2015-4748</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4749">CVE-2015-4749</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4760">CVE-2015-4760</a>]</td>
<td class="Text">RHSA-2015:1228: java-1.8.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151207</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1207">RHSA-2015:1207-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2722">CVE-2015-2722</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2724">CVE-2015-2724</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2725">CVE-2015-2725</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2727">CVE-2015-2727</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2728">CVE-2015-2728</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2729">CVE-2015-2729</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2731">CVE-2015-2731</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2733">CVE-2015-2733</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2734">CVE-2015-2734</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2735">CVE-2015-2735</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2736">CVE-2015-2736</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2737">CVE-2015-2737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2738">CVE-2015-2738</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2739">CVE-2015-2739</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2740">CVE-2015-2740</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2741">CVE-2015-2741</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2743">CVE-2015-2743</a>]</td>
<td class="Text">RHSA-2015:1207: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151194</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1194">RHSA-2015:1194-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3165">CVE-2015-3165</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3166">CVE-2015-3166</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3167">CVE-2015-3167</a>]</td>
<td class="Text">RHSA-2015:1194: postgresql security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151193</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1193">RHSA-2015:1193-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0252">CVE-2015-0252</a>]</td>
<td class="Text">RHSA-2015:1193: xerces-c security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151185</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1185">RHSA-2015:1185-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2721">CVE-2015-2721</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4000">CVE-2015-4000</a>]</td>
<td class="Text">RHSA-2015:1185: nss security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151154</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1154">RHSA-2015:1154-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3204">CVE-2015-3204</a>]</td>
<td class="Text">RHSA-2015:1154: libreswan security, bug fix and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151153</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1153">RHSA-2015:1153-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2775">CVE-2015-2775</a>]</td>
<td class="Text">RHSA-2015:1153: mailman security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151139</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1139">RHSA-2015:1139-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9420">CVE-2014-9420</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9529">CVE-2014-9529</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9584">CVE-2014-9584</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1573">CVE-2015-1573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1593">CVE-2015-1593</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1805">CVE-2015-1805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2830">CVE-2015-2830</a>]</td>
<td class="Text">RHSA-2015:1139: kernel-rt security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151137</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1137">RHSA-2015:1137-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9420">CVE-2014-9420</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9529">CVE-2014-9529</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9584">CVE-2014-9584</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1573">CVE-2015-1573</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1593">CVE-2015-1593</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1805">CVE-2015-1805</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2830">CVE-2015-2830</a>]</td>
<td class="Text">RHSA-2015:1137: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151135</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1135">RHSA-2015:1135-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8142">CVE-2014-8142</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9652">CVE-2014-9652</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9705">CVE-2014-9705</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9709">CVE-2014-9709</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0231">CVE-2015-0231</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0232">CVE-2015-0232</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0273">CVE-2015-0273</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2301">CVE-2015-2301</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2348">CVE-2015-2348</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2783">CVE-2015-2783</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2787">CVE-2015-2787</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3307">CVE-2015-3307</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3329">CVE-2015-3329</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3330">CVE-2015-3330</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3411">CVE-2015-3411</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3412">CVE-2015-3412</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4021">CVE-2015-4021</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4022">CVE-2015-4022</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4024">CVE-2015-4024</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4025">CVE-2015-4025</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4026">CVE-2015-4026</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4147">CVE-2015-4147</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4148">CVE-2015-4148</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4598">CVE-2015-4598</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4599">CVE-2015-4599</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4600">CVE-2015-4600</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4601">CVE-2015-4601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4602">CVE-2015-4602</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4603">CVE-2015-4603</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4604">CVE-2015-4604</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4605">CVE-2015-4605</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4643">CVE-2015-4643</a>]</td>
<td class="Text">RHSA-2015:1135: php security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151123</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1123">RHSA-2015:1123-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9679">CVE-2014-9679</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1158">CVE-2015-1158</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1159">CVE-2015-1159</a>]</td>
<td class="Text">RHSA-2015:1123: cups security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151115</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1115">RHSA-2015:1115-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8176">CVE-2014-8176</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1789">CVE-2015-1789</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1790">CVE-2015-1790</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1791">CVE-2015-1791</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1792">CVE-2015-1792</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3216">CVE-2015-3216</a>]</td>
<td class="Text">RHSA-2015:1115: openssl security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151090</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1090">RHSA-2015:1090-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1863">CVE-2015-1863</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4142">CVE-2015-4142</a>]</td>
<td class="Text">RHSA-2015:1090: wpa_supplicant security and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151083</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1083">RHSA-2015:1083-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1869">CVE-2015-1869</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1870">CVE-2015-1870</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3142">CVE-2015-3142</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3147">CVE-2015-3147</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3150">CVE-2015-3150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3151">CVE-2015-3151</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3159">CVE-2015-3159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3315">CVE-2015-3315</a>]</td>
<td class="Text">RHSA-2015:1083: abrt security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151072</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1072">RHSA-2015:1072-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4000">CVE-2015-4000</a>]</td>
<td class="Text">RHSA-2015:1072: openssl security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20151012</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:1012">RHSA-2015:1012-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2708">CVE-2015-2708</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2710">CVE-2015-2710</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2713">CVE-2015-2713</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2716">CVE-2015-2716</a>]</td>
<td class="Text">RHSA-2015:1012: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150999</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0999">RHSA-2015:0999-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3456">CVE-2015-3456</a>]</td>
<td class="Text">RHSA-2015:0999: qemu-kvm security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150988</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0988">RHSA-2015:0988-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0797">CVE-2015-0797</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2708">CVE-2015-2708</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2710">CVE-2015-2710</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2713">CVE-2015-2713</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-2716">CVE-2015-2716</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-4496">CVE-2015-4496</a>]</td>
<td class="Text">RHSA-2015:0988: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150987</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0987">RHSA-2015:0987-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3331">CVE-2015-3331</a>]</td>
<td class="Text">RHSA-2015:0987: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150986</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0986">RHSA-2015:0986-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0267">CVE-2015-0267</a>]</td>
<td class="Text">RHSA-2015:0986: kexec-tools security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150983</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0983">RHSA-2015:0983-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0227">CVE-2014-0227</a>]</td>
<td class="Text">RHSA-2015:0983: tomcat security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150981</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0981">RHSA-2015:0981-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3331">CVE-2015-3331</a>]</td>
<td class="Text">RHSA-2015:0981: kernel-rt security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150980</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0980">RHSA-2015:0980-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1848">CVE-2015-1848</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-3983">CVE-2015-3983</a>]</td>
<td class="Text">RHSA-2015:0980: pcs security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150895</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0895">RHSA-2015:0895-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1854">CVE-2015-1854</a>]</td>
<td class="Text">RHSA-2015:0895: 389-ds-base security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150809</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0809">RHSA-2015:0809-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2005-1080">CVE-2005-1080</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0460">CVE-2015-0460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0469">CVE-2015-0469</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0470">CVE-2015-0470</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0477">CVE-2015-0477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0478">CVE-2015-0478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0480">CVE-2015-0480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0488">CVE-2015-0488</a>]</td>
<td class="Text">RHSA-2015:0809: java-1.8.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150808</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0808">RHSA-2015:0808-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2005-1080">CVE-2005-1080</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0460">CVE-2015-0460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0469">CVE-2015-0469</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0477">CVE-2015-0477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0478">CVE-2015-0478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0480">CVE-2015-0480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0488">CVE-2015-0488</a>]</td>
<td class="Text">RHSA-2015:0808: java-1.6.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150806</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0806">RHSA-2015:0806-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2005-1080">CVE-2005-1080</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0460">CVE-2015-0460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0469">CVE-2015-0469</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0477">CVE-2015-0477</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0478">CVE-2015-0478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0480">CVE-2015-0480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0488">CVE-2015-0488</a>]</td>
<td class="Text">RHSA-2015:0806: java-1.7.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150797</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0797">RHSA-2015:0797-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0255">CVE-2015-0255</a>]</td>
<td class="Text">RHSA-2015:0797: xorg-x11-server security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150771</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0771">RHSA-2015:0771-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0801">CVE-2015-0801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0807">CVE-2015-0807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0813">CVE-2015-0813</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0815">CVE-2015-0815</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0816">CVE-2015-0816</a>]</td>
<td class="Text">RHSA-2015:0771: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150767</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0767">RHSA-2015:0767-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8962">CVE-2014-8962</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9028">CVE-2014-9028</a>]</td>
<td class="Text">RHSA-2015:0767: flac security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150766</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0766">RHSA-2015:0766-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0801">CVE-2015-0801</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0807">CVE-2015-0807</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0813">CVE-2015-0813</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0815">CVE-2015-0815</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0816">CVE-2015-0816</a>]</td>
<td class="Text">RHSA-2015:0766: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150750</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0750">RHSA-2015:0750-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8161">CVE-2014-8161</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0241">CVE-2015-0241</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0243">CVE-2015-0243</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0244">CVE-2015-0244</a>]</td>
<td class="Text">RHSA-2015:0750: postgresql security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150749</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0749">RHSA-2015:0749-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0191">CVE-2014-0191</a>]</td>
<td class="Text">RHSA-2015:0749: libxml2 security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150729</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0729">RHSA-2015:0729-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1815">CVE-2015-1815</a>]</td>
<td class="Text">RHSA-2015:0729: setroubleshoot security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150728</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0728">RHSA-2015:0728-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0283">CVE-2015-0283</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1827">CVE-2015-1827</a>]</td>
<td class="Text">RHSA-2015:0728: ipa and slapi-nis security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150727</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0727">RHSA-2015:0727-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8159">CVE-2014-8159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1421">CVE-2015-1421</a>]</td>
<td class="Text">RHSA-2015:0727: kernel-rt security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150726</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0726">RHSA-2015:0726-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8159">CVE-2014-8159</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1421">CVE-2015-1421</a>]</td>
<td class="Text">RHSA-2015:0726: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150718</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0718">RHSA-2015:0718-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0817">CVE-2015-0817</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0818">CVE-2015-0818</a>]</td>
<td class="Text">RHSA-2015:0718: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150716</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0716">RHSA-2015:0716-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0209">CVE-2015-0209</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0286">CVE-2015-0286</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0287">CVE-2015-0287</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0288">CVE-2015-0288</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0289">CVE-2015-0289</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0292">CVE-2015-0292</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0293">CVE-2015-0293</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0703">CVE-2016-0703</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2016-0704">CVE-2016-0704</a>]</td>
<td class="Text">RHSA-2015:0716: openssl security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150700</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0700">RHSA-2015:0700-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8139">CVE-2014-8139</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8140">CVE-2014-8140</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8141">CVE-2014-8141</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9636">CVE-2014-9636</a>]</td>
<td class="Text">RHSA-2015:0700: unzip security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150696</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0696">RHSA-2015:0696-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9657">CVE-2014-9657</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9658">CVE-2014-9658</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9660">CVE-2014-9660</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9661">CVE-2014-9661</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9663">CVE-2014-9663</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9664">CVE-2014-9664</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9667">CVE-2014-9667</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9669">CVE-2014-9669</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9670">CVE-2014-9670</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9671">CVE-2014-9671</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9673">CVE-2014-9673</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9674">CVE-2014-9674</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9675">CVE-2014-9675</a>]</td>
<td class="Text">RHSA-2015:0696: freetype security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150672</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0672">RHSA-2015:0672-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-1349">CVE-2015-1349</a>]</td>
<td class="Text">RHSA-2015:0672: bind security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150642</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0642">RHSA-2015:0642-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0822">CVE-2015-0822</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0827">CVE-2015-0827</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0831">CVE-2015-0831</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0836">CVE-2015-0836</a>]</td>
<td class="Text">RHSA-2015:0642: thunderbird security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150535</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0535">RHSA-2015:0535-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7300">CVE-2014-7300</a>]</td>
<td class="Text">RHSA-2015:0535: GNOME Shell security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150442</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0442">RHSA-2015:0442-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2010-5312">CVE-2010-5312</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2012-6662">CVE-2012-6662</a>]</td>
<td class="Text">RHSA-2015:0442: ipa security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150439</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0439">RHSA-2015:0439-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4341">CVE-2014-4341</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4342">CVE-2014-4342</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4343">CVE-2014-4343</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4344">CVE-2014-4344</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4345">CVE-2014-4345</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5352">CVE-2014-5352</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5353">CVE-2014-5353</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9421">CVE-2014-9421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9422">CVE-2014-9422</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9423">CVE-2014-9423</a>]</td>
<td class="Text">RHSA-2015:0439: krb5 security, bug fix and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150430</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0430">RHSA-2015:0430-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0189">CVE-2014-0189</a>]</td>
<td class="Text">RHSA-2015:0430: virt-who security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150425</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0425">RHSA-2015:0425-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2653">CVE-2014-2653</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9278">CVE-2014-9278</a>]</td>
<td class="Text">RHSA-2015:0425: openssh security, bug fix and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150416</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0416">RHSA-2015:0416-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8105">CVE-2014-8105</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8112">CVE-2014-8112</a>]</td>
<td class="Text">RHSA-2015:0416: 389-ds-base security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150384</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0384">RHSA-2015:0384-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4040">CVE-2014-4040</a>]</td>
<td class="Text">RHSA-2015:0384: powerpc-utils security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150383</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0383">RHSA-2015:0383-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4038">CVE-2014-4038</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4039">CVE-2014-4039</a>]</td>
<td class="Text">RHSA-2015:0383: ppc64-diag security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150377</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0377">RHSA-2015:0377-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0247">CVE-2014-0247</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3575">CVE-2014-3575</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3693">CVE-2014-3693</a>]</td>
<td class="Text">RHSA-2015:0377: libreoffice security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150349</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0349">RHSA-2015:0349-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3640">CVE-2014-3640</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7815">CVE-2014-7815</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7840">CVE-2014-7840</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8106">CVE-2014-8106</a>]</td>
<td class="Text">RHSA-2015:0349: qemu-kvm security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150330</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0330">RHSA-2015:0330-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8964">CVE-2014-8964</a>]</td>
<td class="Text">RHSA-2015:0330: pcre security and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150327</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0327">RHSA-2015:0327-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6040">CVE-2014-6040</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8121">CVE-2014-8121</a>]</td>
<td class="Text">RHSA-2015:0327: glibc security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150325</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0325">RHSA-2015:0325-03</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-5704">CVE-2013-5704</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3581">CVE-2014-3581</a>]</td>
<td class="Text">RHSA-2015:0325: httpd security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150323</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0323">RHSA-2015:0323-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8136">CVE-2014-8136</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0236">CVE-2015-0236</a>]</td>
<td class="Text">RHSA-2015:0323: libvirt security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150301</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0301">RHSA-2015:0301-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9273">CVE-2014-9273</a>]</td>
<td class="Text">RHSA-2015:0301: hivex security, bug fix, and enhancement update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150290</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0290">RHSA-2015:0290-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3690">CVE-2014-3690</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3940">CVE-2014-3940</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7825">CVE-2014-7825</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7826">CVE-2014-7826</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8086">CVE-2014-8086</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8160">CVE-2014-8160</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8172">CVE-2014-8172</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8173">CVE-2014-8173</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8709">CVE-2014-8709</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8884">CVE-2014-8884</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0274">CVE-2015-0274</a>]</td>
<td class="Text">RHSA-2015:0290: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150265</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0265">RHSA-2015:0265-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0822">CVE-2015-0822</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0827">CVE-2015-0827</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0831">CVE-2015-0831</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0836">CVE-2015-0836</a>]</td>
<td class="Text">RHSA-2015:0265: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150252</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0252">RHSA-2015:0252-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0240">CVE-2015-0240</a>]</td>
<td class="Text">RHSA-2015:0252: samba security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150166</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0166">RHSA-2015:0166-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3528">CVE-2014-3528</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3580">CVE-2014-3580</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8108">CVE-2014-8108</a>]</td>
<td class="Text">RHSA-2015:0166: subversion security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150118</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0118">RHSA-2015:0118-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6568">CVE-2014-6568</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0374">CVE-2015-0374</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0381">CVE-2015-0381</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0382">CVE-2015-0382</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0391">CVE-2015-0391</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0411">CVE-2015-0411</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0432">CVE-2015-0432</a>]</td>
<td class="Text">RHSA-2015:0118: mariadb security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150102</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0102">RHSA-2015:0102-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4171">CVE-2014-4171</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5471">CVE-2014-5471</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5472">CVE-2014-5472</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7145">CVE-2014-7145</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7822">CVE-2014-7822</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7841">CVE-2014-7841</a>]</td>
<td class="Text">RHSA-2015:0102: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150100</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0100">RHSA-2015:0100-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9130">CVE-2014-9130</a>]</td>
<td class="Text">RHSA-2015:0100: libyaml security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150092</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0092">RHSA-2015:0092-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0235">CVE-2015-0235</a>]</td>
<td class="Text">RHSA-2015:0092: glibc security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150085</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0085">RHSA-2015:0085-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3566">CVE-2014-3566</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6585">CVE-2014-6585</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6587">CVE-2014-6587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6591">CVE-2014-6591</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6593">CVE-2014-6593</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6601">CVE-2014-6601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0383">CVE-2015-0383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0395">CVE-2015-0395</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0407">CVE-2015-0407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0408">CVE-2015-0408</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0410">CVE-2015-0410</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0412">CVE-2015-0412</a>]</td>
<td class="Text">RHSA-2015:0085: java-1.6.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150074</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0074">RHSA-2015:0074-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8157">CVE-2014-8157</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8158">CVE-2014-8158</a>]</td>
<td class="Text">RHSA-2015:0074: jasper security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150067</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0067">RHSA-2015:0067-05</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3566">CVE-2014-3566</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6585">CVE-2014-6585</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6587">CVE-2014-6587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6591">CVE-2014-6591</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6593">CVE-2014-6593</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6601">CVE-2014-6601</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0383">CVE-2015-0383</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0395">CVE-2015-0395</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0407">CVE-2015-0407</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0408">CVE-2015-0408</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0410">CVE-2015-0410</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0412">CVE-2015-0412</a>]</td>
<td class="Text">RHSA-2015:0067: java-1.7.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150066</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0066">RHSA-2015:0066-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3570">CVE-2014-3570</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3571">CVE-2014-3571</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3572">CVE-2014-3572</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8275">CVE-2014-8275</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0204">CVE-2015-0204</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0205">CVE-2015-0205</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2015-0206">CVE-2015-0206</a>]</td>
<td class="Text">RHSA-2015:0066: openssl security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150046</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0046">RHSA-2015:0046-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8634">CVE-2014-8634</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8638">CVE-2014-8638</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8639">CVE-2014-8639</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8641">CVE-2014-8641</a>]</td>
<td class="Text">RHSA-2015:0046: firefox security and bug fix update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20150008</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2015:0008">RHSA-2015:0008-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7823">CVE-2014-7823</a>]</td>
<td class="Text">RHSA-2015:0008: libvirt security and bug fix update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20142024</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:2024">RHSA-2014:2024-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9293">CVE-2014-9293</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9294">CVE-2014-9294</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9295">CVE-2014-9295</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9296">CVE-2014-9296</a>]</td>
<td class="Text">RHSA-2014:2024: ntp security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20142023</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:2023">RHSA-2014:2023-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7817">CVE-2014-7817</a>]</td>
<td class="Text">RHSA-2014:2023: glibc security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20142021</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:2021">RHSA-2014:2021-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8137">CVE-2014-8137</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8138">CVE-2014-8138</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9029">CVE-2014-9029</a>]</td>
<td class="Text">RHSA-2014:2021: jasper security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20142010</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:2010">RHSA-2014:2010-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-9322">CVE-2014-9322</a>]</td>
<td class="Text">RHSA-2014:2010: kernel security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141999</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1999">RHSA-2014:1999-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2004-2771">CVE-2004-2771</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7844">CVE-2014-7844</a>]</td>
<td class="Text">RHSA-2014:1999: mailx security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141984</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1984">RHSA-2014:1984-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8500">CVE-2014-8500</a>]</td>
<td class="Text">RHSA-2014:1984: bind security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141983</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1983">RHSA-2014:1983-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8091">CVE-2014-8091</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8092">CVE-2014-8092</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8093">CVE-2014-8093</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8094">CVE-2014-8094</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8095">CVE-2014-8095</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8096">CVE-2014-8096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8097">CVE-2014-8097</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8098">CVE-2014-8098</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8099">CVE-2014-8099</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8100">CVE-2014-8100</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8101">CVE-2014-8101</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8102">CVE-2014-8102</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8103">CVE-2014-8103</a>]</td>
<td class="Text">RHSA-2014:1983: xorg-x11-server security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141976</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1976">RHSA-2014:1976-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-6435">CVE-2013-6435</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8118">CVE-2014-8118</a>]</td>
<td class="Text">RHSA-2014:1976: rpm security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141971</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1971">RHSA-2014:1971-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-2929">CVE-2013-2929</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1739">CVE-2014-1739</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3181">CVE-2014-3181</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3182">CVE-2014-3182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3184">CVE-2014-3184</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3185">CVE-2014-3185</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3186">CVE-2014-3186</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3631">CVE-2014-3631</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3673">CVE-2014-3673</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3687">CVE-2014-3687</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3688">CVE-2014-3688</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4027">CVE-2014-4027</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4652">CVE-2014-4652</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4654">CVE-2014-4654</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4655">CVE-2014-4655</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4656">CVE-2014-4656</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5045">CVE-2014-5045</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6410">CVE-2014-6410</a>]</td>
<td class="Text">RHSA-2014:1971: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141956</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1956">RHSA-2014:1956-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3686">CVE-2014-3686</a>]</td>
<td class="Text">RHSA-2014:1956: wpa_supplicant security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141948</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1948">RHSA-2014:1948-02</a>]</td>
<td class="Text">RHSA-2014:1948: nss, nss-util, and nss-softokn security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141919</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1919">RHSA-2014:1919-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1587">CVE-2014-1587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1590">CVE-2014-1590</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1592">CVE-2014-1592</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1593">CVE-2014-1593</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1594">CVE-2014-1594</a>]</td>
<td class="Text">RHSA-2014:1919: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141912</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1912">RHSA-2014:1912-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4975">CVE-2014-4975</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8080">CVE-2014-8080</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8090">CVE-2014-8090</a>]</td>
<td class="Text">RHSA-2014:1912: ruby security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141870</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1870">RHSA-2014:1870-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0209">CVE-2014-0209</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0210">CVE-2014-0210</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0211">CVE-2014-0211</a>]</td>
<td class="Text">RHSA-2014:1870: libXfont security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141861</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1861">RHSA-2014:1861-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2012-5615">CVE-2012-5615</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2494">CVE-2014-2494</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4207">CVE-2014-4207</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4243">CVE-2014-4243</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4258">CVE-2014-4258</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4260">CVE-2014-4260</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4274">CVE-2014-4274</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4287">CVE-2014-4287</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6463">CVE-2014-6463</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6464">CVE-2014-6464</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6469">CVE-2014-6469</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6484">CVE-2014-6484</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6505">CVE-2014-6505</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6507">CVE-2014-6507</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6520">CVE-2014-6520</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6530">CVE-2014-6530</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6551">CVE-2014-6551</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6555">CVE-2014-6555</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6559">CVE-2014-6559</a>]</td>
<td class="Text">RHSA-2014:1861: mariadb security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141846</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1846">RHSA-2014:1846-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-8564">CVE-2014-8564</a>]</td>
<td class="Text">RHSA-2014:1846: gnutls security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141827</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1827">RHSA-2014:1827-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6053">CVE-2014-6053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6054">CVE-2014-6054</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6055">CVE-2014-6055</a>]</td>
<td class="Text">RHSA-2014:1827: kdenetwork security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141826</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1826">RHSA-2014:1826-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6051">CVE-2014-6051</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6052">CVE-2014-6052</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6053">CVE-2014-6053</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6054">CVE-2014-6054</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6055">CVE-2014-6055</a>]</td>
<td class="Text">RHSA-2014:1826: libvncserver security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141801</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1801">RHSA-2014:1801-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3675">CVE-2014-3675</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3676">CVE-2014-3676</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3677">CVE-2014-3677</a>]</td>
<td class="Text">RHSA-2014:1801: shim security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141795</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1795">RHSA-2014:1795-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4337">CVE-2014-4337</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4338">CVE-2014-4338</a>]</td>
<td class="Text">RHSA-2014:1795: cups-filters security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141767</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1767">RHSA-2014:1767-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3668">CVE-2014-3668</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3669">CVE-2014-3669</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3670">CVE-2014-3670</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3710">CVE-2014-3710</a>]</td>
<td class="Text">RHSA-2014:1767: php security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141764</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1764">RHSA-2014:1764-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4877">CVE-2014-4877</a>]</td>
<td class="Text">RHSA-2014:1764: wget security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141724</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1724">RHSA-2014:1724-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3611">CVE-2014-3611</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3645">CVE-2014-3645</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3646">CVE-2014-3646</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4653">CVE-2014-4653</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5077">CVE-2014-5077</a>]</td>
<td class="Text">RHSA-2014:1724: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141676</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1676">RHSA-2014:1676-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6421">CVE-2014-6421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6422">CVE-2014-6422</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6423">CVE-2014-6423</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6424">CVE-2014-6424</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6425">CVE-2014-6425</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6426">CVE-2014-6426</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6427">CVE-2014-6427</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6428">CVE-2014-6428</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6429">CVE-2014-6429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6430">CVE-2014-6430</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6431">CVE-2014-6431</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6432">CVE-2014-6432</a>]</td>
<td class="Text">RHSA-2014:1676: wireshark security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141669</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1669">RHSA-2014:1669-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3615">CVE-2014-3615</a>]</td>
<td class="Text">RHSA-2014:1669: qemu-kvm security and bug fix update (Low)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141655</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1655">RHSA-2014:1655-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3660">CVE-2014-3660</a>]</td>
<td class="Text">RHSA-2014:1655: libxml2 security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141652</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1652">RHSA-2014:1652-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3513">CVE-2014-3513</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3567">CVE-2014-3567</a>]</td>
<td class="Text">RHSA-2014:1652: openssl security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141635</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1635">RHSA-2014:1635-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1574">CVE-2014-1574</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1576">CVE-2014-1576</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1577">CVE-2014-1577</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1578">CVE-2014-1578</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1581">CVE-2014-1581</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1583">CVE-2014-1583</a>]</td>
<td class="Text">RHSA-2014:1635: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141634</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1634">RHSA-2014:1634-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6457">CVE-2014-6457</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6502">CVE-2014-6502</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6504">CVE-2014-6504</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6506">CVE-2014-6506</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6511">CVE-2014-6511</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6512">CVE-2014-6512</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6517">CVE-2014-6517</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6519">CVE-2014-6519</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6531">CVE-2014-6531</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6558">CVE-2014-6558</a>]</td>
<td class="Text">RHSA-2014:1634: java-1.6.0-openjdk security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141620</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1620">RHSA-2014:1620-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6457">CVE-2014-6457</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6502">CVE-2014-6502</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6504">CVE-2014-6504</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6506">CVE-2014-6506</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6511">CVE-2014-6511</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6512">CVE-2014-6512</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6517">CVE-2014-6517</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6519">CVE-2014-6519</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6531">CVE-2014-6531</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6558">CVE-2014-6558</a>]</td>
<td class="Text">RHSA-2014:1620: java-1.7.0-openjdk security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141397</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1397">RHSA-2014:1397-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3634">CVE-2014-3634</a>]</td>
<td class="Text">RHSA-2014:1397: rsyslog security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141359</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1359">RHSA-2014:1359-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5033">CVE-2014-5033</a>]</td>
<td class="Text">RHSA-2014:1359: polkit-qt security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141352</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1352">RHSA-2014:1352-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3633">CVE-2014-3633</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3657">CVE-2014-3657</a>]</td>
<td class="Text">RHSA-2014:1352: libvirt security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141327</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1327">RHSA-2014:1327-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2497">CVE-2014-2497</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3478">CVE-2014-3478</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3538">CVE-2014-3538</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3587">CVE-2014-3587</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3597">CVE-2014-3597</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4670">CVE-2014-4670</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4698">CVE-2014-4698</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5120">CVE-2014-5120</a>]</td>
<td class="Text">RHSA-2014:1327: php security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141319</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1319">RHSA-2014:1319-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4002">CVE-2013-4002</a>]</td>
<td class="Text">RHSA-2014:1319: xerces-j2 security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141307</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1307">RHSA-2014:1307-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1568">CVE-2014-1568</a>]</td>
<td class="Text">RHSA-2014:1307: nss security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141306</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1306">RHSA-2014:1306-06</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7169">CVE-2014-7169</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7186">CVE-2014-7186</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-7187">CVE-2014-7187</a>]</td>
<td class="Text">RHSA-2014:1306: bash security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141293</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1293">RHSA-2014:1293-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6271">CVE-2014-6271</a>]</td>
<td class="Text">RHSA-2014:1293: bash security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141292</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1292">RHSA-2014:1292-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-6269">CVE-2014-6269</a>]</td>
<td class="Text">RHSA-2014:1292: haproxy security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141281</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1281">RHSA-2014:1281-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3917">CVE-2014-3917</a>]</td>
<td class="Text">RHSA-2014:1281: kernel security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141172</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1172">RHSA-2014:1172-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3618">CVE-2014-3618</a>]</td>
<td class="Text">RHSA-2014:1172: procmail security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141166</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1166">RHSA-2014:1166-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3577">CVE-2014-3577</a>]</td>
<td class="Text">RHSA-2014:1166: jakarta-commons-httpclient security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141147</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1147">RHSA-2014:1147-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3609">CVE-2014-3609</a>]</td>
<td class="Text">RHSA-2014:1147: squid security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141146</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1146">RHSA-2014:1146-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3577">CVE-2014-3577</a>]</td>
<td class="Text">RHSA-2014:1146: httpcomponents-client security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141144</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1144">RHSA-2014:1144-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1562">CVE-2014-1562</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1567">CVE-2014-1567</a>]</td>
<td class="Text">RHSA-2014:1144: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141110</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1110">RHSA-2014:1110-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0475">CVE-2014-0475</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5119">CVE-2014-5119</a>]</td>
<td class="Text">RHSA-2014:1110: glibc security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141091</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1091">RHSA-2014:1091-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0240">CVE-2014-0240</a>]</td>
<td class="Text">RHSA-2014:1091: mod_wsgi security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141073</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1073">RHSA-2014:1073-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1492">CVE-2014-1492</a>]</td>
<td class="Text">RHSA-2014:1073: nss, nss-util, nss-softokn security, bug fix, and enhancement update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141052</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1052">RHSA-2014:1052-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3505">CVE-2014-3505</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3506">CVE-2014-3506</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3507">CVE-2014-3507</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3508">CVE-2014-3508</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3509">CVE-2014-3509</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3510">CVE-2014-3510</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3511">CVE-2014-3511</a>]</td>
<td class="Text">RHSA-2014:1052: openssl security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141034</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1034">RHSA-2014:1034-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0119">CVE-2014-0119</a>]</td>
<td class="Text">RHSA-2014:1034: tomcat security update (Low)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141031</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1031">RHSA-2014:1031-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3562">CVE-2014-3562</a>]</td>
<td class="Text">RHSA-2014:1031: 389-ds-base security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141023</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1023">RHSA-2014:1023-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0181">CVE-2014-0181</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2672">CVE-2014-2672</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2673">CVE-2014-2673</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2706">CVE-2014-2706</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3534">CVE-2014-3534</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4667">CVE-2014-4667</a>]</td>
<td class="Text">RHSA-2014:1023: kernel security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141013</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1013">RHSA-2014:1013-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-7345">CVE-2013-7345</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0207">CVE-2014-0207</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0237">CVE-2014-0237</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0238">CVE-2014-0238</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3479">CVE-2014-3479</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3480">CVE-2014-3480</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3487">CVE-2014-3487</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3515">CVE-2014-3515</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4049">CVE-2014-4049</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4721">CVE-2014-4721</a>]</td>
<td class="Text">RHSA-2014:1013: php security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141011</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1011">RHSA-2014:1011-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3490">CVE-2014-3490</a>]</td>
<td class="Text">RHSA-2014:1011: resteasy-base security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20141008</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:1008">RHSA-2014:1008-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3560">CVE-2014-3560</a>]</td>
<td class="Text">RHSA-2014:1008: samba security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140927</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0927">RHSA-2014:0927-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4148">CVE-2013-4148</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4149">CVE-2013-4149</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4150">CVE-2013-4150</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4151">CVE-2013-4151</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4527">CVE-2013-4527</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4529">CVE-2013-4529</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4535">CVE-2013-4535</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4536">CVE-2013-4536</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4541">CVE-2013-4541</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4542">CVE-2013-4542</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-6399">CVE-2013-6399</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0182">CVE-2014-0182</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0222">CVE-2014-0222</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0223">CVE-2014-0223</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3461">CVE-2014-3461</a>]</td>
<td class="Text">RHSA-2014:0927: qemu-kvm security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140923</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0923">RHSA-2014:0923-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4699">CVE-2014-4699</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4943">CVE-2014-4943</a>]</td>
<td class="Text">RHSA-2014:0923: kernel security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140921</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0921">RHSA-2014:0921-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4352">CVE-2013-4352</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0117">CVE-2014-0117</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0118">CVE-2014-0118</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0226">CVE-2014-0226</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0231">CVE-2014-0231</a>]</td>
<td class="Text">RHSA-2014:0921: httpd security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140919</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0919">RHSA-2014:0919-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1547">CVE-2014-1547</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1555">CVE-2014-1555</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1556">CVE-2014-1556</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1557">CVE-2014-1557</a>]</td>
<td class="Text">RHSA-2014:0919: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140916</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0916">RHSA-2014:0916-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1544">CVE-2014-1544</a>]</td>
<td class="Text">RHSA-2014:0916: nss and nspr security update (Critical)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140914</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0914">RHSA-2014:0914-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0179">CVE-2014-0179</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-5177">CVE-2014-5177</a>]</td>
<td class="Text">RHSA-2014:0914: libvirt security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140907</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0907">RHSA-2014:0907-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2490">CVE-2014-2490</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4209">CVE-2014-4209</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4216">CVE-2014-4216</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4218">CVE-2014-4218</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4219">CVE-2014-4219</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4244">CVE-2014-4244</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4252">CVE-2014-4252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4262">CVE-2014-4262</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4263">CVE-2014-4263</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4266">CVE-2014-4266</a>]</td>
<td class="Text">RHSA-2014:0907: java-1.6.0-openjdk security and bug fix update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140889</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0889">RHSA-2014:0889-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2483">CVE-2014-2483</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2490">CVE-2014-2490</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4209">CVE-2014-4209</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4216">CVE-2014-4216</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4218">CVE-2014-4218</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4219">CVE-2014-4219</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4221">CVE-2014-4221</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4223">CVE-2014-4223</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4244">CVE-2014-4244</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4252">CVE-2014-4252</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4262">CVE-2014-4262</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4263">CVE-2014-4263</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4266">CVE-2014-4266</a>]</td>
<td class="Text">RHSA-2014:0889: java-1.7.0-openjdk security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140867</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0867">RHSA-2014:0867-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0178">CVE-2014-0178</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0244">CVE-2014-0244</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3493">CVE-2014-3493</a>]</td>
<td class="Text">RHSA-2014:0867: samba security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140861</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0861">RHSA-2014:0861-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-4607">CVE-2014-4607</a>]</td>
<td class="Text">RHSA-2014:0861: lzo security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140827</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0827">RHSA-2014:0827-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0075">CVE-2014-0075</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0096">CVE-2014-0096</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0099">CVE-2014-0099</a>]</td>
<td class="Text">RHSA-2014:0827: tomcat security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140790</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0790">RHSA-2014:0790-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3430">CVE-2014-3430</a>]</td>
<td class="Text">RHSA-2014:0790: dovecot security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140786</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0786">RHSA-2014:0786-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0206">CVE-2014-0206</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1737">CVE-2014-1737</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1738">CVE-2014-1738</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2568">CVE-2014-2568</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2851">CVE-2014-2851</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3144">CVE-2014-3144</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3145">CVE-2014-3145</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3153">CVE-2014-3153</a>]</td>
<td class="Text">RHSA-2014:0786: kernel security, bug fix, and enhancement update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140741</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0741">RHSA-2014:0741-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1533">CVE-2014-1533</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1538">CVE-2014-1538</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1541">CVE-2014-1541</a>]</td>
<td class="Text">RHSA-2014:0741: firefox security update (Critical)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140704</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0704">RHSA-2014:0704-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2894">CVE-2014-2894</a>]</td>
<td class="Text">RHSA-2014:0704: qemu-kvm security and bug fix update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140703</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0703">RHSA-2014:0703-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-6370">CVE-2013-6370</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-6371">CVE-2013-6371</a>]</td>
<td class="Text">RHSA-2014:0703: json-c security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140702</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0702">RHSA-2014:0702-04</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0384">CVE-2014-0384</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2419">CVE-2014-2419</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2430">CVE-2014-2430</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2431">CVE-2014-2431</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2432">CVE-2014-2432</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2436">CVE-2014-2436</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2438">CVE-2014-2438</a>]</td>
<td class="Text">RHSA-2014:0702: mariadb security update (Moderate)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140687</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0687">RHSA-2014:0687-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3467">CVE-2014-3467</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3468">CVE-2014-3468</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3469">CVE-2014-3469</a>]</td>
<td class="Text">RHSA-2014:0687: libtasn1 security update (Moderate)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140686</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0686">RHSA-2014:0686-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4286">CVE-2013-4286</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2013-4322">CVE-2013-4322</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0186">CVE-2014-0186</a>]</td>
<td class="Text">RHSA-2014:0686: tomcat security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140685</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0685">RHSA-2014:0685-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0429">CVE-2014-0429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0446">CVE-2014-0446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0451">CVE-2014-0451</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0452">CVE-2014-0452</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0453">CVE-2014-0453</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0456">CVE-2014-0456</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0457">CVE-2014-0457</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0458">CVE-2014-0458</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0460">CVE-2014-0460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0461">CVE-2014-0461</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1876">CVE-2014-1876</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2397">CVE-2014-2397</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2398">CVE-2014-2398</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2403">CVE-2014-2403</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2412">CVE-2014-2412</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2414">CVE-2014-2414</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2421">CVE-2014-2421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2423">CVE-2014-2423</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2427">CVE-2014-2427</a>]</td>
<td class="Text">RHSA-2014:0685: java-1.6.0-openjdk security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140684</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0684">RHSA-2014:0684-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3465">CVE-2014-3465</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3466">CVE-2014-3466</a>]</td>
<td class="Text">RHSA-2014:0684: gnutls security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140680</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0680">RHSA-2014:0680-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0224">CVE-2014-0224</a>]</td>
<td class="Text">RHSA-2014:0680: openssl098e security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140679</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0679">RHSA-2014:0679-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2010-5298">CVE-2010-5298</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0195">CVE-2014-0195</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0198">CVE-2014-0198</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0221">CVE-2014-0221</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0224">CVE-2014-0224</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-3470">CVE-2014-3470</a>]</td>
<td class="Text">RHSA-2014:0679: openssl security update (Important)</td>
</tr>
<tr class="resultgoodB">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140678</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0678">RHSA-2014:0678-02</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0196">CVE-2014-0196</a>]</td>
<td class="Text">RHSA-2014:0678: kernel security update (Important)</td>
</tr>
<tr class="resultgoodA">
<td class="Text" align="center">oval:com.redhat.rhsa:def:20140675</td>
<td class="Text" align="center">false</td>
<td class="Text" align="center">patch</td>
<td class="Text" align="center">[<a class="Hover" target="_blank" href="https://access.redhat.com/errata/RHSA-2014:0675">RHSA-2014:0675-01</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0429">CVE-2014-0429</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0446">CVE-2014-0446</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0451">CVE-2014-0451</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0452">CVE-2014-0452</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0453">CVE-2014-0453</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0454">CVE-2014-0454</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0455">CVE-2014-0455</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0456">CVE-2014-0456</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0457">CVE-2014-0457</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0458">CVE-2014-0458</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0459">CVE-2014-0459</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0460">CVE-2014-0460</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-0461">CVE-2014-0461</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-1876">CVE-2014-1876</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2397">CVE-2014-2397</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2398">CVE-2014-2398</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2402">CVE-2014-2402</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2403">CVE-2014-2403</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2412">CVE-2014-2412</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2413">CVE-2014-2413</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2414">CVE-2014-2414</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2421">CVE-2014-2421</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2423">CVE-2014-2423</a>], [<a class="Hover" target="_blank" href="https://access.redhat.com/security/cve/CVE-2014-2427">CVE-2014-2427</a>]</td>
<td class="Text">RHSA-2014:0675: java-1.7.0-openjdk security update (Critical)</td>
</tr>
</table>
</body>
</html>
| 704,680 | Common Lisp | .l | 5,515 | 118.866002 | 5,286 | 0.662532 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 791e9b66873a9aa79e7e3a2d4aba3c6eefb423597b5a1a7a71221c5b60153764 | 4,215 | [
-1
] |
4,217 | Makefile | atgreen_red-light-green-light/rlgl/Makefile | #! /usr/bin/make
#
# Makefile for Golang projects, v2
#
# Features:
# - uses github.com/Masterminds/glide to manage dependencies and uses GO15VENDOREXPERIMENT
# - runs ginkgo tests recursively, computes code coverage report
# - runs gofmt and go vet
# - prepares code coverage so travis-ci can upload it and produce badges for README.md
# - build for linux/amd64, linux/arm, darwin/amd64, windows/amd64
# - just 'make' builds for local OS/arch
# - produces .tgz/.zip build output
# - can bundle additional files into archive
# - sets a VERSION variable in the app
# - to include the build status and code coverage badge in CI use (replace NAME by what
# you set $(NAME) to further down, and also replace magnum.travis-ci.com by travis-ci.org for
# publicly accessible repos [sigh]):
# [](https://magnum.travis-ci.com/rightscale/NAME
# 
#
# Top-level targets:
# default: compile the program, you can thus use make && ./NAME -options ...
# build: builds binaries for linux and darwin
# test: runs unit tests recursively and produces code coverage stats and shows them
# travis-test: just runs unit tests recursively
# clean: removes build stuff
# name of this app, used as basename for almost everything
NAME=rlgl
#=== below this line ideally remains unchanged, add new targets at the end ===
# dependencies that are used by the build&test process, these need to be installed in the
# global Go env and not in the vendor sub-tree
DEPEND=golang.org/x/tools/cmd/cover github.com/onsi/ginkgo/ginkgo \
github.com/onsi/gomega github.com/rlmcpherson/s3gof3r/gof3r \
github.com/Masterminds/glide golang.org/x/lint/golint
TRAVIS_BRANCH?=dev
DATE=$(shell date '+%F %T')
TRAVIS_COMMIT?=$(shell git symbolic-ref HEAD | cut -d"/" -f 3)
GO15VENDOREXPERIMENT=1
export GO15VENDOREXPERIMENT
# produce a version string that is embedded into the binary that captures the branch, the date
# and the commit we're building. This works particularly well if you are using release branch
# names of the form "v1.2.3"
VERSION=$(NAME) $(TRAVIS_BRANCH) - $(DATE) - $(TRAVIS_COMMIT)
VFLAG=-X 'main.VERSION=$(VERSION)'
.PHONY: depend clean default
# the default target builds a binary in the top-level dir for whatever the local OS is
# it does not depend on 'depend' 'cause it's a pain to have that run every time you hit 'make'
# instead you get to 'make depend' manually once
default: $(NAME)
$(NAME): $(shell find . -name \*.go)
go build -ldflags "$(VFLAG)" -o $(NAME) .
# the standard build produces a "local" executable, a linux tgz, and a darwin (macos) tgz
# uncomment and join the windows zip if you need it
build: $(NAME) build/$(NAME)-linux-amd64.tgz build/$(NAME)-linux-s390x.tgz build/$(NAME)-linux-ppc64le.tgz build/$(NAME)-darwin-amd64.tgz build/$(NAME)-linux-arm.tgz build/$(NAME)-windows-amd64.zip
# create a tgz with the binary and any artifacts that are necessary
# note the hack to allow for various GOOS & GOARCH combos, sigh
build/$(NAME)-%.tgz: *.go
rm -rf build/$(NAME)
mkdir -p build/$(NAME)
tgt=$*; GOOS=$${tgt%-*} GOARCH=$${tgt#*-} go build -ldflags "$(VFLAG)" -o build/$(NAME)/$(NAME) .
chmod +x build/$(NAME)/$(NAME)
cp README.md build/$(NAME)/
tar -zcf $@ -C build ./$(NAME)
rm -r build/$(NAME)
build/$(NAME)-%.zip: *.go
rm -rf build/$(NAME)
mkdir -p build/$(NAME)
tgt=$*; GOOS=$${tgt%-*} GOARCH=$${tgt#*-} go build -ldflags "$(VFLAG)" -o build/$(NAME)/$(NAME).exe .
chmod +x build/$(NAME)/$(NAME).exe
cp README.md build/$(NAME)/
(cd build; zip -r `basename $@` $(NAME))
rm -r build/$(NAME)
# Installing build dependencies. You will need to run this once manually when you clone the repo
depend:
go get -v $(DEPEND)
glide install
clean:
rm -rf build .vendor/pkg rlgl *~
# run gofmt and complain if a file is out of compliance
# run go vet and similarly complain if there are issues
# run go lint and complain if there are issues
# TODO: go tool vet is currently broken with the vendorexperiement
lint:
@if gofmt -l . | egrep -v ^vendor/ | grep .go; then \
echo "^- Repo contains improperly formatted go files; run gofmt -w *.go" && exit 1; \
else echo "All .go files formatted correctly"; fi
#go tool vet -v -composites=false *.go
#go tool vet -v -composites=false **/*.go
for pkg in $$(go list ./... |grep -v /vendor/); do golint $$pkg; done
travis-test: cover
# running ginkgo twice, sadly, the problem is that -cover modifies the source code with the effect
# that if there are errors the output of gingko refers to incorrect line numbers
# tip: if you don't like colors use gingkgo -r -noColor
test: lint
ginkgo -r -skipPackage vendor --randomizeAllSpecs --randomizeSuites --failOnPending
race: lint
ginkgo -r -skipPackage vendor --randomizeAllSpecs --randomizeSuites --failOnPending --race
cover: lint
ginkgo -r -skipPackage vendor --randomizeAllSpecs --randomizeSuites --failOnPending -cover
@for d in `echo */*suite_test.go`; do \
dir=`dirname $$d`; \
(cd $$dir; go test -ginkgo.randomizeAllSpecs -ginkgo.failOnPending -cover -coverprofile $$dir_x.coverprofile -coverpkg $$(go list ./...|egrep -v vendor)); \
done
@rm -f _total
@for f in `find . -name \*.coverprofile`; do tail -n +2 $$f >>_total; done
@echo 'mode: atomic' >total.coverprofile
@awk -f merge-profiles.awk <_total >>total.coverprofile
COVERAGE=$$(go tool cover -func=total.coverprofile | grep "^total:" | grep -o "[0-9\.]*");\
echo "*** Code Coverage is $$COVERAGE% ***"
| 5,620 | Common Lisp | .l | 109 | 49.834862 | 197 | 0.726561 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 94a04fd55fb295e0bfe55d4ab1aee4ef044ff1ab87e877711fc588eb18a68b47 | 4,217 | [
-1
] |
4,218 | rlgl.go | atgreen_red-light-green-light/rlgl/rlgl.go | // rlgl.go - Copyright 2018-2022 Anthony Green <[email protected]>
//
// This program is free software: you can redistribute it and/or
// modify it under the terms of the GNU Affero General Public License
// as published by the Free Software Foundation, either version 3 of
// the License, or (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
// Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public
// License along with this program. If not, see
// <http://www.gnu.org/licenses/>.
package main
import (
"bytes"
"encoding/base64"
"encoding/hex"
"encoding/json"
"fmt"
"io"
"io/ioutil"
"log"
"mime/multipart"
"net/http"
"net/url"
"os"
"regexp"
"strings"
"time"
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rand"
"crypto/x509"
"encoding/pem"
"github.com/fatih/color"
"github.com/naoina/toml"
"github.com/urfave/cli/v2"
)
var (
// FIXME: get version from git, as it done in rlgl-server.lisp
VERSION = "undefined"
red = color.New(color.FgRed).SprintFunc()
cyan = color.New(color.FgCyan).SprintFunc()
)
type Config struct {
Host string
Key string
Proxy string
ProxyAuth string
}
func output(s string) {
fmt.Printf("%s %s\n", cyan("rlgl"), s)
}
func exitErr(err error) {
output(red(err.Error()))
os.Exit(2)
}
func make_keys(path string) {
privateKey, _ := ecdsa.GenerateKey(elliptic.P384(), rand.Reader)
publicKey := &privateKey.PublicKey
x509bytes, _ := x509.MarshalECPrivateKey(privateKey)
var pemPrivateBlock = &pem.Block{
Type: "EC PRIVATE KEY",
Bytes: x509bytes,
}
x509bytesPub, _ := x509.MarshalPKIXPublicKey(publicKey)
var pemPublicBlock = &pem.Block{
Type: "PUBLIC KEY",
Bytes: x509bytesPub,
}
cfgdir := basedir(path)
pemPrivateFile, err := os.Create(cfgdir + "/private_key.pem")
if err != nil {
fmt.Println(err)
os.Exit(1)
}
err = pem.Encode(pemPrivateFile, pemPrivateBlock)
if err != nil {
fmt.Println(err)
os.Exit(1)
}
pemPrivateFile.Close()
err = os.Chmod(cfgdir+"/private_key.pem", 0600)
if err != nil {
log.Fatal(err)
}
pemPublicFile, err := os.Create(cfgdir + "/public_key.pem")
if err != nil {
fmt.Println(err)
os.Exit(1)
}
err = pem.Encode(pemPublicFile, pemPublicBlock)
if err != nil {
fmt.Println(err)
os.Exit(1)
}
pemPublicFile.Close()
err = os.Chmod(cfgdir+"/public_key.pem", 0644)
if err != nil {
log.Fatal(err)
}
}
func (c *Config) Write(path string) {
cfgdir := basedir(path)
// create config dir if not exist
if _, err := os.Stat(cfgdir); err != nil {
err = os.MkdirAll(cfgdir, 0755)
if err != nil {
exitErr(fmt.Errorf("failed to initialize config dir [%s]: %s", cfgdir, err))
}
}
file, err := os.OpenFile(path, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
if err != nil {
exitErr(fmt.Errorf("failed to open config for writing: %s", err))
}
writer := toml.NewEncoder(file)
err = writer.Encode(c)
if err != nil {
exitErr(fmt.Errorf("failed to write config: %s", err))
}
}
// determine config path from environment
func getConfigPath() (path string, exists bool) {
userHome, ok := os.LookupEnv("HOME")
if !ok {
exitErr(fmt.Errorf("$HOME not set"))
}
path = fmt.Sprintf("%s/.rlgl/config", userHome) // default path
if xdgSupport() {
xdgHome, ok := os.LookupEnv("XDG_CONFIG_HOME")
if !ok {
xdgHome = fmt.Sprintf("%s/.config", userHome)
}
path = fmt.Sprintf("%s/rlgl/config", xdgHome)
}
if _, err := os.Stat(path); err == nil {
exists = true
}
return path, exists
}
func basedir(path string) string {
parts := strings.Split(path, "/")
return strings.Join((parts[0 : len(parts)-1]), "/")
}
// Test for environment supporting XDG spec
func xdgSupport() bool {
re := regexp.MustCompile("^XDG_*")
for _, e := range os.Environ() {
if re.FindAllString(e, 1) != nil {
return true
}
}
return false
}
func setProxy(proxy string, auth string) {
var transport *http.Transport
if proxy != "" {
proxyUrl, err := url.Parse(proxy)
if err != nil {
log.Fatal(err)
}
if auth != "" {
basicAuth := "Basic " + base64.StdEncoding.EncodeToString([]byte(auth))
hdr := http.Header{}
hdr.Add("Proxy-Authorization", basicAuth)
transport = &http.Transport{
Proxy: http.ProxyURL(proxyUrl),
ProxyConnectHeader: hdr,
}
} else {
transport = &http.Transport{
Proxy: http.ProxyURL(proxyUrl),
}
}
http.DefaultTransport = transport
}
}
func SendPostRequest(config *Config, url string, filename string, filetype string) []byte {
file, err := os.Open(filename)
if err != nil {
log.Fatal(err)
}
defer file.Close()
body := &bytes.Buffer{}
writer := multipart.NewWriter(body)
part, err := writer.CreateFormFile(filetype, file.Name())
if err != nil {
log.Fatal(err)
}
_, err = io.Copy(part, file)
if err != nil {
log.Fatal(err)
}
writer.Close()
request, err := http.NewRequest("POST", url, body)
if err != nil {
log.Fatal(err)
}
var bearer = "Bearer " + config.Key
request.Header.Add("Authorization", bearer)
request.Header.Add("Content-Type", writer.FormDataContentType())
client := &http.Client{}
response, err := client.Do(request)
if err != nil {
log.Fatal(err)
}
defer response.Body.Close()
content, err := ioutil.ReadAll(response.Body)
if err != nil {
log.Fatal(err)
}
return content
}
func loadPrivateKey(cfgdir string) (*ecdsa.PrivateKey, error) {
priv, err := ioutil.ReadFile(cfgdir + "/private_key.pem")
if err != nil {
log.Fatal(err)
}
block, _ := pem.Decode(priv)
if block == nil {
log.Fatal("Failed to decode PEM private key")
}
var parsedKey interface{}
parsedKey, err = x509.ParseECPrivateKey(block.Bytes)
if err != nil {
log.Fatal(err)
}
switch parsedKey := parsedKey.(type) {
case *ecdsa.PrivateKey:
return parsedKey, nil
}
log.Fatal("Unsupported private key type")
return nil, nil
}
func main() {
var policy string
var key string
var proxy string
var proxyauth string
var signingkey string
var title string
var config Config
labels := cli.NewStringSlice()
cfgPath, cfgExists := getConfigPath()
if !cfgExists {
config.Write(cfgPath)
} else {
f, err := os.Open(cfgPath)
if err != nil {
exitErr(err)
}
defer f.Close()
if err := toml.NewDecoder(f).Decode(&config); err != nil {
exitErr(err)
}
}
app := cli.NewApp()
app.Commands = []*cli.Command{
{
Name: "login",
Aliases: []string{"l"},
Usage: "login to Red Light Green Light server",
Flags: []cli.Flag{
&cli.StringFlag{
Name: "key",
Value: "",
Usage: "API key",
Destination: &key,
},
&cli.StringFlag{
Name: "proxy",
Value: "",
Usage: "proxy URL (eg. http://HOST:PORT)",
Destination: &proxy,
},
&cli.StringFlag{
Name: "proxy-auth",
Value: "",
Usage: "proxy basic authentication (eg. USERNAME:PASSWORD)",
Destination: &proxyauth,
},
&cli.StringFlag{
Name: "signing-key",
Value: "",
Usage: "optional private signing key",
Destination: &signingkey,
},
},
Action: func(c *cli.Context) error {
if c.NArg() == 0 {
exitErr(fmt.Errorf("Missing server URL"))
}
if key == "" {
var slash string
if strings.HasSuffix(c.Args().First(), "/") {
slash = ""
} else {
slash = "/"
}
exitErr(fmt.Errorf("Missing API key. Generate a new one at %s%sget-api-key",
c.Args().First(),
slash))
}
setProxy(proxy, proxyauth)
response, err := http.Get(fmt.Sprintf("%s/login", c.Args().First()))
if err != nil {
exitErr(err)
}
responseData, err := ioutil.ReadAll(response.Body)
if err != nil {
log.Fatal(err)
}
fmt.Println(string(responseData))
config.Host = c.Args().First()
config.Key = key
config.Proxy = proxy
config.ProxyAuth = proxyauth
config.Write(cfgPath)
if signingkey == "" {
make_keys(cfgPath)
} else {
data, err := ioutil.ReadFile(signingkey)
if err != nil {
log.Fatal(err)
}
err = ioutil.WriteFile(basedir(cfgPath)+"/private_key.pem", data, 0400)
if err != nil {
log.Fatal(err)
}
}
return nil
},
},
{
Name: "log",
Usage: "log evaluations",
Flags: []cli.Flag{
&cli.StringSliceFlag{
Name: "label",
Value: labels,
Aliases: []string{"l"},
Usage: "set label `KEY=VALUE`",
},
},
Action: func(c *cli.Context) error {
labels := make(map[string]string)
for _, s := range c.StringSlice("label") {
x := strings.Split(s, "=")
labels[x[0]] = x[1]
}
if config.Host == "" {
exitErr(fmt.Errorf("Login to server first"))
}
if c.NArg() != 0 {
exitErr(fmt.Errorf("Too many arguments"))
}
setProxy(config.Proxy, config.ProxyAuth)
labelsValue, _ := json.Marshal(labels);
response, err := http.Get(fmt.Sprintf("%s/report-log?labels=\"%s\"", config.Host, url.QueryEscape(base64.StdEncoding.EncodeToString([]byte(string(labelsValue))))))
if err != nil {
exitErr(err)
}
responseData, err := ioutil.ReadAll(response.Body)
if err != nil {
log.Fatal(err)
}
fmt.Print(string(responseData))
return nil
},
},
{
Name: "verify",
Aliases: []string{"v"},
Usage: "verify document sigstore record",
Action: func(c *cli.Context) error {
if config.Host == "" {
exitErr(fmt.Errorf("Login to server first"))
}
if c.NArg() == 0 {
exitErr(fmt.Errorf("Missing report argument"))
} else if c.NArg() > 1 {
exitErr(fmt.Errorf("Too may arguments"))
}
setProxy(config.Proxy, config.ProxyAuth)
if !strings.HasPrefix(c.Args().First(), "RLGL-") {
exitErr(fmt.Errorf("expecting a document ID, but got %s", c.Args().First()))
}
request, err := http.NewRequest("GET", fmt.Sprintf("%s/verify?id=%s", config.Host, c.Args().First()), nil)
if err != nil {
log.Fatal(err)
}
var bearer = "Bearer " + config.Key
request.Header.Add("Authorization", bearer)
request.Header.Add("Content-Type", "text")
client := &http.Client{}
response, err := client.Do(request)
if err != nil {
log.Fatal(err)
}
defer response.Body.Close()
responseData, err := ioutil.ReadAll(response.Body)
if err != nil {
log.Fatal(err)
}
fmt.Print(string(responseData))
return nil
},
},
{
Name: "new-policy-bound-api-key",
Usage: "create a new policy bound API key",
Action: func(c *cli.Context) error {
if config.Host == "" {
exitErr(fmt.Errorf("Login to server first"))
}
if c.NArg() == 0 {
exitErr(fmt.Errorf("Missing policy argument"))
} else if c.NArg() > 1 {
exitErr(fmt.Errorf("Too may arguments"))
}
setProxy(config.Proxy, config.ProxyAuth)
values := map[string]string{"policy": c.Args().First()}
jsonValue, _ := json.Marshal(values)
request, err := http.NewRequest("POST", fmt.Sprintf("%s/new-policy-bound-api-key", config.Host), bytes.NewBufferString(string(jsonValue)))
if err != nil {
log.Fatal(err)
}
var bearer = "Bearer " + config.Key
request.Header.Add("Authorization", bearer)
request.Header.Add("Content-Type", "text")
client := &http.Client{}
response, err := client.Do(request)
if err != nil {
log.Fatal(err)
}
defer response.Body.Close()
responseData, err := ioutil.ReadAll(response.Body)
if err != nil {
log.Fatal(err)
}
fmt.Print(string(responseData))
return nil
},
},
{
Name: "baseline",
Aliases: []string{"b"},
Usage: "generate baseline XFAIL regression policy",
Action: func(c *cli.Context) error {
if config.Host == "" {
exitErr(fmt.Errorf("Login to server first"))
}
if c.NArg() == 0 {
exitErr(fmt.Errorf("Missing report argument"))
} else if c.NArg() > 1 {
exitErr(fmt.Errorf("Too may arguments"))
}
setProxy(config.Proxy, config.ProxyAuth)
if !strings.HasPrefix(c.Args().First(), "RLGL-") {
exitErr(fmt.Errorf("expecting a document ID, but got %s", c.Args().First()))
}
request, err := http.NewRequest("GET", fmt.Sprintf("%s/get-baseline-xfail-policy?id=%s", config.Host, c.Args().First()), nil)
if err != nil {
log.Fatal(err)
}
var bearer = "Bearer " + config.Key
request.Header.Add("Authorization", bearer)
request.Header.Add("Content-Type", "text")
client := &http.Client{}
response, err := client.Do(request)
if err != nil {
log.Fatal(err)
}
defer response.Body.Close()
responseData, err := ioutil.ReadAll(response.Body)
if err != nil {
log.Fatal(err)
}
fmt.Print(string(responseData))
return nil
},
},
{
Name: "evaluate",
Aliases: []string{"e"},
Usage: "evaluate test results",
Flags: []cli.Flag{
&cli.StringFlag{
Name: "policy",
Value: "",
Usage: "evaluation policy",
Destination: &policy,
},
&cli.StringSliceFlag{
Name: "label",
Value: labels,
Aliases: []string{"l"},
Usage: "set label `KEY=VALUE`",
},
&cli.StringFlag{
Name: "title",
Value: "",
Usage: "report title",
Destination: &title,
},
},
Action: func(c *cli.Context) error {
labels := make(map[string]string)
for _, s := range c.StringSlice("label") {
x := strings.Split(s, "=")
labels[x[0]] = x[1]
}
if (config.Host == "") || (config.Key == "") {
exitErr(fmt.Errorf("Login to server first"))
}
if policy == "" {
exitErr(fmt.Errorf("Missing policy"))
}
if c.NArg() == 0 {
exitErr(fmt.Errorf("Missing report"))
}
setProxy(config.Proxy, config.ProxyAuth)
var n string
var name string
message := SendPostRequest(&config, fmt.Sprintf("%s/upload", config.Host), c.Args().Get(0), "bin")
n = string(message)
f, err := os.Open(c.Args().Get(0))
if err != nil {
log.Fatal(err)
}
defer f.Close()
labelsValue, _ := json.Marshal(labels);
values := map[string]string{"policy": policy, "name": name, "ref": n, "labels": string(labelsValue)}
if title != "" {
values["title"] = title
}
jsonValue, _ := json.Marshal(values)
request, err := http.NewRequest("POST", fmt.Sprintf("%s/evaluate", config.Host), bytes.NewBufferString(string(jsonValue)))
if err != nil {
log.Fatal(err)
}
var bearer = "Bearer " + config.Key
request.Header.Add("Authorization", bearer)
request.Header.Add("Content-Type", "application/json")
client := &http.Client{}
response, err := client.Do(request)
if err != nil {
log.Fatal(err)
}
defer response.Body.Close()
responseData, err := ioutil.ReadAll(response.Body)
if err != nil {
log.Fatal(err)
}
if responseData[0] != '{' {
log.Fatal(string(responseData))
}
var result map[string]interface{}
err = json.Unmarshal([]byte(responseData), &result)
if err != nil {
log.Fatal(err)
}
cfgdir := basedir(cfgPath)
var key, _ = loadPrivateKey(cfgdir)
var data []byte
data, err = hex.DecodeString(fmt.Sprintf("%s", result["digest"]))
if err != nil {
log.Fatal(err)
}
var r []byte
r, err = key.Sign(rand.Reader, data, nil)
if err != nil {
log.Fatal(err)
}
values = map[string]string{"signature": base64.StdEncoding.EncodeToString(r),
"id": fmt.Sprintf("%s", result["callback"])}
jsonValue, _ = json.Marshal(values)
request, err = http.NewRequest("POST", fmt.Sprintf("%s/callback", config.Host), bytes.NewBufferString(string(jsonValue)))
if err != nil {
log.Fatal(err)
}
bearer = "Bearer " + config.Key
request.Header.Add("Authorization", bearer)
request.Header.Add("Content-Type", "text")
client = &http.Client{}
response, err = client.Do(request)
if err != nil {
log.Fatal(err)
}
defer response.Body.Close()
_, err = ioutil.ReadAll(response.Body)
if err != nil {
log.Fatal(err)
}
fmt.Printf("%s: %s (sha3/256: %s)\n", result["colour"], result["url"], result["digest"])
if result["colour"] == "GREEN" {
os.Exit(0)
} else {
if result["colour"] == "RED" {
os.Exit(1)
} else {
os.Exit(2)
}
}
return nil
},
},
}
app.Name = "rlgl"
app.Version = VERSION
app.Copyright = "(c) 2018-2022 Anthony Green"
app.Compiled = time.Now()
app.Authors = []*cli.Author{
&cli.Author{
Name: "Anthony Green",
Email: "[email protected]",
},
}
app.Usage = "Red Light Green Light"
app.Action = func(c *cli.Context) error {
err := cli.ShowAppHelp(c)
if err != nil {
log.Fatal(err)
}
return nil
}
err := app.Run(os.Args)
if err != nil {
log.Fatal(err)
}
}
| 17,709 | Common Lisp | .l | 634 | 23.157729 | 167 | 0.612724 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 0edb1c8384f0239ac37ca690c4c8be44eb064c4b1494f2953f6f848f9e0c3dc9 | 4,218 | [
-1
] |
4,219 | glide.yaml | atgreen_red-light-green-light/rlgl/glide.yaml | package: .
import:
- package: github.com/fatih/color
version: ^1.7.0
- package: github.com/naoina/toml
version: ^0.1.1
- package: github.com/urfave/cli
version: ^1.20.0
| 175 | Common Lisp | .l | 8 | 20.125 | 33 | 0.724551 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 3f62d9c6476889e2fd44853d764a9ab6aa59f7ffdbe35fb8758f66b94f62d1e6 | 4,219 | [
-1
] |
4,220 | rlgl.svg | atgreen_red-light-green-light/images/rlgl.svg | <?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!-- Generator: Adobe Illustrator 19.0.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) -->
<svg
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:cc="http://creativecommons.org/ns#"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:svg="http://www.w3.org/2000/svg"
xmlns="http://www.w3.org/2000/svg"
xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd"
xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape"
version="1.1"
id="Layer_1"
x="0px"
y="0px"
viewBox="0 0 496.162 496.162"
style="enable-background:new 0 0 496.162 496.162;"
xml:space="preserve"
sodipodi:docname="rlgl.svg"
inkscape:version="0.92.3 (2405546, 2018-03-11)"><metadata
id="metadata59"><rdf:RDF><cc:Work
rdf:about=""><dc:format>image/svg+xml</dc:format><dc:type
rdf:resource="http://purl.org/dc/dcmitype/StillImage" /></cc:Work></rdf:RDF></metadata><defs
id="defs57" /><sodipodi:namedview
pagecolor="#ffffff"
bordercolor="#666666"
borderopacity="1"
objecttolerance="10"
gridtolerance="10"
guidetolerance="10"
inkscape:pageopacity="0"
inkscape:pageshadow="2"
inkscape:window-width="838"
inkscape:window-height="480"
id="namedview55"
showgrid="false"
inkscape:zoom="0.47565111"
inkscape:cx="248.08099"
inkscape:cy="248.08099"
inkscape:window-x="2881"
inkscape:window-y="257"
inkscape:window-maximized="0"
inkscape:current-layer="Layer_1" />
<path
style="fill:#337180;stroke-width:0.88559228"
d="m 247.02627,14.717127 c -121.33058,0 -219.693313,98.355643 -219.693313,219.700393 0,121.33057 98.362733,219.69685 219.693313,219.69685 121.33766,0 219.70039,-98.36628 219.70039,-219.69685 0,-121.34475 -98.36273,-219.700393 -219.70039,-219.700393 z"
id="path2"
inkscape:connector-curvature="0" />
<path
style="fill:#d3d3d3;stroke-width:0.90713316"
d="m 229.787,246.881 v 204.57719 c 6.041,0.36207 12.139,0.5538 18.29,0.5538 5.371,0 10.696,-0.15635 15.983,-0.43366 V 246.881 Z"
id="path4"
inkscape:connector-curvature="0" />
<path
style="fill:#eaeaea;stroke-width:0.90713316"
d="m 229.787,246.881 v 204.57719 c 6.041,0.36207 12.139,0.5538 18.29,0.5538 V 246.881 Z"
id="path6"
inkscape:connector-curvature="0" />
<path
style="fill:#e5e5e5;stroke-width:0.97107792"
d="m 248.081,42.593907 c -53.4177,0 -96.72809,22.939871 -96.72809,51.237772 V 326.9198 c 0,28.2979 43.31039,51.23777 96.72809,51.23777 53.4177,0 96.72809,-22.93987 96.72809,-51.23777 V 93.831679 c 0,-28.297901 -43.31039,-51.237772 -96.72809,-51.237772 z"
id="path8"
inkscape:connector-curvature="0" />
<path
style="fill:#3b3b3b;stroke-width:0.96465236"
d="m 248.081,65.208194 c -48.07352,0 -87.04988,20.566786 -87.04988,45.937566 v 208.97285 c 0,25.3708 38.97636,45.93758 87.04988,45.93758 48.07352,0 87.04988,-20.56678 87.04988,-45.93758 V 111.14576 c 0,-25.37078 -38.97636,-45.937566 -87.04988,-45.937566 z"
id="path10"
inkscape:connector-curvature="0" />
<circle
style="fill:#ea4949;stroke-width:1.34224808"
cx="250.18338"
cy="143.91194"
id="circle12"
r="57.716671"
inkscape:transform-center-x="10.511907"
inkscape:transform-center-y="2.1023814" />
<path
style="fill:#f25f5f;stroke-width:1.34224808"
d="m 285.62544,108.46856 c -19.57401,-19.574007 -51.31146,-19.574007 -70.88547,0 -19.57534,19.574 -19.57534,51.31145 0,70.88681 19.57535,19.574 90.46082,-51.31147 70.88547,-70.88681 z"
id="path14"
inkscape:connector-curvature="0"
inkscape:transform-center-x="16.161193"
inkscape:transform-center-y="-3.5459238" />
<circle
style="fill:#2bbf60;stroke-width:1.36669445"
cx="249.21809"
cy="275.94055"
r="58.76786"
id="circle16" />
<path
style="fill:#3cce6c;stroke-width:1.36669445"
d="m 285.30567,240.53499 c -19.93051,-19.93051 -52.246,-19.93051 -72.1765,0 -19.93187,19.9305 -19.93187,52.24599 0,72.17786 19.93187,19.93051 92.10837,-52.24599 72.1765,-72.17786 z"
id="path22"
inkscape:connector-curvature="0" />
<g
id="g24">
</g>
<g
id="g26">
</g>
<g
id="g28">
</g>
<g
id="g30">
</g>
<g
id="g32">
</g>
<g
id="g34">
</g>
<g
id="g36">
</g>
<g
id="g38">
</g>
<g
id="g40">
</g>
<g
id="g42">
</g>
<g
id="g44">
</g>
<g
id="g46">
</g>
<g
id="g48">
</g>
<g
id="g50">
</g>
<g
id="g52">
</g>
</svg> | 4,403 | Common Lisp | .l | 139 | 28.517986 | 259 | 0.680197 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | a8e31d2fc7ba184ba5b621390493647b782633092c98b7835f5469f85f2ccea6 | 4,220 | [
-1
] |
4,221 | traffic-light-svgrepo-com.svg | atgreen_red-light-green-light/images/traffic-light-svgrepo-com.svg | <?xml version="1.0" encoding="iso-8859-1"?>
<!-- Generator: Adobe Illustrator 19.0.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) -->
<svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"
viewBox="0 0 496.162 496.162" style="enable-background:new 0 0 496.162 496.162;" xml:space="preserve">
<path style="fill:#337180;" d="M248.077,0C111.072,0,0.002,111.062,0.002,248.083c0,137.005,111.07,248.079,248.075,248.079
c137.013,0,248.083-111.074,248.083-248.079C496.16,111.062,385.09,0,248.077,0z"/>
<path style="fill:#D3D3D3;" d="M229.787,246.881v248.608c6.041,0.44,12.139,0.673,18.29,0.673c5.371,0,10.696-0.19,15.983-0.527
V246.881H229.787z"/>
<path style="fill:#EAEAEA;" d="M229.787,246.881v248.608c6.041,0.44,12.139,0.673,18.29,0.673V246.881H229.787z"/>
<path style="fill:#E5E5E5;" d="M248.081,32.082c-52.079,0-94.304,24.952-94.304,55.732v253.533c0,30.78,42.225,55.732,94.304,55.732
s94.304-24.952,94.304-55.732V87.814C342.385,57.034,300.16,32.082,248.081,32.082z"/>
<path style="fill:#3B3B3B;" d="M248.081,42.082c-45.05,0-81.575,23.585-81.575,52.679v239.64c0,29.094,36.525,52.679,81.575,52.679
s81.575-23.585,81.575-52.679V94.761C329.656,65.667,293.131,42.082,248.081,42.082z"/>
<circle style="fill:#EA4949;" cx="248.081" cy="116.581" r="43"/>
<path style="fill:#F25F5F;" d="M274.486,90.175c-14.583-14.583-38.228-14.583-52.811,0c-14.584,14.583-14.584,38.228,0,52.812
C236.259,157.57,289.07,104.759,274.486,90.175z"/>
<circle style="fill:#2BBF60;" cx="248.081" cy="317.081" r="43"/>
<circle style="fill:#EAB42D;" cx="248.081" cy="217.081" r="43"/>
<path style="fill:#EDCB3B;" d="M274.486,191.175c-14.583-14.583-38.228-14.583-52.811,0c-14.584,14.583-14.584,38.228,0,52.812
C236.259,258.57,289.07,205.759,274.486,191.175z"/>
<path style="fill:#3CCE6C;" d="M274.486,291.175c-14.583-14.583-38.228-14.583-52.811,0c-14.584,14.583-14.584,38.228,0,52.812
C236.259,358.57,289.07,305.759,274.486,291.175z"/>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
<g>
</g>
</svg>
| 2,176 | Common Lisp | .l | 53 | 38.886792 | 129 | 0.660857 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 9553976c0308a3df4bb60f8011b851924820e1119093177a6d62f2cece7b85bb | 4,221 | [
-1
] |
4,228 | build.yml | atgreen_red-light-green-light/.github/workflows/build.yml | name: CI
# Controls when the action will run.
on:
# Triggers the workflow on push or pull request events but only for the master branch
push:
branches: [ master ]
pull_request:
branches: [ master ]
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
# A workflow run is made up of one or more jobs that can run sequentially or in parallel
jobs:
build:
name: Build image
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- run: |
git fetch --prune --unshallow --tags
echo exit code $?
git tag --list
echo "RLGL_VERSION=$(git describe --tags --dirty=+)"
- name: Set up Go 1.17
uses: actions/setup-go@v3
with:
go-version: 1.17
- name: Get short git commit hash
id: hash
run: echo "::set-output name=hash::${GITHUB_SHA::7}"
- name: Get version number
id: version
run: echo "::set-output name=version::$(git describe --tags --dirty=+)"
- name: Get base hash
id: base-hash
run: echo "::set-output name=base-hash::$(cat Dockerfile.base rlgl-server.asd | sha512sum | cut -b 1-8)"
- name: Test if base exists
id: base-exists
run: echo "::set-output name=base-exists::$(podman manifest inspect quay.io/moxielogic/rlgl-server-base:${{ steps.base-hash.outputs.base-hash }} > /dev/null 2>&1 && echo 'EXISTS')"
- name: Prepare base image
id: build-base
uses: redhat-actions/buildah-build@v2
with:
image: rlgl-server-base
tags: ${{ steps.base-hash.outputs.base-hash }} latest
dockerfiles: |
Dockerfile.base
if: ${{ steps.base-exists.outputs.base-exists != 'EXISTS' }}
- name: Push Base To quay.io
id: push-base-to-quay
uses: redhat-actions/push-to-registry@v2
with:
image: ${{ steps.build-base.outputs.image }}
tags: ${{ steps.build-base.outputs.tags }}
registry: quay.io/moxielogic
username: ${{ secrets.QUAY_USERNAME }}
password: ${{ secrets.QUAY_PASSWORD }}
if: ${{ steps.base-exists.outputs.base-exists != 'EXISTS' }}
- name: Build rlgl cli
run: |
(cd rlgl; make build)
mv rlgl/build/* cli
- name: golangci-lint
uses: golangci/golangci-lint-action@v3
with:
version: latest
skip-pkg-cache: true
working-directory: rlgl
- name: Buildah Action
id: build-image
uses: redhat-actions/buildah-build@v2
with:
image: rlgl-server
tags: latest ${{ steps.hash.outputs.hash }} ${{ steps.version.outputs.version }}
dockerfiles: |
Dockerfile
build-args: |
RLGL_VERSION=${{ steps.version.outputs.version }}
- name: Push To quay.io
id: push-to-quay
uses: redhat-actions/push-to-registry@v2
with:
image: ${{ steps.build-image.outputs.image }}
tags: ${{ steps.build-image.outputs.tags }}
registry: quay.io/moxielogic
username: ${{ secrets.QUAY_USERNAME }}
password: ${{ secrets.QUAY_PASSWORD }}
- name: Test
run: |
# Create a new test keypair
openssl ecparam -name prime256v1 -genkey -noout -out .ci/private_key.pem
openssl ec -in .ci/private_key.pem -pubout -out .ci/public_key.pem
docker-compose -f .ci/docker-compose.yml up -d
ip=$(docker container inspect --format '{{ (index .NetworkSettings.Networks "ci_default").IPAddress }}' ci_rlgl-server_1)
if [ -z "${ip:-}" ]; then
err "Container ${cid} has no IP address"
return 1
fi
if timeout -s TERM 45 bash -c \
'while [[ "$(curl -s -o /dev/null -L -w ''%{http_code}'' ${0})" != "200" ]];\
do echo "Waiting for ${0}" && sleep 2;\
done' http://$ip:8080/healthz ; then
docker exec -t -e IP=$ip ci_rlgl-server_1 sh -c 'echo -n http://$IP:8080 > /tmp/server-uri'
docker exec -t ci_rlgl-server_1 cat /tmp/server-uri
./.ci/test.sh $ip:8080 || true
docker logs ci_rlgl-server_1
else
ERROR=$?
docker logs ci_rlgl-server_1
exit $ERROR
fi
- name: Print image url
run: echo "Image pushed to ${{ steps.push-to-quay.outputs.registry-paths }}"
# - name: Rollout to staging environment
# uses: actions-hub/kubectl@master
# env:
# KUBE_CONFIG: ${{ secrets.PROD_KUBECONFIG }}
# with:
# args: rollout restart deployment rlgl-server
| 4,586 | Common Lisp | .l | 118 | 31.101695 | 186 | 0.602971 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | fe69698ed6b29dce1e2feed972428c7b48af633f4550c56cb9a20cdc260f5d53 | 4,228 | [
-1
] |
4,229 | rlgl.css | atgreen_red-light-green-light/css/rlgl.css | @import url("https://netdna.bootstrapcdn.com/font-awesome/4.0.3/css/font-awesome.css");
* {
font-family: "Trebuchet MS", Arial, Helvetica, sans-serif;
box-sizing: border-box;
}
html {
position: relative;
min-height: 100%;
}
body {
padding-top: 65px;
margin-bottom: 60px;
}
.rlgl-svg {
float: left;
width: 100%;
background-image: url(../images/rlgl.svg);
background-size: cover;
height: 0;
padding: 0; /* reset */
padding-bottom: 92%;
}
h1 {
position: relative;
bottom: 18px;
left: 10px;
}
pre {
display: block;
padding: 9.5px;
margin: 0 0 10px;
font-size: 13px;
line-height: 1.42857143;
color: #333;
word-break: break-all;
word-wrap: break-word;
background-color: #f5f5f5;
border: 1px solid #ccc;
border-radius: 4px;
box-shadow: 2px 2px 3px 0px black;
}
table {
border-collapse: collapse;
border: 1px solid #ddd;
width: 75%;
}
table th {
text-align: left;
border-bottom: 1px solid #ccc;
}
table th, table td {
padding: .4em;
}
table.fold-table > tbody > tr.view td,
table.fold-table > tbody > tr.view th {
cursor: pointer;
}
table.fold-table > tbody > tr.view td:first-child,
table.fold-table > tbody > tr.view th:first-child {
position: relative;
padding-left: 20px;
}
table.fold-table > tbody > tr.view td:first-child:before,
table.fold-table > tbody > tr.view th:first-child:before {
position: absolute;
top: 50%;
left: 5px;
width: 9px;
height: 16px;
margin-top: -8px;
font: 16px fontawesome;
color: #999;
content: "\f0d7";
transition: all .3s ease;
}
table.fold-table > tbody > tr.view:nth-child(4n-1) {
background: #eee;
}
table.fold-table > tbody > tr.view:hover {
background: #aaa;
}
table.fold-table > tbody > tr.fail {
background: #ffb3b3
}
table.fold-table > tbody > tr.xfail {
background: #e6f6e6
}
table.fold-table > tbody > tr.pass {
background: #80ff80
}
/*
table.fold-table > tbody > tr.view.open {
background: tomato;
color: white;
}
*/
table.fold-table > tbody > tr.view.open td:first-child:before, table.fold-table > tbody > tr.view.open th:first-child:before {
transform: rotate(-180deg);
color: #333;
}
table.fold-table > tbody > tr.fold {
display: none;
}
table.fold-table > tbody > tr.fold.open {
display: table-row;
}
.fold-content {
padding: .5em;
}
.fold-content h3 {
margin-top: 0;
}
.fold-content > table {
border: 12px solid #ccc;
}
tr:nth-child(4n-2) {
background: #eee;
}
.footer {
position: absolute;
bottom: 0;
width: 100%;
/* Set the fixed height of the footer here */
height: 120px;
line-height: 60px; /* Vertically center the text there */
background-color: #f5f5f5;
}
.footer > .container {
padding-right: 15px;
padding-left: 15px;
}
code {
font-size: 80%;
}
| 2,889 | Common Lisp | .l | 134 | 18.365672 | 126 | 0.660433 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | f0fd840d25aec5f888c84dac753c724b0a6f42d64f18657b94c264c1ce067f94 | 4,229 | [
-1
] |
4,230 | docker-compose.yml | atgreen_red-light-green-light/.ci/docker-compose.yml | version: '3.2'
services:
rlgl-server:
image: "quay.io/moxielogic/rlgl-server:latest"
ports:
- "8080:8080"
volumes:
- type: bind
source: /home/runner/work/red-light-green-light/red-light-green-light/.ci/config.ini
target: /etc/rlgl/config.ini
- type: bind
source: /home/runner/work/red-light-green-light/red-light-green-light/.ci/private_key.pem
target: /etc/rlgl/private_key.pem
- type: bind
source: /home/runner/work/red-light-green-light/red-light-green-light/.ci/public_key.pem
target: /etc/rlgl/public_key.pem
| 600 | Common Lisp | .l | 16 | 31.125 | 97 | 0.666096 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 8969dbce1a6cf757224783bd0cbf08898bf4af0c0437e239fbd6d436f79e679a | 4,230 | [
-1
] |
4,243 | oval.sh | atgreen_red-light-green-light/recog.d/oval.sh | #!/bin/sh
grep -q "<title>OVAL Results</title>" $1
if [ $? -eq 0 ]; then
echo "oscap-oval";
fi
| 100 | Common Lisp | .l | 5 | 18 | 40 | 0.595745 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 01afcaad8805421dd91cc97effe52e6486e7f1a9a6d52663c0b0074b3e98f8c3 | 4,243 | [
-1
] |
4,244 | clair.sh | atgreen_red-light-green-light/recog.d/clair.sh | #!/bin/sh
grep -q "unapproved" $1
if [ $? -eq 0 ]; then
grep -q "vulnerabilities" $1;
if [ $? -eq 0 ]; then
echo "clair";
fi
fi
| 142 | Common Lisp | .l | 8 | 15 | 33 | 0.548872 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 15d097b956d6a9210ba62d8d735f3613fecc8e21eaee7dd9eb66af91ffdd3e4c | 4,244 | [
-1
] |
4,245 | assemble | atgreen_red-light-green-light/.s2i/assemble | #!/bin/bash
set -e
echo "---> Installing application source ..."
mkdir -p ./quicklisp/local-projects/${APP_SYSTEM_NAME}
cp -Rf /tmp/src/. ./quicklisp/local-projects/${APP_SYSTEM_NAME}
echo "---> Building your AWESOME Common Lisp application from source ..."
sbcl --eval "(sb-ext:restrict-compiler-policy 'debug 3)" --eval "(ql:quickload :`eval echo ${APP_SYSTEM_NAME}`)" --eval "(quit)"
find ./quicklisp
chown -R 1001 ./quicklisp
| 435 | Common Lisp | .l | 9 | 46.777778 | 128 | 0.710214 | atgreen/red-light-green-light | 46 | 2 | 4 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | bd6579ed7be33931c5d08e8a9e9ed68c7651f467b9a431b65d8cedc9281b56b8 | 4,245 | [
-1
] |
4,265 | package.lisp | jfmcbrayer_germinal/package.lisp | ;;; Preamble
(in-package :cl-user)
(defpackage :germinal
(:use :cl :cl+ssl)
(:import-from :quri
#:uri
#:uri-scheme
#:uri-host
#:uri-path
#:uri-userinfo
#:url-encode
#:url-decode)
(:import-from :ppath
#:normpath
#:join)
(:import-from :cl-ppcre
#:scan
#:scan-to-strings)
(:import-from :uax-15
#:normalize)
(:export #:start
#:start-cli
#:make-request
#:make-response
#:path-blacklisted-p
#:gemini-serve-file-or-directory
#:*germinal-server-name*
#:*germinal-root*
#:*germinal-host*
#:*germinal-port*
#:*germinal-cert*
#:*germinal-cert-key*
#:*germinal-pathname-blacklist*
#:*germinal-routes*
#:*germinal-middleware*
#:request-url
#:request-pathinfo
#:request-params
#:request-client-key
#:request-client-addres
#:response-status
#:response-meta
#:response-body))
| 1,206 | Common Lisp | .lisp | 43 | 16.674419 | 43 | 0.462597 | jfmcbrayer/germinal | 40 | 2 | 0 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | bf77a2671d50cf719983f89f909459b48d3486e802525ddbc8c1872e37c1dc17 | 4,265 | [
-1
] |
4,266 | server.lisp | jfmcbrayer_germinal/server.lisp | ;;;; The Germinal server. This is pretty much self-contained.
;;; Package-level things
(in-package :germinal)
(interpol:enable-interpol-syntax)
(defvar *germinal-server-name* "localhost")
(defvar *germinal-root* "/var/gemini")
(defvar *germinal-host* "0.0.0.0")
(defvar *germinal-port* 1965)
(defvar *germinal-cert* "/etc/germinal/cert.pem")
(defvar *germinal-cert-key* "/etc/germinal/key.pem")
(defvar *germinal-pathname-blacklist* '(".git")
"List of files and directories to exclude.
Relative files/directories are excluded in all subdirectories of *germinal-root*.
Absolute paths are excluded at exactly this path.")
(defvar *germinal-middleware* '(basic-logging))
(defvar *germinal-tls-context* nil "Variable used to store global TLS context")
(defvar *germinal-routes*
'(("/hello/(.*)/?" . hello-world-view)
("/hello/?" . hello-world-view)
(".*" . gemini-serve-file-or-directory))
"Alist associating regular expressions to match paths against with functions
to call to handle them. Routes are matched in order, so put the most specific
routes at the top, and the least-specific at the bottom. Each function must
take a request object as its first argument and return a response object. Make
sure you refer to the function in such a way that it can be found from the
package you call `germinal-start' from.")
(define-condition gemini-error (error)
((error-type :initarg :error-type
:reader gemini-error-type)
(error-message :initarg :error-message
:reader gemini-error-message)))
;;; Entry functions
(defun start (&key (host *germinal-host*) (port *germinal-port*) (background nil))
"Start the germinal server, listening to HOST and PORT."
;; update mime types
(setf (gethash "org" mimes:*mime-db*) "text/org-mode")
(setf (gethash "gmi" mimes:*mime-db*) "text/gemini")
(write-line #?";; Germinal listening on ${host} port ${port}")
(force-output)
(setq *germinal-tls-context*
(make-context :disabled-protocols
(list +ssl-op-no-sslv2+ +ssl-op-no-sslv3+
+ssl-op-no-tlsv1+ +ssl-op-no-tlsv1-1+
+ssl-op-no-tlsv1-2+)))
(with-global-context (*germinal-tls-context* :auto-free-p (not background))
(usocket:socket-server host port #'gemini-handler ()
:multi-threading t
:element-type '(unsigned-byte 8)
:in-new-thread background)))
;;; Internal functions
(defun read-line-crlf (stream &optional eof-error-p)
"Read a CRLF-terminated line from a binary stream and return a string"
(let ((s (make-string-output-stream)))
(loop
for empty = t then nil
for c = (read-byte stream eof-error-p nil)
while (and c (not (eql (code-char c) #\return)))
do
(unless (eql (code-char c) #\newline)
(write-char (code-char c) s))
finally
(return
(if empty nil (get-output-stream-string s))))))
(defun resolve-route (request)
"Take a request object as argument, and return the function for handling the
route."
(loop for route in *germinal-routes*
when (scan (car route) (uri-path (request-url request)))
return (symbol-function(cdr route))))
(defun serve-route (request)
"Take a request object as argument, and apply the function for handling the
route to the request and any positional args from the route."
(loop for route in *germinal-routes*
when (scan (car route) (uri-path (request-url request)))
return (apply (symbol-function (cdr route))
request
(route-args route request))))
(defun route-args (route request)
(vector-to-list (nth 1 (multiple-value-list
(scan-to-strings (car route)
(uri-path (request-url request)))))))
(defun serve-route-with-middleware (request)
"Take a request object as argument, and apply the chain of handlers in
*germinal-middleware* in order, with serve-route as the last handler."
(funcall (middleware-chain *germinal-middleware*) request))
(defun gemini-handler (stream)
"The main Gemini request handler. Sets up TLS and sets up request and response"
(handler-case
(let* ((tls-stream (make-ssl-server-stream stream
:certificate *germinal-cert*
:key *germinal-cert-key*))
(request (make-request (normalize (read-line-crlf tls-stream) :nfc)
(cl+ssl:ssl-stream-x509-certificate tls-stream)
usocket:*remote-host*))
(response (serve-route-with-middleware request)))
(write-response response tls-stream)
(close tls-stream))
(error (c) (format *error-output* "gemini-handler error: ~A~%" c))))
(defun hello-world-view (request &optional name &rest junk)
"A `Hello World' view function."
(let ((name (if (str:emptyp name) "World" name)))
(make-response 20 "text/gemini" (str:concat #?"# Hello, $(name)!" (string #\Newline)))))
(defun path-blacklisted-p (path &optional (blacklist *germinal-pathname-blacklist*))
"Return t if the path matches something in the pathname blacklist."
(loop for pattern in blacklist
when (path-components-contain-p path pattern)
return t))
(defun path-components-contain-p (path pattern)
(cond
((cl-fad:pathname-root-p path) nil)
((pathname-match-p (cl-fad:pathname-as-file path) pattern) t)
(t (path-components-contain-p (cl-fad:pathname-parent-directory
(cl-fad:pathname-as-directory path)) pattern))
))
(defun gemini-serve-file-or-directory (request &rest junk)
"Given a gemini request (string), try to respond by serving a file or directory listing."
(declare (ignore junk))
(handler-case
(let* ((path (get-path-for-url (request-url request)))
(path-kind (osicat:file-kind path :follow-symlinks t)))
(if (or (not (member :other-read (osicat:file-permissions path)))
(path-blacklisted-p path)
(not (str:starts-with-p *germinal-root* path)))
(make-response 51 "Not Found") ;; In lieu of a permission-denied status
(cond
((eq :directory path-kind) (gemini-serve-directory path))
((eq :regular-file path-kind) (gemini-serve-file path))
(t (make-response 51 "Not Found")))))
(osicat-posix:enoent () (make-response 51 "Not Found"))
(gemini-error (err) (make-response (gemini-error-type err)
(gemini-error-message err)))
(error (c)
(format *error-output* "gemini-serve-file-or-directory error: ~A~%" c)
(make-response 40 "Internal server error"))))
(defun get-path-for-url (url)
"Get file path based on URL (a quri object)"
(if (uri-userinfo url)
(error 'gemini-error :error-type 59 :error-message "Bad Request"))
(normpath (join *germinal-root*
(string-left-trim "/" (url-decode (uri-path url))))))
(defun gemini-serve-file (path)
"Given an accessible file path, serve it as a gemini response"
(let* ((mime-type (mimes:mime path))
(body (alexandria:read-file-into-byte-vector path)))
(make-response 20 mime-type body)))
(defun gemini-serve-directory (path)
"Given an accessible directory, serve either an index.gmi file or a directory listing as
a gemini response"
(if (probe-file (str:concat path "/index.gmi"))
(gemini-serve-file (str:concat path "/index.gmi"))
(gemini-generate-directory-list path)))
(defun gemini-generate-directory-list (path)
"Given an accessible directory path, generate a directory listing and serve it as a gemini response"
(let* ((subdirectories (map 'list #'linkify
(remove-if #'path-blacklisted-p
(remove-if-not #'cl-fad:directory-exists-p
(cl-fad:list-directory path)))))
(files (map 'list #'linkify
(remove-if #'path-blacklisted-p
(remove-if #'cl-fad:directory-exists-p
(cl-fad:list-directory path)))
))
(body (make-string-output-stream)))
(write-sequence #?"# Directory listing for ${(de-prefix path)}/\n\n"
body)
(write-sequence #?"## Subdirectories\n" body)
(write-sequence
(let ((cl-interpol:*list-delimiter* #\Newline))
#?"@{subdirectories}\n\n")
body)
(write-sequence #?"## Files\n" body)
(write-sequence
(let ((cl-interpol:*list-delimiter* #\Newline))
#?"@{files}\n\n")
body)
(make-response 20 "text/gemini"
(babel:string-to-octets (get-output-stream-string body)
:encoding :utf-8))))
(defun url-encode-path (path)
"Url-encode a path, leaving slashes intact."
(let* ((dir-parts (pathname-directory path))
(abs-or-rel (car dir-parts))
(path-components (append
(cdr dir-parts)
(list (file-namestring path))))
(url-encoded-path-components (mapcar #'url-encode path-components))
(encoded-path (str:join "/" url-encoded-path-components)))
(if (eq :absolute abs-or-rel)
(str:concat "/" encoded-path)
encoded-path)))
(defun linkify (path &optional text)
"Format a path name with optional description as a gemini link"
(let* ((path-name (de-prefix (namestring path)))
(encoded-path-name (url-encode-path path-name))
(file-size (file-size-human-readable
(file-size-in-octets path))))
(if text
#?"=> $(encoded-path-name) $(text) ($(file-size))"
#?"=> $(encoded-path-name) $(path-name) ($(file-size))")))
| 10,041 | Common Lisp | .lisp | 199 | 41.025126 | 102 | 0.621677 | jfmcbrayer/germinal | 40 | 2 | 0 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | d3616b5830c48890ef55b61c5748a6c488bc4b41bdc80e2a0e7f54a9fe7b5f31 | 4,266 | [
-1
] |
4,267 | util.lisp | jfmcbrayer_germinal/util.lisp | ;;;; Utility functions for the Germinal server
(in-package :germinal)
(defun de-prefix (path &optional (prefix *germinal-root*))
"Strip *germinal-root* from a pathname"
(str:replace-all prefix "" path))
(defun vector-to-list (the-vector)
(loop for i below (array-dimension the-vector 0)
collect (aref the-vector i)))
(defun file-size-in-octets (path)
(osicat-posix:stat-size (osicat-posix:stat path)))
;; From Reddit /u/ambrevar
;; https://www.reddit.com/r/lisp/comments/c3nfzo/humanreadable_file_size_in_lisp/
;; This is mostly inspired by Emacs 26.2.
(defun file-size-human-readable (file-size &optional flavor)
"Produce a string showing FILE-SIZE in human-readable form.
Optional second argument FLAVOR controls the units and the display format:
If FLAVOR is nil or omitted, each kilobyte is 1024 bytes and the produced
suffixes are \"k\", \"M\", \"G\", \"T\", etc.
If FLAVOR is `si', each kilobyte is 1000 bytes and the produced suffixes
are \"k\", \"M\", \"G\", \"T\", etc.
If FLAVOR is `iec', each kilobyte is 1024 bytes and the produced suffixes
are \"KiB\", \"MiB\", \"GiB\", \"TiB\", etc."
(let ((power (if (or (null flavor) (eq flavor 'iec))
1024.0
1000.0))
(post-fixes
;; none, kilo, mega, giga, tera, peta, exa, zetta, yotta
(list "" "k" "M" "G" "T" "P" "E" "Z" "Y"))
(format-string "~d~a~a"))
(loop while (and (>= file-size power) (rest post-fixes))
do (setf file-size (/ file-size power)
post-fixes (rest post-fixes)))
(if (> (abs (- file-size (round file-size))) 0.05)
(setf format-string "~,1f~a~a")
(setf file-size (round file-size)))
(format nil format-string
file-size
(if (and (eq flavor 'iec) (string= (first post-fixes) "k"))
"K"
(first post-fixes))
(cond
((and (eq flavor 'iec)
(string= (first post-fixes) ""))
"B")
((eq flavor 'iec) "iB")
(t "")))))
| 2,090 | Common Lisp | .lisp | 46 | 37.565217 | 81 | 0.587543 | jfmcbrayer/germinal | 40 | 2 | 0 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | c8cfb5b5007ff0b5f85f9f41183c9ff28fd7a430b7eebab1dbcc60039477689c | 4,267 | [
-1
] |
4,268 | middleware.lisp | jfmcbrayer_germinal/middleware.lisp | (in-package :germinal)
(defun basic-logging (handler)
"Middleware that logs requests to *standard-output*."
(lambda (request)
(let ((response (funcall handler request)))
(format
*standard-output*
"[~A] ~A \"~A\" ~A ~A ~%"
(local-time:now)
(usocket:host-to-hostname (request-client-address request))
(request-pathinfo request)
(response-status response)
(response-meta response))
response)))
(defun validate-server-name (handler)
"Middleware that ensures the requested host matches *germinal-server-name*."
(lambda (request)
(let* ((url (request-url request))
(host (uri-host url)))
(if (not (scan *germinal-server-name* host))
(make-response 51 "Not Found")
(funcall handler request)))))
(defun gemini-app (request)
(serve-route request))
(defun middleware-chain (middlewares)
(reduce
#'funcall
(remove-if
#'null
middlewares)
:initial-value #'gemini-app
:from-end t))
| 1,010 | Common Lisp | .lisp | 32 | 26.125 | 78 | 0.651951 | jfmcbrayer/germinal | 40 | 2 | 0 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 2000db854a245dbcc9594a2e0fd152ed201053a6eab96abdf672a5a74d5445c1 | 4,268 | [
-1
] |
4,269 | classes.lisp | jfmcbrayer_germinal/classes.lisp | (in-package :germinal)
(interpol:enable-interpol-syntax)
(defclass request ()
((url :initarg :url :accessor request-url)
(path-info :initarg :path-info :accessor request-pathinfo)
(params :initarg :params :accessor request-params)
(client-key :initarg :client-key :accessor request-client-key)
(client-address :initarg :client-address :accessor request-client-address)))
(defclass response ()
((status :initarg :status :accessor response-status)
(meta :initarg :meta :accessor response-meta)
(body :initarg :body :accessor response-body :initform "")))
(defun make-request (url &optional client-key client-address)
(let* ((parsed-url (uri url))
(params (car (car (quri:uri-query-params parsed-url)))))
(if (not (uri-path parsed-url))
(setf (uri-path parsed-url) "/" ))
(make-instance 'request :url parsed-url :path-info (uri-path parsed-url)
:params params
:client-key client-key
:client-address client-address)))
(defun make-response (status meta &optional body)
(make-instance 'response :status (write-to-string status) :meta meta :body body))
(defmethod write-response ((the-response response) (the-stream stream))
(write-sequence (babel:string-to-octets
(str:concat (response-status the-response)
" "
(response-meta the-response)
(coerce '(#\return #\newline) 'string)) :encoding :utf-8)
the-stream)
(if (response-body the-response)
(if (stringp (response-body the-response))
(let ((the-body (if (str:ends-with-p #?"\n" (response-body the-response))
(response-body the-response)
#?"$((response-body the-response))\n")))
(write-sequence (babel:string-to-octets the-body
:encoding :utf-8) the-stream))
(write-sequence (response-body the-response) the-stream)))
(force-output the-stream))
| 2,113 | Common Lisp | .lisp | 39 | 42.333333 | 88 | 0.603482 | jfmcbrayer/germinal | 40 | 2 | 0 | AGPL-3.0 | 9/19/2024, 11:26:12 AM (Europe/Amsterdam) | 04b755a33f1bda3edc2fc675e147ac56036a9df862619a0efcd6d4a042c67b62 | 4,269 | [
-1
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.