| OVAL Definition Results |
|
|
| ID |
Result |
Class |
Reference ID |
Title |
| oval:com.redhat.rhsa:def:20192600 |
true |
patch |
[RHSA-2019:2600], [CVE-2019-1125], [CVE-2019-9500] |
RHSA-2019:2600: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20192571 |
true |
patch |
[RHSA-2019:2571], [CVE-2019-1010238] |
RHSA-2019:2571: pango security update (Important) |
| oval:com.redhat.rhsa:def:20192327 |
true |
patch |
[RHSA-2019:2327], [CVE-2018-3058], [CVE-2018-3063], [CVE-2018-3066], [CVE-2018-3081], [CVE-2018-3282], [CVE-2019-2503], [CVE-2019-2529], [CVE-2019-2614], [CVE-2019-2627] |
RHSA-2019:2327: mariadb security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192304 |
true |
patch |
[RHSA-2019:2304], [CVE-2018-0734], [CVE-2019-1559] |
RHSA-2019:2304: openssl security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192237 |
true |
patch |
[RHSA-2019:2237], [CVE-2018-0495], [CVE-2018-12404] |
RHSA-2019:2237: nss, nss-softokn, nss-util, and nspr security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192197 |
true |
patch |
[RHSA-2019:2197], [CVE-2018-16062], [CVE-2018-16402], [CVE-2018-16403], [CVE-2018-18310], [CVE-2018-18520], [CVE-2018-18521], [CVE-2019-7149], [CVE-2019-7150], [CVE-2019-7664], [CVE-2019-7665] |
RHSA-2019:2197: elfutils security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20192189 |
true |
patch |
[RHSA-2019:2189], [CVE-2018-1122] |
RHSA-2019:2189: procps-ng security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192181 |
true |
patch |
[RHSA-2019:2181], [CVE-2018-16842] |
RHSA-2019:2181: curl security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20192169 |
true |
patch |
[RHSA-2019:2169], [CVE-2018-5383] |
RHSA-2019:2169: linux-firmware security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20192143 |
true |
patch |
[RHSA-2019:2143], [CVE-2018-15473] |
RHSA-2019:2143: openssh security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20192136 |
true |
patch |
[RHSA-2019:2136], [CVE-2019-3858], [CVE-2019-3861] |
RHSA-2019:2136: libssh2 security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192118 |
true |
patch |
[RHSA-2019:2118], [CVE-2016-10739] |
RHSA-2019:2118: glibc security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192110 |
true |
patch |
[RHSA-2019:2110], [CVE-2018-16881] |
RHSA-2019:2110: rsyslog security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192091 |
true |
patch |
[RHSA-2019:2091], [CVE-2018-15686], [CVE-2018-16866], [CVE-2018-16888] |
RHSA-2019:2091: systemd security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192079 |
true |
patch |
[RHSA-2019:2079], [CVE-2018-14598], [CVE-2018-14599], [CVE-2018-14600], [CVE-2018-15853], [CVE-2018-15854], [CVE-2018-15855], [CVE-2018-15856], [CVE-2018-15857], [CVE-2018-15859], [CVE-2018-15861], [CVE-2018-15862], [CVE-2018-15863], [CVE-2018-15864] |
RHSA-2019:2079: Xorg security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192075 |
true |
patch |
[RHSA-2019:2075], [CVE-2018-1000876], [CVE-2018-12641], [CVE-2018-12697] |
RHSA-2019:2075: binutils security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192060 |
true |
patch |
[RHSA-2019:2060], [CVE-2019-6470] |
RHSA-2019:2060: dhcp security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192057 |
true |
patch |
[RHSA-2019:2057], [CVE-2018-5741] |
RHSA-2019:2057: bind security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192053 |
true |
patch |
[RHSA-2019:2053], [CVE-2016-3186], [CVE-2018-10779], [CVE-2018-10963], [CVE-2018-12900], [CVE-2018-17100], [CVE-2018-17101], [CVE-2018-18557], [CVE-2018-18661], [CVE-2018-7456], [CVE-2018-8905] |
RHSA-2019:2053: libtiff security update (Moderate) |
| oval:com.redhat.rhsa:def:20192052 |
true |
patch |
[RHSA-2019:2052], [CVE-2016-3616], [CVE-2018-11212], [CVE-2018-11213], [CVE-2018-11214], [CVE-2018-11813], [CVE-2018-14498] |
RHSA-2019:2052: libjpeg-turbo security update (Moderate) |
| oval:com.redhat.rhsa:def:20192049 |
true |
patch |
[RHSA-2019:2049], [CVE-2018-18584], [CVE-2018-18585] |
RHSA-2019:2049: libmspack security update (Moderate) |
| oval:com.redhat.rhsa:def:20192046 |
true |
patch |
[RHSA-2019:2046], [CVE-2018-19788] |
RHSA-2019:2046: polkit security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192030 |
true |
patch |
[RHSA-2019:2030], [CVE-2018-14647], [CVE-2019-5010], [CVE-2019-9740], [CVE-2019-9947], [CVE-2019-9948] |
RHSA-2019:2030: python security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192029 |
true |
patch |
[RHSA-2019:2029], [CVE-2018-10853], [CVE-2018-13053], [CVE-2018-13093], [CVE-2018-13094], [CVE-2018-13095], [CVE-2018-14625], [CVE-2018-14734], [CVE-2018-15594], [CVE-2018-16658], [CVE-2018-16885], [CVE-2018-18281], [CVE-2018-7755], [CVE-2018-8087], [CVE-2018-9363], [CVE-2018-9516], [CVE-2018-9517], [CVE-2019-11599], [CVE-2019-11810], [CVE-2019-11833], [CVE-2019-3459], [CVE-2019-3460], [CVE-2019-3882], [CVE-2019-3900], [CVE-2019-5489], [CVE-2019-7222] |
RHSA-2019:2029: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20191884 |
true |
patch |
[RHSA-2019:1884], [CVE-2019-3862] |
RHSA-2019:1884: libssh2 security update (Moderate) |
| oval:com.redhat.rhsa:def:20191880 |
true |
patch |
[RHSA-2019:1880], [CVE-2018-14618] |
RHSA-2019:1880: curl security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20191873 |
true |
patch |
[RHSA-2019:1873], [CVE-2018-16871], [CVE-2018-16884], [CVE-2019-11085], [CVE-2019-11811] |
RHSA-2019:1873: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20191619 |
true |
patch |
[RHSA-2019:1619], [CVE-2019-12735] |
RHSA-2019:1619: vim security update (Important) |
| oval:com.redhat.rhsa:def:20191587 |
true |
patch |
[RHSA-2019:1587], [CVE-2019-10160] |
RHSA-2019:1587: python security update (Important) |
| oval:com.redhat.rhsa:def:20191481 |
true |
patch |
[RHSA-2019:1481], [CVE-2019-11477], [CVE-2019-11478], [CVE-2019-11479] |
RHSA-2019:1481: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20191294 |
true |
patch |
[RHSA-2019:1294], [CVE-2018-5743] |
RHSA-2019:1294: bind security update (Important) |
| oval:com.redhat.rhsa:def:20191168 |
true |
patch |
[RHSA-2019:1168], [CVE-2018-12126], [CVE-2018-12127], [CVE-2018-12130], [CVE-2019-11091] |
RHSA-2019:1168: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20190818 |
true |
patch |
[RHSA-2019:0818], [CVE-2019-6974], [CVE-2019-7221] |
RHSA-2019:0818: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20190710 |
true |
patch |
[RHSA-2019:0710], [CVE-2019-9636] |
RHSA-2019:0710: python security update (Important) |
| oval:com.redhat.rhsa:def:20190679 |
true |
patch |
[RHSA-2019:0679], [CVE-2019-3855], [CVE-2019-3856], [CVE-2019-3857], [CVE-2019-3863] |
RHSA-2019:0679: libssh2 security update (Important) |
| oval:com.redhat.rhsa:def:20190512 |
true |
patch |
[RHSA-2019:0512], [CVE-2018-17972], [CVE-2018-18445], [CVE-2018-9568] |
RHSA-2019:0512: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20190483 |
true |
patch |
[RHSA-2019:0483], [CVE-2018-5407] |
RHSA-2019:0483: openssl security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20190368 |
true |
patch |
[RHSA-2019:0368], [CVE-2019-6454] |
RHSA-2019:0368: systemd security update (Important) |
| oval:com.redhat.rhsa:def:20190230 |
true |
patch |
[RHSA-2019:0230], [CVE-2019-6133] |
RHSA-2019:0230: polkit security update (Important) |
| oval:com.redhat.rhsa:def:20190201 |
true |
patch |
[RHSA-2019:0201], [CVE-2019-3815] |
RHSA-2019:0201: systemd security update (Low) |
| oval:com.redhat.rhsa:def:20190194 |
true |
patch |
[RHSA-2019:0194], [CVE-2018-5742] |
RHSA-2019:0194: bind security update (Moderate) |
| oval:com.redhat.rhsa:def:20190163 |
true |
patch |
[RHSA-2019:0163], [CVE-2018-18397], [CVE-2018-18559] |
RHSA-2019:0163: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20190049 |
true |
patch |
[RHSA-2019:0049], [CVE-2018-15688], [CVE-2018-16864], [CVE-2018-16865] |
RHSA-2019:0049: systemd security update (Important) |
| oval:com.redhat.rhsa:def:20183665 |
true |
patch |
[RHSA-2018:3665], [CVE-2018-15688] |
RHSA-2018:3665: NetworkManager security update (Important) |
| oval:com.redhat.rhsa:def:20183651 |
true |
patch |
[RHSA-2018:3651], [CVE-2018-14633], [CVE-2018-14646] |
RHSA-2018:3651: kernel security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20183327 |
true |
patch |
[RHSA-2018:3327], [CVE-2018-14679], [CVE-2018-14680], [CVE-2018-14681], [CVE-2018-14682] |
RHSA-2018:3327: libmspack security update (Low) |
| oval:com.redhat.rhsa:def:20183324 |
true |
patch |
[RHSA-2018:3324], [CVE-2018-10906] |
RHSA-2018:3324: fuse security update (Moderate) |
| oval:com.redhat.rhsa:def:20183253 |
true |
patch |
[RHSA-2018:3253], [CVE-2016-9396], [CVE-2017-1000050] |
RHSA-2018:3253: jasper security update (Low) |
| oval:com.redhat.rhsa:def:20183249 |
true |
patch |
[RHSA-2018:3249], [CVE-2018-1113] |
RHSA-2018:3249: setup security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20183221 |
true |
patch |
[RHSA-2018:3221], [CVE-2017-3735], [CVE-2018-0495], [CVE-2018-0732], [CVE-2018-0737], [CVE-2018-0739] |
RHSA-2018:3221: openssl security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20183157 |
true |
patch |
[RHSA-2018:3157], [CVE-2018-1000007], [CVE-2018-1000120], [CVE-2018-1000121], [CVE-2018-1000122], [CVE-2018-1000301] |
RHSA-2018:3157: curl and nss-pem security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20183140 |
true |
patch |
[RHSA-2018:3140], [CVE-2017-18267], [CVE-2018-10733], [CVE-2018-10767], [CVE-2018-10768], [CVE-2018-12910], [CVE-2018-13988] |
RHSA-2018:3140: GNOME security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20183107 |
true |
patch |
[RHSA-2018:3107], [CVE-2018-14526] |
RHSA-2018:3107: wpa_supplicant security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20183092 |
true |
patch |
[RHSA-2018:3092], [CVE-2017-16997], [CVE-2018-11236], [CVE-2018-11237], [CVE-2018-6485] |
RHSA-2018:3092: glibc security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20183083 |
true |
patch |
[RHSA-2018:3083], [CVE-2015-8830], [CVE-2016-4913], [CVE-2017-0861], [CVE-2017-10661], [CVE-2017-17805], [CVE-2017-18208], [CVE-2017-18232], [CVE-2017-18344], [CVE-2017-18360], [CVE-2018-1000026], [CVE-2018-10322], [CVE-2018-10878], [CVE-2018-10879], [CVE-2018-10881], [CVE-2018-10883], [CVE-2018-10902], [CVE-2018-1092], [CVE-2018-1094], [CVE-2018-10940], [CVE-2018-1118], [CVE-2018-1120], [CVE-2018-1130], [CVE-2018-13405], [CVE-2018-18690], [CVE-2018-5344], [CVE-2018-5391], [CVE-2018-5803], [CVE-2018-5848], [CVE-2018-7740], [CVE-2018-7757], [CVE-2018-8781] |
RHSA-2018:3083: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20183071 |
true |
patch |
[RHSA-2018:3071], [CVE-2018-5729], [CVE-2018-5730] |
RHSA-2018:3071: krb5 security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20183059 |
true |
patch |
[RHSA-2018:3059], [CVE-2015-9262] |
RHSA-2018:3059: X.org X11 security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20183050 |
true |
patch |
[RHSA-2018:3050], [CVE-2018-10844], [CVE-2018-10845], [CVE-2018-10846] |
RHSA-2018:3050: gnutls security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20183041 |
true |
patch |
[RHSA-2018:3041], [CVE-2018-1060], [CVE-2018-1061] |
RHSA-2018:3041: python security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20183032 |
true |
patch |
[RHSA-2018:3032], [CVE-2018-10372], [CVE-2018-10373], [CVE-2018-10534], [CVE-2018-10535], [CVE-2018-13033], [CVE-2018-7208], [CVE-2018-7568], [CVE-2018-7569], [CVE-2018-7642], [CVE-2018-7643], [CVE-2018-8945] |
RHSA-2018:3032: binutils security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20182768 |
true |
patch |
[RHSA-2018:2768], [CVE-2018-12384] |
RHSA-2018:2768: nss security update (Moderate) |
| oval:com.redhat.rhsa:def:20182748 |
true |
patch |
[RHSA-2018:2748], [CVE-2018-14634] |
RHSA-2018:2748: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20182570 |
true |
patch |
[RHSA-2018:2570], [CVE-2018-5740] |
RHSA-2018:2570: bind security update (Important) |
| oval:com.redhat.rhsa:def:20182439 |
true |
patch |
[RHSA-2018:2439], [CVE-2017-10268], [CVE-2017-10378], [CVE-2017-10379], [CVE-2017-10384], [CVE-2017-3636], [CVE-2017-3641], [CVE-2017-3651], [CVE-2017-3653], [CVE-2018-2562], [CVE-2018-2622], [CVE-2018-2640], [CVE-2018-2665], [CVE-2018-2668], [CVE-2018-2755], [CVE-2018-2761], [CVE-2018-2767], [CVE-2018-2771], [CVE-2018-2781], [CVE-2018-2813], [CVE-2018-2817], [CVE-2018-2819], [CVE-2018-3133], [CVE-2019-2455] |
RHSA-2018:2439: mariadb security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20182384 |
true |
patch |
[RHSA-2018:2384], [CVE-2017-13215], [CVE-2018-10675], [CVE-2018-3620], [CVE-2018-3646], [CVE-2018-3693], [CVE-2018-5390], [CVE-2018-7566] |
RHSA-2018:2384: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20182181 |
true |
patch |
[RHSA-2018:2181], [CVE-2018-12020] |
RHSA-2018:2181: gnupg2 security update (Important) |
| oval:com.redhat.rhsa:def:20182123 |
true |
patch |
[RHSA-2018:2123], [CVE-2016-2183] |
RHSA-2018:2123: python security update (Moderate) |
| oval:com.redhat.rhsa:def:20181965 |
true |
patch |
[RHSA-2018:1965], [CVE-2017-11600], [CVE-2018-3639] |
RHSA-2018:1965: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20181852 |
true |
patch |
[RHSA-2018:1852], [CVE-2018-3665] |
RHSA-2018:1852: kernel security update (Moderate) |
| oval:com.redhat.rhsa:def:20181700 |
true |
patch |
[RHSA-2018:1700], [CVE-2018-1124], [CVE-2018-1126] |
RHSA-2018:1700: procps-ng security update (Important) |
| oval:com.redhat.rhsa:def:20181629 |
true |
patch |
[RHSA-2018:1629], [CVE-2018-3639] |
RHSA-2018:1629: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20181453 |
true |
patch |
[RHSA-2018:1453], [CVE-2018-1111] |
RHSA-2018:1453: dhcp security update (Critical) |
| oval:com.redhat.rhsa:def:20181318 |
true |
patch |
[RHSA-2018:1318], [CVE-2017-16939], [CVE-2018-1000199], [CVE-2018-1068], [CVE-2018-1087], [CVE-2018-1091], [CVE-2018-8897] |
RHSA-2018:1318: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20181062 |
true |
patch |
[RHSA-2018:1062], [CVE-2016-3672], [CVE-2016-7913], [CVE-2016-8633], [CVE-2017-1000252], [CVE-2017-1000407], [CVE-2017-1000410], [CVE-2017-12154], [CVE-2017-12190], [CVE-2017-13166], [CVE-2017-13305], [CVE-2017-14140], [CVE-2017-15116], [CVE-2017-15121], [CVE-2017-15126], [CVE-2017-15127], [CVE-2017-15129], [CVE-2017-15265], [CVE-2017-15274], [CVE-2017-17448], [CVE-2017-17449], [CVE-2017-17558], [CVE-2017-18017], [CVE-2017-18203], [CVE-2017-18270], [CVE-2017-7294], [CVE-2017-8824], [CVE-2017-9725], [CVE-2018-1000004], [CVE-2018-5750], [CVE-2018-6927] |
RHSA-2018:1062: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20180998 |
true |
patch |
[RHSA-2018:0998], [CVE-2017-3736], [CVE-2017-3737], [CVE-2017-3738] |
RHSA-2018:0998: openssl security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20180980 |
true |
patch |
[RHSA-2018:0980], [CVE-2017-15906] |
RHSA-2018:0980: openssh security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20180913 |
true |
patch |
[RHSA-2018:0913], [CVE-2018-1063] |
RHSA-2018:0913: policycoreutils security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20180849 |
true |
patch |
[RHSA-2018:0849], [CVE-2017-11671] |
RHSA-2018:0849: gcc security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20180805 |
true |
patch |
[RHSA-2018:0805], [CVE-2014-9402], [CVE-2015-5180], [CVE-2017-12132], [CVE-2017-15670], [CVE-2017-15804], [CVE-2018-1000001] |
RHSA-2018:0805: glibc security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20180666 |
true |
patch |
[RHSA-2018:0666], [CVE-2017-11368], [CVE-2017-7562] |
RHSA-2018:0666: krb5 security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20180483 |
true |
patch |
[RHSA-2018:0483], [CVE-2018-5732], [CVE-2018-5733] |
RHSA-2018:0483: dhcp security update (Important) |
| oval:com.redhat.rhsa:def:20180395 |
true |
patch |
[RHSA-2018:0395], [CVE-2017-12188], [CVE-2017-7518] |
RHSA-2018:0395: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20180260 |
true |
patch |
[RHSA-2018:0260], [CVE-2018-1049] |
RHSA-2018:0260: systemd security update (Moderate) |
| oval:com.redhat.rhsa:def:20180158 |
true |
patch |
[RHSA-2018:0158], [CVE-2017-3144] |
RHSA-2018:0158: dhcp security update (Moderate) |
| oval:com.redhat.rhsa:def:20180151 |
true |
patch |
[RHSA-2018:0151], [CVE-2015-8539], [CVE-2017-12192], [CVE-2017-12193], [CVE-2017-15649], [CVE-2017-7472] |
RHSA-2018:0151: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20180102 |
true |
patch |
[RHSA-2018:0102], [CVE-2017-3145] |
RHSA-2018:0102: bind security update (Important) |
| oval:com.redhat.rhsa:def:20180094 |
true |
patch |
[RHSA-2018:0094] |
RHSA-2018:0094: linux-firmware security update (Important) |
| oval:com.redhat.rhsa:def:20180093 |
true |
patch |
[RHSA-2018:0093] |
RHSA-2018:0093: microcode_ctl security update (Important) |
| oval:com.redhat.rhsa:def:20180014 |
true |
patch |
[RHSA-2018:0014] |
RHSA-2018:0014: linux-firmware security update (Important) |
| oval:com.redhat.rhsa:def:20180012 |
true |
patch |
[RHSA-2018:0012] |
RHSA-2018:0012: microcode_ctl security update (Important) |
| oval:com.redhat.rhsa:def:20180007 |
true |
patch |
[RHSA-2018:0007] |
RHSA-2018:0007: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20173315 |
true |
patch |
[RHSA-2017:3315], [CVE-2017-1000380] |
RHSA-2017:3315: kernel security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20173263 |
true |
patch |
[RHSA-2017:3263], [CVE-2017-1000257] |
RHSA-2017:3263: curl security update (Moderate) |
| oval:com.redhat.rhsa:def:20172930 |
true |
patch |
[RHSA-2017:2930], [CVE-2016-8399], [CVE-2017-1000111], [CVE-2017-1000112], [CVE-2017-11176], [CVE-2017-14106], [CVE-2017-7184], [CVE-2017-7541], [CVE-2017-7542], [CVE-2017-7558] |
RHSA-2017:2930: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20172907 |
true |
patch |
[RHSA-2017:2907], [CVE-2017-13077], [CVE-2017-13078], [CVE-2017-13080], [CVE-2017-13082], [CVE-2017-13086], [CVE-2017-13087], [CVE-2017-13088] |
RHSA-2017:2907: wpa_supplicant security update (Important) |
| oval:com.redhat.rhsa:def:20172836 |
true |
patch |
[RHSA-2017:2836], [CVE-2017-14491], [CVE-2017-14492], [CVE-2017-14493], [CVE-2017-14494], [CVE-2017-14495], [CVE-2017-14496] |
RHSA-2017:2836: dnsmasq security update (Critical) |
| oval:com.redhat.rhsa:def:20172832 |
true |
patch |
[RHSA-2017:2832], [CVE-2017-7805] |
RHSA-2017:2832: nss security update (Important) |
| oval:com.redhat.rhsa:def:20172771 |
true |
patch |
[RHSA-2017:2771], [CVE-2017-14482] |
RHSA-2017:2771: emacs security update (Important) |
| oval:com.redhat.rhsa:def:20172679 |
true |
patch |
[RHSA-2017:2679], [CVE-2017-1000251] |
RHSA-2017:2679: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20172473 |
true |
patch |
[RHSA-2017:2473], [CVE-2017-7533] |
RHSA-2017:2473: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20172459 |
true |
patch |
[RHSA-2017:2459], [CVE-2017-2885] |
RHSA-2017:2459: libsoup security update (Important) |
| oval:com.redhat.rhsa:def:20172299 |
true |
patch |
[RHSA-2017:2299], [CVE-2017-0553] |
RHSA-2017:2299: NetworkManager and libnl3 security, bug fix and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20172292 |
true |
patch |
[RHSA-2017:2292], [CVE-2016-7444], [CVE-2017-5334], [CVE-2017-5335], [CVE-2017-5336], [CVE-2017-5337], [CVE-2017-7507], [CVE-2017-7869] |
RHSA-2017:2292: gnutls security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20172285 |
true |
patch |
[RHSA-2017:2285], [CVE-2017-7488] |
RHSA-2017:2285: authconfig security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20172192 |
true |
patch |
[RHSA-2017:2192], [CVE-2016-5483], [CVE-2016-5617], [CVE-2016-6664], [CVE-2017-3238], [CVE-2017-3243], [CVE-2017-3244], [CVE-2017-3258], [CVE-2017-3265], [CVE-2017-3291], [CVE-2017-3302], [CVE-2017-3308], [CVE-2017-3309], [CVE-2017-3312], [CVE-2017-3313], [CVE-2017-3317], [CVE-2017-3318], [CVE-2017-3453], [CVE-2017-3456], [CVE-2017-3464], [CVE-2017-3600], [CVE-2017-3651] |
RHSA-2017:2192: mariadb security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20172029 |
true |
patch |
[RHSA-2017:2029], [CVE-2016-10009], [CVE-2016-10011], [CVE-2016-10012], [CVE-2016-10708], [CVE-2016-6210], [CVE-2016-6515] |
RHSA-2017:2029: openssh security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20172016 |
true |
patch |
[RHSA-2017:2016], [CVE-2016-7167] |
RHSA-2017:2016: curl security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20171931 |
true |
patch |
[RHSA-2017:1931], [CVE-2016-0634], [CVE-2016-7543], [CVE-2016-9401] |
RHSA-2017:1931: bash security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20171916 |
true |
patch |
[RHSA-2017:1916], [CVE-2014-9761], [CVE-2015-8776], [CVE-2015-8777], [CVE-2015-8778], [CVE-2015-8779] |
RHSA-2017:1916: glibc security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20171868 |
true |
patch |
[RHSA-2017:1868], [CVE-2014-9365] |
RHSA-2017:1868: python security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20171865 |
true |
patch |
[RHSA-2017:1865], [CVE-2016-10164], [CVE-2017-2625], [CVE-2017-2626] |
RHSA-2017:1865: X.org X11 libraries security, bug fix and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20171860 |
true |
patch |
[RHSA-2017:1860], [CVE-2015-2806], [CVE-2015-3622] |
RHSA-2017:1860: libtasn1 security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20171852 |
true |
patch |
[RHSA-2017:1852], [CVE-2017-9287] |
RHSA-2017:1852: openldap security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20171842 |
true |
patch |
[RHSA-2017:1842], [CVE-2014-7970], [CVE-2014-7975], [CVE-2015-8839], [CVE-2015-8970], [CVE-2016-10088], [CVE-2016-10147], [CVE-2016-10200], [CVE-2016-10741], [CVE-2016-6213], [CVE-2016-7042], [CVE-2016-7097], [CVE-2016-8645], [CVE-2016-9576], [CVE-2016-9588], [CVE-2016-9604], [CVE-2016-9685], [CVE-2016-9806], [CVE-2017-1000379], [CVE-2017-2584], [CVE-2017-2596], [CVE-2017-2647], [CVE-2017-2671], [CVE-2017-5551], [CVE-2017-5970], [CVE-2017-6001], [CVE-2017-6951], [CVE-2017-7187], [CVE-2017-7495], [CVE-2017-7616], [CVE-2017-7889], [CVE-2017-8797], [CVE-2017-8890], [CVE-2017-9074], [CVE-2017-9075], [CVE-2017-9076], [CVE-2017-9077], [CVE-2017-9242] |
RHSA-2017:1842: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20171793 |
true |
patch |
[RHSA-2017:1793], [CVE-2017-7771], [CVE-2017-7772], [CVE-2017-7773], [CVE-2017-7774], [CVE-2017-7775], [CVE-2017-7776], [CVE-2017-7777], [CVE-2017-7778] |
RHSA-2017:1793: graphite2 security update (Important) |
| oval:com.redhat.rhsa:def:20171680 |
true |
patch |
[RHSA-2017:1680], [CVE-2017-3142], [CVE-2017-3143] |
RHSA-2017:1680: bind security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20171615 |
true |
patch |
[RHSA-2017:1615], [CVE-2017-2583], [CVE-2017-6214], [CVE-2017-7477], [CVE-2017-7645], [CVE-2017-7895] |
RHSA-2017:1615: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20171574 |
true |
patch |
[RHSA-2017:1574], [CVE-2017-1000368] |
RHSA-2017:1574: sudo security update (Moderate) |
| oval:com.redhat.rhsa:def:20171484 |
true |
patch |
[RHSA-2017:1484], [CVE-2017-1000364], [CVE-2017-1000379] |
RHSA-2017:1484: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20171481 |
true |
patch |
[RHSA-2017:1481], [CVE-2017-1000366] |
RHSA-2017:1481: glibc security update (Important) |
| oval:com.redhat.rhsa:def:20171382 |
true |
patch |
[RHSA-2017:1382], [CVE-2017-1000367] |
RHSA-2017:1382: sudo security update (Important) |
| oval:com.redhat.rhsa:def:20171365 |
true |
patch |
[RHSA-2017:1365], [CVE-2017-7502] |
RHSA-2017:1365: nss security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20171308 |
true |
patch |
[RHSA-2017:1308], [CVE-2016-10208], [CVE-2016-7910], [CVE-2016-8646], [CVE-2017-5986], [CVE-2017-7308] |
RHSA-2017:1308: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20171208 |
true |
patch |
[RHSA-2017:1208], [CVE-2015-5203], [CVE-2015-5221], [CVE-2016-10248], [CVE-2016-10249], [CVE-2016-10251], [CVE-2016-1577], [CVE-2016-1867], [CVE-2016-2089], [CVE-2016-2116], [CVE-2016-8654], [CVE-2016-8690], [CVE-2016-8691], [CVE-2016-8692], [CVE-2016-8693], [CVE-2016-8883], [CVE-2016-8884], [CVE-2016-8885], [CVE-2016-9262], [CVE-2016-9387], [CVE-2016-9388], [CVE-2016-9389], [CVE-2016-9390], [CVE-2016-9391], [CVE-2016-9392], [CVE-2016-9393], [CVE-2016-9394], [CVE-2016-9560], [CVE-2016-9583], [CVE-2016-9591], [CVE-2016-9600] |
RHSA-2017:1208: jasper security update (Important) |
| oval:com.redhat.rhsa:def:20171100 |
true |
patch |
[RHSA-2017:1100], [CVE-2017-5461] |
RHSA-2017:1100: nss and nss-util security update (Critical) |
| oval:com.redhat.rhsa:def:20171095 |
true |
patch |
[RHSA-2017:1095], [CVE-2017-3136], [CVE-2017-3137] |
RHSA-2017:1095: bind security update (Important) |
| oval:com.redhat.rhsa:def:20170933 |
true |
patch |
[RHSA-2017:0933], [CVE-2016-8650], [CVE-2016-9793], [CVE-2017-2618], [CVE-2017-2636] |
RHSA-2017:0933: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20170907 |
true |
patch |
[RHSA-2017:0907], [CVE-2017-2616] |
RHSA-2017:0907: util-linux security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20170386 |
true |
patch |
[RHSA-2017:0386], [CVE-2016-8630], [CVE-2016-8655], [CVE-2016-9083], [CVE-2016-9084] |
RHSA-2017:0386: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20170294 |
true |
patch |
[RHSA-2017:0294], [CVE-2017-6074] |
RHSA-2017:0294: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20170286 |
true |
patch |
[RHSA-2017:0286], [CVE-2016-8610], [CVE-2017-3731] |
RHSA-2017:0286: openssl security update (Moderate) |
| oval:com.redhat.rhsa:def:20170276 |
true |
patch |
[RHSA-2017:0276], [CVE-2017-3135] |
RHSA-2017:0276: bind security update (Moderate) |
| oval:com.redhat.rhsa:def:20170225 |
true |
patch |
[RHSA-2017:0225], [CVE-2015-8870], [CVE-2016-5652], [CVE-2016-9533], [CVE-2016-9534], [CVE-2016-9535], [CVE-2016-9536], [CVE-2016-9537], [CVE-2016-9540] |
RHSA-2017:0225: libtiff security update (Moderate) |
| oval:com.redhat.rhsa:def:20170086 |
true |
patch |
[RHSA-2017:0086], [CVE-2016-6828], [CVE-2016-7117], [CVE-2016-9555] |
RHSA-2017:0086: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20170062 |
true |
patch |
[RHSA-2017:0062], [CVE-2016-9131], [CVE-2016-9147], [CVE-2016-9444] |
RHSA-2017:0062: bind security update (Important) |
| oval:com.redhat.rhsa:def:20162972 |
true |
patch |
[RHSA-2016:2972], [CVE-2016-1248] |
RHSA-2016:2972: vim security update (Moderate) |
| oval:com.redhat.rhsa:def:20162872 |
true |
patch |
[RHSA-2016:2872], [CVE-2016-7032], [CVE-2016-7076] |
RHSA-2016:2872: sudo security update (Moderate) |
| oval:com.redhat.rhsa:def:20162824 |
true |
patch |
[RHSA-2016:2824], [CVE-2016-0718] |
RHSA-2016:2824: expat security update (Moderate) |
| oval:com.redhat.rhsa:def:20162779 |
true |
patch |
[RHSA-2016:2779], [CVE-2016-2834], [CVE-2016-5285], [CVE-2016-8635] |
RHSA-2016:2779: nss and nss-util security update (Moderate) |
| oval:com.redhat.rhsa:def:20162702 |
true |
patch |
[RHSA-2016:2702], [CVE-2016-7545] |
RHSA-2016:2702: policycoreutils security update (Important) |
| oval:com.redhat.rhsa:def:20162674 |
true |
patch |
[RHSA-2016:2674], [CVE-2016-6313] |
RHSA-2016:2674: libgcrypt security update (Moderate) |
| oval:com.redhat.rhsa:def:20162615 |
true |
patch |
[RHSA-2016:2615], [CVE-2016-8864] |
RHSA-2016:2615: bind security update (Important) |
| oval:com.redhat.rhsa:def:20162610 |
true |
patch |
[RHSA-2016:2610], [CVE-2016-7795] |
RHSA-2016:2610: systemd security and bug fix update (Moderate) |
| oval:com.redhat.rhba:def:20180042 |
true |
patch |
[RHBA-2018:0042], [CVE-2017-5715] |
RHBA-2018:0042: dracut bug fix update (None) |
| oval:com.redhat.rhba:def:20171929 |
true |
patch |
[RHBA-2017:1929], [CVE-2016-7056] |
RHBA-2017:1929: openssl bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20171767 |
true |
patch |
[RHBA-2017:1767], [CVE-2016-2775] |
RHBA-2017:1767: bind bug fix update (None) |
| oval:com.redhat.rhsa:def:20192609 |
false |
patch |
[RHSA-2019:2609], [CVE-2019-1125], [CVE-2019-9500] |
RHSA-2019:2609: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20192607 |
false |
patch |
[RHSA-2019:2607], [CVE-2019-12155] |
RHSA-2019:2607: qemu-kvm security update (Low) |
| oval:com.redhat.rhsa:def:20192606 |
false |
patch |
[RHSA-2019:2606], [CVE-2019-14744] |
RHSA-2019:2606: kdelibs and kde-settings security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20192586 |
false |
patch |
[RHSA-2019:2586], [CVE-2019-14811], [CVE-2019-14812], [CVE-2019-14813], [CVE-2019-14817] |
RHSA-2019:2586: ghostscript security update (Important) |
| oval:com.redhat.rhsa:def:20192462 |
false |
patch |
[RHSA-2019:2462], [CVE-2019-10216] |
RHSA-2019:2462: ghostscript security update (Important) |
| oval:com.redhat.rhsa:def:20192343 |
false |
patch |
[RHSA-2019:2343], [CVE-2019-0217], [CVE-2019-0220] |
RHSA-2019:2343: httpd security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192336 |
false |
patch |
[RHSA-2019:2336], [CVE-2018-7409], [CVE-2018-7485] |
RHSA-2019:2336: unixODBC security update (Moderate) |
| oval:com.redhat.rhsa:def:20192332 |
false |
patch |
[RHSA-2019:2332], [CVE-2019-8379], [CVE-2019-8383] |
RHSA-2019:2332: advancecomp security update (Low) |
| oval:com.redhat.rhsa:def:20192308 |
false |
patch |
[RHSA-2019:2308], [CVE-2019-9755] |
RHSA-2019:2308: libguestfs-winsupport security update (Low) |
| oval:com.redhat.rhsa:def:20192298 |
false |
patch |
[RHSA-2019:2298], [CVE-2017-14503], [CVE-2018-1000877], [CVE-2018-1000878], [CVE-2019-1000019], [CVE-2019-1000020] |
RHSA-2019:2298: libarchive security update (Moderate) |
| oval:com.redhat.rhsa:def:20192294 |
false |
patch |
[RHSA-2019:2294], [CVE-2019-3840] |
RHSA-2019:2294: libvirt security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192290 |
false |
patch |
[RHSA-2019:2290], [CVE-2018-20532], [CVE-2018-20533], [CVE-2018-20534] |
RHSA-2019:2290: libsolv security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20192285 |
false |
patch |
[RHSA-2019:2285], [CVE-2018-19044] |
RHSA-2019:2285: keepalived security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192283 |
false |
patch |
[RHSA-2019:2283], [CVE-2017-18189] |
RHSA-2019:2283: sox security update (Low) |
| oval:com.redhat.rhsa:def:20192281 |
false |
patch |
[RHSA-2019:2281], [CVE-2018-11645] |
RHSA-2019:2281: ghostscript security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20192280 |
false |
patch |
[RHSA-2019:2280], [CVE-2018-19198], [CVE-2018-19199] |
RHSA-2019:2280: uriparser security update (Moderate) |
| oval:com.redhat.rhsa:def:20192276 |
false |
patch |
[RHSA-2019:2276], [CVE-2018-1000132], [CVE-2018-13346], [CVE-2018-13347] |
RHSA-2019:2276: mercurial security update (Moderate) |
| oval:com.redhat.rhsa:def:20192272 |
false |
patch |
[RHSA-2019:2272], [CVE-2018-20060], [CVE-2019-11236] |
RHSA-2019:2272: python-urllib3 security update (Moderate) |
| oval:com.redhat.rhsa:def:20192258 |
false |
patch |
[RHSA-2019:2258], [CVE-2018-12121], [CVE-2018-7159] |
RHSA-2019:2258: http-parser security update (Moderate) |
| oval:com.redhat.rhsa:def:20192229 |
false |
patch |
[RHSA-2019:2229], [CVE-2018-10893] |
RHSA-2019:2229: spice-gtk security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192205 |
false |
patch |
[RHSA-2019:2205], [CVE-2018-1304], [CVE-2018-1305], [CVE-2018-8014], [CVE-2018-8034] |
RHSA-2019:2205: tomcat security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192196 |
false |
patch |
[RHSA-2019:2196], [CVE-2018-16548], [CVE-2018-6541] |
RHSA-2019:2196: zziplib security update (Low) |
| oval:com.redhat.rhsa:def:20192178 |
false |
patch |
[RHSA-2019:2178], [CVE-2018-17336] |
RHSA-2019:2178: udisks2 security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192177 |
false |
patch |
[RHSA-2019:2177], [CVE-2018-16838], [CVE-2019-3811] |
RHSA-2019:2177: sssd security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192166 |
false |
patch |
[RHSA-2019:2166], [CVE-2018-17963], [CVE-2019-6501] |
RHSA-2019:2166: qemu-kvm-ma security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192162 |
false |
patch |
[RHSA-2019:2162], [CVE-2018-10689] |
RHSA-2019:2162: blktrace security update (Low) |
| oval:com.redhat.rhsa:def:20192159 |
false |
patch |
[RHSA-2019:2159], [CVE-2018-18384] |
RHSA-2019:2159: unzip security update (Low) |
| oval:com.redhat.rhsa:def:20192157 |
false |
patch |
[RHSA-2019:2157], [CVE-2018-1000852] |
RHSA-2019:2157: freerdp and vinagre security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20192154 |
false |
patch |
[RHSA-2019:2154], [CVE-2018-16391], [CVE-2018-16392], [CVE-2018-16393], [CVE-2018-16418], [CVE-2018-16419], [CVE-2018-16420], [CVE-2018-16421], [CVE-2018-16422], [CVE-2018-16423], [CVE-2018-16426], [CVE-2018-16427] |
RHSA-2019:2154: opensc security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192145 |
false |
patch |
[RHSA-2019:2145], [CVE-2019-3827] |
RHSA-2019:2145: gvfs security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192141 |
false |
patch |
[RHSA-2019:2141], [CVE-2018-6790] |
RHSA-2019:2141: kde-workspace security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20192137 |
false |
patch |
[RHSA-2019:2137], [CVE-2017-15111], [CVE-2017-15112] |
RHSA-2019:2137: keycloak-httpd-client-install security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20192135 |
false |
patch |
[RHSA-2019:2135], [CVE-2018-15518], [CVE-2018-19869], [CVE-2018-19870], [CVE-2018-19871], [CVE-2018-19873] |
RHSA-2019:2135: qt5 security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192130 |
false |
patch |
[RHSA-2019:2130], [CVE-2018-16858] |
RHSA-2019:2130: libreoffice security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20192126 |
false |
patch |
[RHSA-2019:2126], [CVE-2018-19208] |
RHSA-2019:2126: libwpd security update (Low) |
| oval:com.redhat.rhsa:def:20192125 |
false |
patch |
[RHSA-2019:2125], [CVE-2017-5731], [CVE-2017-5732], [CVE-2017-5733], [CVE-2017-5734], [CVE-2017-5735], [CVE-2018-12181], [CVE-2018-3613], [CVE-2018-5407], [CVE-2019-0160], [CVE-2019-0161] |
RHSA-2019:2125: ovmf security and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192112 |
false |
patch |
[RHSA-2019:2112], [CVE-2017-6059], [CVE-2017-6413] |
RHSA-2019:2112: mod_auth_openidc security update (Moderate) |
| oval:com.redhat.rhsa:def:20192101 |
false |
patch |
[RHSA-2019:2101], [CVE-2017-17724], [CVE-2018-10772], [CVE-2018-10958], [CVE-2018-10998], [CVE-2018-11037], [CVE-2018-12264], [CVE-2018-12265], [CVE-2018-14046], [CVE-2018-17282], [CVE-2018-17581], [CVE-2018-18915], [CVE-2018-19107], [CVE-2018-19108], [CVE-2018-19535], [CVE-2018-19607], [CVE-2018-20096], [CVE-2018-20097], [CVE-2018-20098], [CVE-2018-20099], [CVE-2018-8976], [CVE-2018-8977], [CVE-2018-9305] |
RHSA-2019:2101: exiv2 security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20192099 |
false |
patch |
[RHSA-2019:2099], [CVE-2019-3880] |
RHSA-2019:2099: samba security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192097 |
false |
patch |
[RHSA-2019:2097], [CVE-2018-12015] |
RHSA-2019:2097: perl-Archive-Tar security update (Moderate) |
| oval:com.redhat.rhsa:def:20192078 |
false |
patch |
[RHSA-2019:2078], [CVE-2019-9824] |
RHSA-2019:2078: qemu-kvm security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20192077 |
false |
patch |
[RHSA-2019:2077], [CVE-2018-12327] |
RHSA-2019:2077: ntp security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20192051 |
false |
patch |
[RHSA-2019:2051], [CVE-2018-7456] |
RHSA-2019:2051: compat-libtiff3 security update (Low) |
| oval:com.redhat.rhsa:def:20192048 |
false |
patch |
[RHSA-2019:2048], [CVE-2017-18233], [CVE-2017-18234], [CVE-2017-18236], [CVE-2017-18238], [CVE-2018-7730] |
RHSA-2019:2048: exempi security update (Low) |
| oval:com.redhat.rhsa:def:20192047 |
false |
patch |
[RHSA-2019:2047], [CVE-2018-14348] |
RHSA-2019:2047: libcgroup security update (Moderate) |
| oval:com.redhat.rhsa:def:20192043 |
false |
patch |
[RHSA-2019:2043], [CVE-2018-10853], [CVE-2018-13053], [CVE-2018-13093], [CVE-2018-13094], [CVE-2018-13095], [CVE-2018-14625], [CVE-2018-14734], [CVE-2018-15594], [CVE-2018-16658], [CVE-2018-16885], [CVE-2018-18281], [CVE-2018-7755], [CVE-2018-8087], [CVE-2018-9363], [CVE-2018-9516], [CVE-2018-9517], [CVE-2019-11599], [CVE-2019-11810], [CVE-2019-11833], [CVE-2019-3459], [CVE-2019-3460], [CVE-2019-3882], [CVE-2019-3900], [CVE-2019-5489], [CVE-2019-7222] |
RHSA-2019:2043: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20192037 |
false |
patch |
[RHSA-2019:2037], [CVE-2019-10153] |
RHSA-2019:2037: fence-agents security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192035 |
false |
patch |
[RHSA-2019:2035], [CVE-2018-18074] |
RHSA-2019:2035: python-requests security update (Low) |
| oval:com.redhat.rhsa:def:20192033 |
false |
patch |
[RHSA-2019:2033], [CVE-2016-10713], [CVE-2018-6952] |
RHSA-2019:2033: patch security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20192028 |
false |
patch |
[RHSA-2019:2028], [CVE-2017-17742], [CVE-2018-1000073], [CVE-2018-1000074], [CVE-2018-1000075], [CVE-2018-1000076], [CVE-2018-1000077], [CVE-2018-1000078], [CVE-2018-1000079], [CVE-2018-16396], [CVE-2018-6914], [CVE-2018-8777], [CVE-2018-8778], [CVE-2018-8779], [CVE-2018-8780] |
RHSA-2019:2028: ruby security update (Moderate) |
| oval:com.redhat.rhsa:def:20192022 |
false |
patch |
[RHSA-2019:2022], [CVE-2018-16646], [CVE-2018-18897], [CVE-2018-19058], [CVE-2018-19059], [CVE-2018-19060], [CVE-2018-19149], [CVE-2018-20481], [CVE-2018-20650], [CVE-2018-20662], [CVE-2019-7310], [CVE-2019-9200], [CVE-2019-9631] |
RHSA-2019:2022: poppler security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20192017 |
false |
patch |
[RHSA-2019:2017], [CVE-2018-13259] |
RHSA-2019:2017: zsh security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20192003 |
false |
patch |
[RHSA-2019:2003], [CVE-2019-10181], [CVE-2019-10182], [CVE-2019-10185] |
RHSA-2019:2003: icedtea-web security update (Important) |
| oval:com.redhat.rhsa:def:20191898 |
false |
patch |
[RHSA-2019:1898], [CVE-2018-1312] |
RHSA-2019:1898: httpd security update (Low) |
| oval:com.redhat.rhsa:def:20191896 |
false |
patch |
[RHSA-2019:1896], [CVE-2019-3883] |
RHSA-2019:1896: 389-ds-base security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20191891 |
false |
patch |
[RHSA-2019:1891], [CVE-2018-16871], [CVE-2018-16884], [CVE-2019-11085], [CVE-2019-11811] |
RHSA-2019:1891: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20191883 |
false |
patch |
[RHSA-2019:1883], [CVE-2019-6778] |
RHSA-2019:1883: qemu-kvm security update (Important) |
| oval:com.redhat.rhsa:def:20191881 |
false |
patch |
[RHSA-2019:1881], [CVE-2018-20815] |
RHSA-2019:1881: qemu-kvm-ma security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20191839 |
false |
patch |
[RHSA-2019:1839], [CVE-2019-2745], [CVE-2019-2762], [CVE-2019-2769], [CVE-2019-2786], [CVE-2019-2816], [CVE-2019-2842] |
RHSA-2019:1839: java-1.7.0-openjdk security update (Moderate) |
| oval:com.redhat.rhsa:def:20191815 |
false |
patch |
[RHSA-2019:1815], [CVE-2019-2745], [CVE-2019-2762], [CVE-2019-2769], [CVE-2019-2786], [CVE-2019-2816], [CVE-2019-2842] |
RHSA-2019:1815: java-1.8.0-openjdk security update (Moderate) |
| oval:com.redhat.rhsa:def:20191810 |
false |
patch |
[RHSA-2019:1810], [CVE-2019-2745], [CVE-2019-2762], [CVE-2019-2769], [CVE-2019-2786], [CVE-2019-2816], [CVE-2019-2818], [CVE-2019-2821] |
RHSA-2019:1810: java-11-openjdk security update (Moderate) |
| oval:com.redhat.rhsa:def:20191775 |
false |
patch |
[RHSA-2019:1775], [CVE-2019-11709], [CVE-2019-11711], [CVE-2019-11712], [CVE-2019-11713], [CVE-2019-11715], [CVE-2019-11717], [CVE-2019-11730], [CVE-2019-9811] |
RHSA-2019:1775: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20191763 |
false |
patch |
[RHSA-2019:1763], [CVE-2019-11709], [CVE-2019-11711], [CVE-2019-11712], [CVE-2019-11713], [CVE-2019-11715], [CVE-2019-11717], [CVE-2019-11730], [CVE-2019-9811] |
RHSA-2019:1763: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20191626 |
false |
patch |
[RHSA-2019:1626], [CVE-2019-11703], [CVE-2019-11704], [CVE-2019-11705], [CVE-2019-11706], [CVE-2019-11707], [CVE-2019-11708] |
RHSA-2019:1626: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20191603 |
false |
patch |
[RHSA-2019:1603], [CVE-2019-11707], [CVE-2019-11708] |
RHSA-2019:1603: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20191579 |
false |
patch |
[RHSA-2019:1579], [CVE-2019-10161], [CVE-2019-10166], [CVE-2019-10167], [CVE-2019-10168] |
RHSA-2019:1579: libvirt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20191486 |
false |
patch |
[RHSA-2019:1486], [CVE-2019-11477], [CVE-2019-11478], [CVE-2019-11479] |
RHSA-2019:1486: kernel-rt security update (Important) |
| oval:com.redhat.rhsa:def:20191309 |
false |
patch |
[RHSA-2019:1309], [CVE-2018-18511], [CVE-2019-11691], [CVE-2019-11692], [CVE-2019-11693], [CVE-2019-11698], [CVE-2019-5798], [CVE-2019-7317], [CVE-2019-9797], [CVE-2019-9800], [CVE-2019-9817], [CVE-2019-9819], [CVE-2019-9820] |
RHSA-2019:1309: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20191278 |
false |
patch |
[RHSA-2019:1278], [CVE-2018-16877], [CVE-2018-16878], [CVE-2019-3885] |
RHSA-2019:1278: pacemaker security update (Important) |
| oval:com.redhat.rhsa:def:20191265 |
false |
patch |
[RHSA-2019:1265], [CVE-2018-18511], [CVE-2019-11691], [CVE-2019-11692], [CVE-2019-11693], [CVE-2019-11698], [CVE-2019-5798], [CVE-2019-7317], [CVE-2019-9797], [CVE-2019-9800], [CVE-2019-9816], [CVE-2019-9817], [CVE-2019-9819], [CVE-2019-9820] |
RHSA-2019:1265: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20191264 |
false |
patch |
[RHSA-2019:1264], [CVE-2019-10132] |
RHSA-2019:1264: libvirt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20191235 |
false |
patch |
[RHSA-2019:1235], [CVE-2019-8322], [CVE-2019-8323], [CVE-2019-8324], [CVE-2019-8325] |
RHSA-2019:1235: ruby security update (Important) |
| oval:com.redhat.rhsa:def:20191228 |
false |
patch |
[RHSA-2019:1228], [CVE-2019-5953] |
RHSA-2019:1228: wget security update (Important) |
| oval:com.redhat.rhsa:def:20191178 |
false |
patch |
[RHSA-2019:1178], [CVE-2018-12126], [CVE-2018-12127], [CVE-2018-12130], [CVE-2019-11091] |
RHSA-2019:1178: qemu-kvm security update (Important) |
| oval:com.redhat.rhsa:def:20191177 |
false |
patch |
[RHSA-2019:1177], [CVE-2018-12126], [CVE-2018-12127], [CVE-2018-12130], [CVE-2019-11091] |
RHSA-2019:1177: libvirt security update (Important) |
| oval:com.redhat.rhsa:def:20191176 |
false |
patch |
[RHSA-2019:1176], [CVE-2018-12126], [CVE-2018-12127], [CVE-2018-12130], [CVE-2019-11091] |
RHSA-2019:1176: kernel-rt security update (Important) |
| oval:com.redhat.rhsa:def:20191131 |
false |
patch |
[RHSA-2019:1131], [CVE-2019-11234], [CVE-2019-11235] |
RHSA-2019:1131: freeradius security update (Important) |
| oval:com.redhat.rhsa:def:20191024 |
false |
patch |
[RHSA-2019:1024], [CVE-2019-10063] |
RHSA-2019:1024: flatpak security update (Important) |
| oval:com.redhat.rhsa:def:20191022 |
false |
patch |
[RHSA-2019:1022], [CVE-2016-10745] |
RHSA-2019:1022: python-jinja2 security update (Important) |
| oval:com.redhat.rhsa:def:20191017 |
false |
patch |
[RHSA-2019:1017], [CVE-2019-3839] |
RHSA-2019:1017: ghostscript security update (Important) |
| oval:com.redhat.rhsa:def:20190833 |
false |
patch |
[RHSA-2019:0833], [CVE-2019-6974], [CVE-2019-7221] |
RHSA-2019:0833: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20190809 |
false |
patch |
[RHSA-2019:0809], [CVE-2018-12180] |
RHSA-2019:0809: ovmf security update (Important) |
| oval:com.redhat.rhsa:def:20190791 |
false |
patch |
[RHSA-2019:0791], [CVE-2019-2602], [CVE-2019-2684], [CVE-2019-2698] |
RHSA-2019:0791: java-1.7.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20190778 |
false |
patch |
[RHSA-2019:0778], [CVE-2019-2602], [CVE-2019-2684] |
RHSA-2019:0778: java-11-openjdk security update (Moderate) |
| oval:com.redhat.rhsa:def:20190775 |
false |
patch |
[RHSA-2019:0775], [CVE-2019-2602], [CVE-2019-2684], [CVE-2019-2698] |
RHSA-2019:0775: java-1.8.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20190766 |
false |
patch |
[RHSA-2019:0766], [CVE-2019-3877], [CVE-2019-3878] |
RHSA-2019:0766: mod_auth_mellon security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20190697 |
false |
patch |
[RHSA-2019:0697], [CVE-2018-8786], [CVE-2018-8787], [CVE-2018-8788] |
RHSA-2019:0697: freerdp security update (Important) |
| oval:com.redhat.rhsa:def:20190681 |
false |
patch |
[RHSA-2019:0681], [CVE-2018-18356], [CVE-2018-18506], [CVE-2018-18509], [CVE-2019-5785], [CVE-2019-9788], [CVE-2019-9790], [CVE-2019-9791], [CVE-2019-9792], [CVE-2019-9793], [CVE-2019-9795], [CVE-2019-9796], [CVE-2019-9810], [CVE-2019-9813] |
RHSA-2019:0681: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20190671 |
false |
patch |
[RHSA-2019:0671], [CVE-2019-9810], [CVE-2019-9813] |
RHSA-2019:0671: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20190638 |
false |
patch |
[RHSA-2019:0638], [CVE-2019-3816] |
RHSA-2019:0638: openwsman security update (Important) |
| oval:com.redhat.rhsa:def:20190633 |
false |
patch |
[RHSA-2019:0633], [CVE-2019-3835], [CVE-2019-3838] |
RHSA-2019:0633: ghostscript security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20190622 |
false |
patch |
[RHSA-2019:0622], [CVE-2018-18506], [CVE-2019-9788], [CVE-2019-9790], [CVE-2019-9791], [CVE-2019-9792], [CVE-2019-9793], [CVE-2019-9795], [CVE-2019-9796] |
RHSA-2019:0622: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20190597 |
false |
patch |
[RHSA-2019:0597], [CVE-2019-0816] |
RHSA-2019:0597: cloud-init security update (Moderate) |
| oval:com.redhat.rhsa:def:20190514 |
false |
patch |
[RHSA-2019:0514], [CVE-2018-17972], [CVE-2018-18445], [CVE-2018-9568] |
RHSA-2019:0514: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20190485 |
false |
patch |
[RHSA-2019:0485], [CVE-2018-11784] |
RHSA-2019:0485: tomcat security update (Moderate) |
| oval:com.redhat.rhsa:def:20190482 |
false |
patch |
[RHSA-2019:0482], [CVE-2019-3804] |
RHSA-2019:0482: cockpit security update (Moderate) |
| oval:com.redhat.rhsa:def:20190464 |
false |
patch |
[RHSA-2019:0464], [CVE-2019-2422] |
RHSA-2019:0464: java-1.7.0-openjdk security update (Moderate) |
| oval:com.redhat.rhsa:def:20190436 |
false |
patch |
[RHSA-2019:0436], [CVE-2019-2422] |
RHSA-2019:0436: java-11-openjdk security update (Moderate) |
| oval:com.redhat.rhsa:def:20190435 |
false |
patch |
[RHSA-2019:0435], [CVE-2019-2422] |
RHSA-2019:0435: java-1.8.0-openjdk security update (Moderate) |
| oval:com.redhat.rhsa:def:20190375 |
false |
patch |
[RHSA-2019:0375], [CVE-2019-8308] |
RHSA-2019:0375: flatpak security update (Important) |
| oval:com.redhat.rhsa:def:20190374 |
false |
patch |
[RHSA-2019:0374], [CVE-2018-18356], [CVE-2019-5785] |
RHSA-2019:0374: firefox security update (Important) |
| oval:com.redhat.rhsa:def:20190270 |
false |
patch |
[RHSA-2019:0270], [CVE-2016-5824], [CVE-2018-18500], [CVE-2018-18501], [CVE-2018-18505] |
RHSA-2019:0270: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20190231 |
false |
patch |
[RHSA-2019:0231], [CVE-2019-3813] |
RHSA-2019:0231: spice security update (Important) |
| oval:com.redhat.rhsa:def:20190229 |
false |
patch |
[RHSA-2019:0229], [CVE-2018-16540], [CVE-2018-19475], [CVE-2018-19476], [CVE-2018-19477], [CVE-2019-6116] |
RHSA-2019:0229: ghostscript security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20190219 |
false |
patch |
[RHSA-2019:0219], [CVE-2018-18500], [CVE-2018-18501], [CVE-2018-18505] |
RHSA-2019:0219: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20190188 |
false |
patch |
[RHSA-2019:0188], [CVE-2018-18559] |
RHSA-2019:0188: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20190160 |
false |
patch |
[RHSA-2019:0160], [CVE-2018-12405], [CVE-2018-17466], [CVE-2018-18492], [CVE-2018-18493], [CVE-2018-18494], [CVE-2018-18498] |
RHSA-2019:0160: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20190109 |
false |
patch |
[RHSA-2019:0109], [CVE-2018-18311] |
RHSA-2019:0109: perl security update (Important) |
| oval:com.redhat.rhsa:def:20190059 |
false |
patch |
[RHSA-2019:0059], [CVE-2018-15127] |
RHSA-2019:0059: libvncserver security update (Important) |
| oval:com.redhat.rhsa:def:20190022 |
false |
patch |
[RHSA-2019:0022], [CVE-2018-19115] |
RHSA-2019:0022: keepalived security update (Important) |
| oval:com.redhat.rhsa:def:20183834 |
false |
patch |
[RHSA-2018:3834], [CVE-2018-15911], [CVE-2018-16541], [CVE-2018-16802], [CVE-2018-17183], [CVE-2018-17961], [CVE-2018-18073], [CVE-2018-18284], [CVE-2018-19134], [CVE-2018-19409] |
RHSA-2018:3834: ghostscript security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20183833 |
false |
patch |
[RHSA-2018:3833], [CVE-2018-12405], [CVE-2018-17466], [CVE-2018-18492], [CVE-2018-18493], [CVE-2018-18494], [CVE-2018-18498] |
RHSA-2018:3833: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20183761 |
false |
patch |
[RHSA-2018:3761], [CVE-2018-16863] |
RHSA-2018:3761: ghostscript security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20183738 |
false |
patch |
[RHSA-2018:3738], [CVE-2018-16395] |
RHSA-2018:3738: ruby security update (Important) |
| oval:com.redhat.rhsa:def:20183666 |
false |
patch |
[RHSA-2018:3666], [CVE-2018-14633], [CVE-2018-14646] |
RHSA-2018:3666: kernel-rt security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20183663 |
false |
patch |
[RHSA-2018:3663], [CVE-2018-14650] |
RHSA-2018:3663: sos-collector security update (Moderate) |
| oval:com.redhat.rhsa:def:20183650 |
false |
patch |
[RHSA-2018:3650], [CVE-2018-15908], [CVE-2018-15909], [CVE-2018-16511], [CVE-2018-16539] |
RHSA-2018:3650: ghostscript security update (Important) |
| oval:com.redhat.rhsa:def:20183532 |
false |
patch |
[RHSA-2018:3532], [CVE-2018-12389], [CVE-2018-12390], [CVE-2018-12392], [CVE-2018-12393] |
RHSA-2018:3532: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20183521 |
false |
patch |
[RHSA-2018:3521], [CVE-2018-3136], [CVE-2018-3139], [CVE-2018-3149], [CVE-2018-3150], [CVE-2018-3169], [CVE-2018-3180], [CVE-2018-3183] |
RHSA-2018:3521: java-11-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20183458 |
false |
patch |
[RHSA-2018:3458], [CVE-2017-16541], [CVE-2018-12376], [CVE-2018-12377], [CVE-2018-12378], [CVE-2018-12379], [CVE-2018-12383], [CVE-2018-12385] |
RHSA-2018:3458: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20183410 |
false |
patch |
[RHSA-2018:3410], [CVE-2018-14665] |
RHSA-2018:3410: xorg-x11-server security update (Important) |
| oval:com.redhat.rhsa:def:20183408 |
false |
patch |
[RHSA-2018:3408], [CVE-2018-17456] |
RHSA-2018:3408: git security update (Important) |
| oval:com.redhat.rhsa:def:20183350 |
false |
patch |
[RHSA-2018:3350], [CVE-2018-3136], [CVE-2018-3139], [CVE-2018-3149], [CVE-2018-3169], [CVE-2018-3180], [CVE-2018-3214] |
RHSA-2018:3350: java-1.7.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20183347 |
false |
patch |
[RHSA-2018:3347], [CVE-2018-1000805] |
RHSA-2018:3347: python-paramiko security update (Critical) |
| oval:com.redhat.rhsa:def:20183335 |
false |
patch |
[RHSA-2018:3335], [CVE-2016-4463] |
RHSA-2018:3335: xerces-c security update (Moderate) |
| oval:com.redhat.rhsa:def:20183246 |
false |
patch |
[RHSA-2018:3246], [CVE-2017-18198], [CVE-2017-18199], [CVE-2017-18201] |
RHSA-2018:3246: libcdio security update (Low) |
| oval:com.redhat.rhsa:def:20183242 |
false |
patch |
[RHSA-2018:3242], [CVE-2018-10911] |
RHSA-2018:3242: glusterfs security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20183229 |
false |
patch |
[RHSA-2018:3229], [CVE-2018-7725], [CVE-2018-7726], [CVE-2018-7727] |
RHSA-2018:3229: zziplib security update (Low) |
| oval:com.redhat.rhsa:def:20183158 |
false |
patch |
[RHSA-2018:3158], [CVE-2018-10852] |
RHSA-2018:3158: sssd security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20183127 |
false |
patch |
[RHSA-2018:3127], [CVE-2018-14648] |
RHSA-2018:3127: 389-ds-base security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20183113 |
false |
patch |
[RHSA-2018:3113], [CVE-2018-6764] |
RHSA-2018:3113: libvirt security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20183096 |
false |
patch |
[RHSA-2018:3096], [CVE-2015-8830], [CVE-2016-4913], [CVE-2017-0861], [CVE-2017-10661], [CVE-2017-17805], [CVE-2017-18208], [CVE-2017-18232], [CVE-2017-18344], [CVE-2017-18360], [CVE-2018-1000026], [CVE-2018-10322], [CVE-2018-10878], [CVE-2018-10879], [CVE-2018-10881], [CVE-2018-10883], [CVE-2018-10902], [CVE-2018-1092], [CVE-2018-1094], [CVE-2018-10940], [CVE-2018-1118], [CVE-2018-1120], [CVE-2018-1130], [CVE-2018-13405], [CVE-2018-18690], [CVE-2018-5344], [CVE-2018-5391], [CVE-2018-5803], [CVE-2018-5848], [CVE-2018-7740], [CVE-2018-7757], [CVE-2018-8781] |
RHSA-2018:3096: kernel-rt security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20183090 |
false |
patch |
[RHSA-2018:3090], [CVE-2018-0739] |
RHSA-2018:3090: ovmf security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20183073 |
false |
patch |
[RHSA-2018:3073], [CVE-2014-10071], [CVE-2014-10072], [CVE-2017-18205], [CVE-2017-18206], [CVE-2018-1071], [CVE-2018-1083], [CVE-2018-1100], [CVE-2018-7549] |
RHSA-2018:3073: zsh security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20183065 |
false |
patch |
[RHSA-2018:3065], [CVE-2018-5800], [CVE-2018-5801], [CVE-2018-5802], [CVE-2018-5805], [CVE-2018-5806] |
RHSA-2018:3065: libkdcraw security update (Moderate) |
| oval:com.redhat.rhsa:def:20183062 |
false |
patch |
[RHSA-2018:3062], [CVE-2017-15124] |
RHSA-2018:3062: qemu-kvm-ma security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20183056 |
false |
patch |
[RHSA-2018:3056], [CVE-2018-1050], [CVE-2018-10858], [CVE-2018-1139] |
RHSA-2018:3056: samba security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20183054 |
false |
patch |
[RHSA-2018:3054], [CVE-2018-10119], [CVE-2018-10120], [CVE-2018-10583] |
RHSA-2018:3054: libreoffice security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20183052 |
false |
patch |
[RHSA-2018:3052], [CVE-2018-0494] |
RHSA-2018:3052: wget security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20183005 |
false |
patch |
[RHSA-2018:3005], [CVE-2018-12389], [CVE-2018-12390], [CVE-2018-12392], [CVE-2018-12393], [CVE-2018-12395], [CVE-2018-12396], [CVE-2018-12397] |
RHSA-2018:3005: firefox security and bug fix update (Critical) |
| oval:com.redhat.rhsa:def:20182942 |
false |
patch |
[RHSA-2018:2942], [CVE-2018-3136], [CVE-2018-3139], [CVE-2018-3149], [CVE-2018-3169], [CVE-2018-3180], [CVE-2018-3183], [CVE-2018-3214] |
RHSA-2018:2942: java-1.8.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20182921 |
false |
patch |
[RHSA-2018:2921], [CVE-2018-1336] |
RHSA-2018:2921: tomcat security update (Important) |
| oval:com.redhat.rhsa:def:20182918 |
false |
patch |
[RHSA-2018:2918], [CVE-2018-10194], [CVE-2018-15910], [CVE-2018-16509], [CVE-2018-16542] |
RHSA-2018:2918: ghostscript security update (Important) |
| oval:com.redhat.rhsa:def:20182916 |
false |
patch |
[RHSA-2018:2916], [CVE-2017-15705], [CVE-2018-11781] |
RHSA-2018:2916: spamassassin security update (Important) |
| oval:com.redhat.rhsa:def:20182884 |
false |
patch |
[RHSA-2018:2884], [CVE-2018-12386], [CVE-2018-12387] |
RHSA-2018:2884: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20182835 |
false |
patch |
[RHSA-2018:2835], [CVE-2018-12383], [CVE-2018-12385] |
RHSA-2018:2835: firefox security update (Moderate) |
| oval:com.redhat.rhsa:def:20182766 |
false |
patch |
[RHSA-2018:2766], [CVE-2018-6560] |
RHSA-2018:2766: flatpak security update (Moderate) |
| oval:com.redhat.rhsa:def:20182763 |
false |
patch |
[RHSA-2018:2763], [CVE-2018-14634] |
RHSA-2018:2763: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20182762 |
false |
patch |
[RHSA-2018:2762], [CVE-2018-11806] |
RHSA-2018:2762: qemu-kvm-ma security update (Important) |
| oval:com.redhat.rhsa:def:20182757 |
false |
patch |
[RHSA-2018:2757], [CVE-2018-10850], [CVE-2018-10935], [CVE-2018-14624], [CVE-2018-14638] |
RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20182731 |
false |
patch |
[RHSA-2018:2731], [CVE-2018-10873] |
RHSA-2018:2731: spice and spice-gtk security update (Important) |
| oval:com.redhat.rhsa:def:20182692 |
false |
patch |
[RHSA-2018:2692], [CVE-2017-16541], [CVE-2018-12376], [CVE-2018-12377], [CVE-2018-12378], [CVE-2018-12379] |
RHSA-2018:2692: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20182557 |
false |
patch |
[RHSA-2018:2557], [CVE-2018-10915] |
RHSA-2018:2557: postgresql security update (Important) |
| oval:com.redhat.rhsa:def:20182526 |
false |
patch |
[RHSA-2018:2526], [CVE-2018-14354], [CVE-2018-14357], [CVE-2018-14362] |
RHSA-2018:2526: mutt security update (Important) |
| oval:com.redhat.rhsa:def:20182462 |
false |
patch |
[RHSA-2018:2462], [CVE-2018-11806], [CVE-2018-7550] |
RHSA-2018:2462: qemu-kvm security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20182395 |
false |
patch |
[RHSA-2018:2395], [CVE-2017-13215], [CVE-2018-10675], [CVE-2018-3620], [CVE-2018-3646], [CVE-2018-3693], [CVE-2018-5390], [CVE-2018-7566] |
RHSA-2018:2395: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20182286 |
false |
patch |
[RHSA-2018:2286], [CVE-2018-2952] |
RHSA-2018:2286: java-1.7.0-openjdk security update (Moderate) |
| oval:com.redhat.rhsa:def:20182285 |
false |
patch |
[RHSA-2018:2285], [CVE-2018-10897] |
RHSA-2018:2285: yum-utils security update (Important) |
| oval:com.redhat.rhsa:def:20182252 |
false |
patch |
[RHSA-2018:2252], [CVE-2018-12359], [CVE-2018-12360], [CVE-2018-12362], [CVE-2018-12363], [CVE-2018-12364], [CVE-2018-12365], [CVE-2018-12366], [CVE-2018-12372], [CVE-2018-12373], [CVE-2018-12374], [CVE-2018-5188] |
RHSA-2018:2252: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20182242 |
false |
patch |
[RHSA-2018:2242], [CVE-2018-2952] |
RHSA-2018:2242: java-1.8.0-openjdk security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20182240 |
false |
patch |
[RHSA-2018:2240], [CVE-2017-17833] |
RHSA-2018:2240: openslp security update (Important) |
| oval:com.redhat.rhsa:def:20182113 |
false |
patch |
[RHSA-2018:2113], [CVE-2017-7762], [CVE-2018-12359], [CVE-2018-12360], [CVE-2018-12362], [CVE-2018-12363], [CVE-2018-12364], [CVE-2018-12365], [CVE-2018-12366], [CVE-2018-5156], [CVE-2018-5188], [CVE-2018-6126] |
RHSA-2018:2113: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20182003 |
false |
patch |
[RHSA-2018:2003], [CVE-2017-11600], [CVE-2018-3639] |
RHSA-2018:2003: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20182001 |
false |
patch |
[RHSA-2018:2001], [CVE-2018-3639] |
RHSA-2018:2001: qemu-kvm security update (Important) |
| oval:com.redhat.rhsa:def:20181997 |
false |
patch |
[RHSA-2018:1997], [CVE-2018-3639] |
RHSA-2018:1997: libvirt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20181979 |
false |
patch |
[RHSA-2018:1979], [CVE-2018-1080] |
RHSA-2018:1979: pki-core security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20181957 |
false |
patch |
[RHSA-2018:1957], [CVE-2018-11235] |
RHSA-2018:1957: git security update (Important) |
| oval:com.redhat.rhsa:def:20181944 |
false |
patch |
[RHSA-2018:1944], [CVE-2018-3665] |
RHSA-2018:1944: kernel-rt security update (Moderate) |
| oval:com.redhat.rhsa:def:20181836 |
false |
patch |
[RHSA-2018:1836], [CVE-2018-1002200] |
RHSA-2018:1836: plexus-archiver security update (Important) |
| oval:com.redhat.rhsa:def:20181780 |
false |
patch |
[RHSA-2018:1780], [CVE-2016-5003] |
RHSA-2018:1780: xmlrpc security update (Important) |
| oval:com.redhat.rhsa:def:20181725 |
false |
patch |
[RHSA-2018:1725], [CVE-2018-5150], [CVE-2018-5154], [CVE-2018-5155], [CVE-2018-5159], [CVE-2018-5161], [CVE-2018-5162], [CVE-2018-5168], [CVE-2018-5170], [CVE-2018-5178], [CVE-2018-5183], [CVE-2018-5184], [CVE-2018-5185] |
RHSA-2018:1725: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20181649 |
false |
patch |
[RHSA-2018:1649], [CVE-2018-3639] |
RHSA-2018:1649: java-1.8.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20181648 |
false |
patch |
[RHSA-2018:1648], [CVE-2018-3639] |
RHSA-2018:1648: java-1.7.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20181633 |
false |
patch |
[RHSA-2018:1633], [CVE-2018-3639] |
RHSA-2018:1633: qemu-kvm security update (Important) |
| oval:com.redhat.rhsa:def:20181632 |
false |
patch |
[RHSA-2018:1632], [CVE-2018-3639] |
RHSA-2018:1632: libvirt security update (Important) |
| oval:com.redhat.rhsa:def:20181630 |
false |
patch |
[RHSA-2018:1630], [CVE-2018-3639] |
RHSA-2018:1630: kernel-rt security update (Important) |
| oval:com.redhat.rhsa:def:20181416 |
false |
patch |
[RHSA-2018:1416], [CVE-2018-7858] |
RHSA-2018:1416: qemu-kvm security update (Moderate) |
| oval:com.redhat.rhsa:def:20181415 |
false |
patch |
[RHSA-2018:1415], [CVE-2018-5150], [CVE-2018-5154], [CVE-2018-5155], [CVE-2018-5157], [CVE-2018-5158], [CVE-2018-5159], [CVE-2018-5168], [CVE-2018-5178], [CVE-2018-5183] |
RHSA-2018:1415: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20181396 |
false |
patch |
[RHSA-2018:1396], [CVE-2018-1064], [CVE-2018-5748] |
RHSA-2018:1396: libvirt security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20181380 |
false |
patch |
[RHSA-2018:1380], [CVE-2018-1089] |
RHSA-2018:1380: 389-ds-base security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20181355 |
false |
patch |
[RHSA-2018:1355], [CVE-2017-16939], [CVE-2018-1000199], [CVE-2018-1068], [CVE-2018-1087], [CVE-2018-8897] |
RHSA-2018:1355: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20181278 |
false |
patch |
[RHSA-2018:1278], [CVE-2018-2790], [CVE-2018-2794], [CVE-2018-2795], [CVE-2018-2796], [CVE-2018-2797], [CVE-2018-2798], [CVE-2018-2799], [CVE-2018-2800], [CVE-2018-2814], [CVE-2018-2815] |
RHSA-2018:1278: java-1.7.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20181224 |
false |
patch |
[RHSA-2018:1224], [CVE-2018-1106] |
RHSA-2018:1224: PackageKit security update (Moderate) |
| oval:com.redhat.rhsa:def:20181223 |
false |
patch |
[RHSA-2018:1223], [CVE-2018-1000140] |
RHSA-2018:1223: librelp security update (Critical) |
| oval:com.redhat.rhsa:def:20181200 |
false |
patch |
[RHSA-2018:1200], [CVE-2018-1000156] |
RHSA-2018:1200: patch security update (Important) |
| oval:com.redhat.rhsa:def:20181191 |
false |
patch |
[RHSA-2018:1191], [CVE-2018-2790], [CVE-2018-2794], [CVE-2018-2795], [CVE-2018-2796], [CVE-2018-2797], [CVE-2018-2798], [CVE-2018-2799], [CVE-2018-2800], [CVE-2018-2814], [CVE-2018-2815] |
RHSA-2018:1191: java-1.8.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20181169 |
false |
patch |
[RHSA-2018:1169], [CVE-2018-1084] |
RHSA-2018:1169: corosync security update (Important) |
| oval:com.redhat.rhsa:def:20181099 |
false |
patch |
[RHSA-2018:1099], [CVE-2018-5148] |
RHSA-2018:1099: firefox security update (Important) |
| oval:com.redhat.rhsa:def:20181060 |
false |
patch |
[RHSA-2018:1060], [CVE-2018-1000119], [CVE-2018-1079], [CVE-2018-1086] |
RHSA-2018:1060: pcs security update (Important) |
| oval:com.redhat.rhsa:def:20181058 |
false |
patch |
[RHSA-2018:1058], [CVE-2018-5146] |
RHSA-2018:1058: libvorbis security update (Important) |
| oval:com.redhat.rhsa:def:20181055 |
false |
patch |
[RHSA-2018:1055], [CVE-2018-7225] |
RHSA-2018:1055: libvncserver security update (Moderate) |
| oval:com.redhat.rhsa:def:20180878 |
false |
patch |
[RHSA-2018:0878], [CVE-2017-15041], [CVE-2017-15042], [CVE-2018-6574] |
RHSA-2018:0878: golang security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20180855 |
false |
patch |
[RHSA-2018:0855], [CVE-2017-6462], [CVE-2017-6463], [CVE-2017-6464] |
RHSA-2018:0855: ntp security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20180842 |
false |
patch |
[RHSA-2018:0842], [CVE-2017-15131] |
RHSA-2018:0842: xdg-user-dirs security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20180816 |
false |
patch |
[RHSA-2018:0816], [CVE-2017-13672], [CVE-2017-13711], [CVE-2017-15124], [CVE-2017-15268], [CVE-2018-5683] |
RHSA-2018:0816: qemu-kvm security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20180676 |
false |
patch |
[RHSA-2018:0676], [CVE-2016-3672], [CVE-2016-7913], [CVE-2016-8633], [CVE-2017-1000252], [CVE-2017-1000407], [CVE-2017-1000410], [CVE-2017-12154], [CVE-2017-12190], [CVE-2017-13166], [CVE-2017-13305], [CVE-2017-14140], [CVE-2017-15116], [CVE-2017-15121], [CVE-2017-15126], [CVE-2017-15127], [CVE-2017-15129], [CVE-2017-15265], [CVE-2017-15274], [CVE-2017-17448], [CVE-2017-17449], [CVE-2017-17558], [CVE-2017-18017], [CVE-2017-18203], [CVE-2017-7294], [CVE-2017-8824], [CVE-2017-9725], [CVE-2018-1000004], [CVE-2018-5750], [CVE-2018-6927] |
RHSA-2018:0676: kernel-rt security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20180648 |
false |
patch |
[RHSA-2018:0648], [CVE-2018-5125], [CVE-2018-5127], [CVE-2018-5129], [CVE-2018-5144], [CVE-2018-5145], [CVE-2018-5146] |
RHSA-2018:0648: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20180592 |
false |
patch |
[RHSA-2018:0592], [CVE-2018-8088] |
RHSA-2018:0592: slf4j security update (Important) |
| oval:com.redhat.rhsa:def:20180549 |
false |
patch |
[RHSA-2018:0549], [CVE-2018-5146] |
RHSA-2018:0549: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20180527 |
false |
patch |
[RHSA-2018:0527], [CVE-2018-5125], [CVE-2018-5127], [CVE-2018-5129], [CVE-2018-5130], [CVE-2018-5131], [CVE-2018-5144], [CVE-2018-5145] |
RHSA-2018:0527: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20180505 |
false |
patch |
[RHSA-2018:0505], [CVE-2018-5950] |
RHSA-2018:0505: mailman security update (Moderate) |
| oval:com.redhat.rhsa:def:20180418 |
false |
patch |
[RHSA-2018:0418], [CVE-2018-6871] |
RHSA-2018:0418: libreoffice security update (Moderate) |
| oval:com.redhat.rhsa:def:20180414 |
false |
patch |
[RHSA-2018:0414], [CVE-2017-15135], [CVE-2018-1054] |
RHSA-2018:0414: 389-ds-base security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20180412 |
false |
patch |
[RHSA-2018:0412], [CVE-2017-12188], [CVE-2017-18270], [CVE-2017-7518] |
RHSA-2018:0412: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20180406 |
false |
patch |
[RHSA-2018:0406], [CVE-2017-7890] |
RHSA-2018:0406: php security update (Moderate) |
| oval:com.redhat.rhsa:def:20180378 |
false |
patch |
[RHSA-2018:0378], [CVE-2017-0898], [CVE-2017-0899], [CVE-2017-0900], [CVE-2017-0901], [CVE-2017-0902], [CVE-2017-0903], [CVE-2017-10784], [CVE-2017-14033], [CVE-2017-14064], [CVE-2017-17405], [CVE-2017-17790] |
RHSA-2018:0378: ruby security update (Important) |
| oval:com.redhat.rhsa:def:20180377 |
false |
patch |
[RHSA-2018:0377], [CVE-2018-5379] |
RHSA-2018:0377: quagga security update (Important) |
| oval:com.redhat.rhsa:def:20180350 |
false |
patch |
[RHSA-2018:0350], [CVE-2018-5345] |
RHSA-2018:0350: gcab security update (Important) |
| oval:com.redhat.rhsa:def:20180349 |
false |
patch |
[RHSA-2018:0349], [CVE-2018-2579], [CVE-2018-2588], [CVE-2018-2599], [CVE-2018-2602], [CVE-2018-2603], [CVE-2018-2618], [CVE-2018-2629], [CVE-2018-2633], [CVE-2018-2634], [CVE-2018-2637], [CVE-2018-2641], [CVE-2018-2663], [CVE-2018-2677], [CVE-2018-2678] |
RHSA-2018:0349: java-1.7.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20180262 |
false |
patch |
[RHSA-2018:0262], [CVE-2018-5089], [CVE-2018-5095], [CVE-2018-5096], [CVE-2018-5097], [CVE-2018-5098], [CVE-2018-5099], [CVE-2018-5102], [CVE-2018-5103], [CVE-2018-5104], [CVE-2018-5117] |
RHSA-2018:0262: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20180223 |
false |
patch |
[RHSA-2018:0223], [CVE-2017-14604] |
RHSA-2018:0223: nautilus security update (Moderate) |
| oval:com.redhat.rhsa:def:20180163 |
false |
patch |
[RHSA-2018:0163], [CVE-2017-15134] |
RHSA-2018:0163: 389-ds-base security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20180152 |
false |
patch |
[RHSA-2018:0152], [CVE-2015-8539], [CVE-2017-12192], [CVE-2017-12193], [CVE-2017-15649], [CVE-2017-7472] |
RHSA-2018:0152: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20180122 |
false |
patch |
[RHSA-2018:0122], [CVE-2018-5089], [CVE-2018-5091], [CVE-2018-5095], [CVE-2018-5096], [CVE-2018-5097], [CVE-2018-5098], [CVE-2018-5099], [CVE-2018-5102], [CVE-2018-5103], [CVE-2018-5104], [CVE-2018-5117] |
RHSA-2018:0122: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20180095 |
false |
patch |
[RHSA-2018:0095], [CVE-2018-2579], [CVE-2018-2582], [CVE-2018-2588], [CVE-2018-2599], [CVE-2018-2602], [CVE-2018-2603], [CVE-2018-2618], [CVE-2018-2629], [CVE-2018-2633], [CVE-2018-2634], [CVE-2018-2637], [CVE-2018-2641], [CVE-2018-2663], [CVE-2018-2677], [CVE-2018-2678] |
RHSA-2018:0095: java-1.8.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20180061 |
false |
patch |
[RHSA-2018:0061], [CVE-2017-7829], [CVE-2017-7846], [CVE-2017-7847], [CVE-2017-7848] |
RHSA-2018:0061: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20180029 |
false |
patch |
[RHSA-2018:0029] |
RHSA-2018:0029: libvirt security update (Important) |
| oval:com.redhat.rhsa:def:20180023 |
false |
patch |
[RHSA-2018:0023] |
RHSA-2018:0023: qemu-kvm security update (Important) |
| oval:com.redhat.rhsa:def:20180016 |
false |
patch |
[RHSA-2018:0016] |
RHSA-2018:0016: kernel-rt security update (Important) |
| oval:com.redhat.rhsa:def:20173402 |
false |
patch |
[RHSA-2017:3402], [CVE-2017-12172], [CVE-2017-15097] |
RHSA-2017:3402: postgresql security update (Moderate) |
| oval:com.redhat.rhsa:def:20173392 |
false |
patch |
[RHSA-2017:3392], [CVE-2017-10193], [CVE-2017-10198], [CVE-2017-10274], [CVE-2017-10281], [CVE-2017-10285], [CVE-2017-10295], [CVE-2017-10345], [CVE-2017-10346], [CVE-2017-10347], [CVE-2017-10348], [CVE-2017-10349], [CVE-2017-10350], [CVE-2017-10355], [CVE-2017-10356], [CVE-2017-10357], [CVE-2017-10388] |
RHSA-2017:3392: java-1.7.0-openjdk security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20173384 |
false |
patch |
[RHSA-2017:3384], [CVE-2017-15101] |
RHSA-2017:3384: liblouis security update (Moderate) |
| oval:com.redhat.rhsa:def:20173382 |
false |
patch |
[RHSA-2017:3382], [CVE-2017-7843] |
RHSA-2017:3382: firefox security update (Important) |
| oval:com.redhat.rhsa:def:20173379 |
false |
patch |
[RHSA-2017:3379], [CVE-2017-12173] |
RHSA-2017:3379: sssd security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20173372 |
false |
patch |
[RHSA-2017:3372], [CVE-2017-7826], [CVE-2017-7828], [CVE-2017-7830] |
RHSA-2017:3372: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20173368 |
false |
patch |
[RHSA-2017:3368], [CVE-2017-14167], [CVE-2017-15289] |
RHSA-2017:3368: qemu-kvm security update (Moderate) |
| oval:com.redhat.rhsa:def:20173322 |
false |
patch |
[RHSA-2017:3322], [CVE-2017-1000380] |
RHSA-2017:3322: kernel-rt security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20173270 |
false |
patch |
[RHSA-2017:3270], [CVE-2017-12613] |
RHSA-2017:3270: apr security update (Important) |
| oval:com.redhat.rhsa:def:20173269 |
false |
patch |
[RHSA-2017:3269], [CVE-2017-16844] |
RHSA-2017:3269: procmail security update (Important) |
| oval:com.redhat.rhsa:def:20173260 |
false |
patch |
[RHSA-2017:3260], [CVE-2017-14746], [CVE-2017-15275] |
RHSA-2017:3260: samba security update (Important) |
| oval:com.redhat.rhsa:def:20173247 |
false |
patch |
[RHSA-2017:3247], [CVE-2017-7826], [CVE-2017-7828], [CVE-2017-7830] |
RHSA-2017:3247: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20173221 |
false |
patch |
[RHSA-2017:3221], [CVE-2016-10167], [CVE-2016-10168] |
RHSA-2017:3221: php security update (Moderate) |
| oval:com.redhat.rhsa:def:20173111 |
false |
patch |
[RHSA-2017:3111], [CVE-2014-8184], [CVE-2017-13738], [CVE-2017-13740], [CVE-2017-13741], [CVE-2017-13742], [CVE-2017-13743], [CVE-2017-13744] |
RHSA-2017:3111: liblouis security update (Moderate) |
| oval:com.redhat.rhsa:def:20173081 |
false |
patch |
[RHSA-2017:3081], [CVE-2017-12615], [CVE-2017-12617], [CVE-2017-5647], [CVE-2017-7674] |
RHSA-2017:3081: tomcat security update (Important) |
| oval:com.redhat.rhsa:def:20173075 |
false |
patch |
[RHSA-2017:3075], [CVE-2017-13089], [CVE-2017-13090] |
RHSA-2017:3075: wget security update (Important) |
| oval:com.redhat.rhsa:def:20172998 |
false |
patch |
[RHSA-2017:2998], [CVE-2017-10274], [CVE-2017-10281], [CVE-2017-10285], [CVE-2017-10295], [CVE-2017-10345], [CVE-2017-10346], [CVE-2017-10347], [CVE-2017-10348], [CVE-2017-10349], [CVE-2017-10350], [CVE-2017-10355], [CVE-2017-10356], [CVE-2017-10357], [CVE-2017-10388] |
RHSA-2017:2998: java-1.8.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20172931 |
false |
patch |
[RHSA-2017:2931], [CVE-2016-8399], [CVE-2017-1000111], [CVE-2017-1000112], [CVE-2017-11176], [CVE-2017-14106], [CVE-2017-7184], [CVE-2017-7541], [CVE-2017-7542], [CVE-2017-7558] |
RHSA-2017:2931: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20172885 |
false |
patch |
[RHSA-2017:2885], [CVE-2017-7793], [CVE-2017-7810], [CVE-2017-7814], [CVE-2017-7818], [CVE-2017-7819], [CVE-2017-7823], [CVE-2017-7824] |
RHSA-2017:2885: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20172882 |
false |
patch |
[RHSA-2017:2882], [CVE-2017-9798] |
RHSA-2017:2882: httpd security update (Moderate) |
| oval:com.redhat.rhsa:def:20172831 |
false |
patch |
[RHSA-2017:2831], [CVE-2017-7793], [CVE-2017-7810], [CVE-2017-7814], [CVE-2017-7818], [CVE-2017-7819], [CVE-2017-7823], [CVE-2017-7824] |
RHSA-2017:2831: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20172790 |
false |
patch |
[RHSA-2017:2790], [CVE-2017-12150], [CVE-2017-12151], [CVE-2017-12163] |
RHSA-2017:2790: samba security update (Moderate) |
| oval:com.redhat.rhsa:def:20172788 |
false |
patch |
[RHSA-2017:2788], [CVE-2017-7555] |
RHSA-2017:2788: augeas security update (Important) |
| oval:com.redhat.rhsa:def:20172728 |
false |
patch |
[RHSA-2017:2728], [CVE-2017-7546], [CVE-2017-7547] |
RHSA-2017:2728: postgresql security update (Moderate) |
| oval:com.redhat.rhsa:def:20172704 |
false |
patch |
[RHSA-2017:2704], [CVE-2017-1000251] |
RHSA-2017:2704: kernel-rt security update (Important) |
| oval:com.redhat.rhsa:def:20172685 |
false |
patch |
[RHSA-2017:2685], [CVE-2017-1000250] |
RHSA-2017:2685: bluez security update (Moderate) |
| oval:com.redhat.rhsa:def:20172585 |
false |
patch |
[RHSA-2017:2585], [CVE-2017-7533] |
RHSA-2017:2585: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20172569 |
false |
patch |
[RHSA-2017:2569], [CVE-2017-7551] |
RHSA-2017:2569: 389-ds-base security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20172551 |
false |
patch |
[RHSA-2017:2551], [CVE-2017-9775], [CVE-2017-9776] |
RHSA-2017:2551: poppler security update (Moderate) |
| oval:com.redhat.rhsa:def:20172534 |
false |
patch |
[RHSA-2017:2534], [CVE-2017-7753], [CVE-2017-7779], [CVE-2017-7784], [CVE-2017-7785], [CVE-2017-7786], [CVE-2017-7787], [CVE-2017-7791], [CVE-2017-7792], [CVE-2017-7800], [CVE-2017-7801], [CVE-2017-7802], [CVE-2017-7803], [CVE-2017-7807], [CVE-2017-7809] |
RHSA-2017:2534: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20172492 |
false |
patch |
[RHSA-2017:2492], [CVE-2017-1000061] |
RHSA-2017:2492: xmlsec1 security update (Moderate) |
| oval:com.redhat.rhsa:def:20172489 |
false |
patch |
[RHSA-2017:2489], [CVE-2017-1000115], [CVE-2017-1000116] |
RHSA-2017:2489: mercurial security update (Important) |
| oval:com.redhat.rhsa:def:20172486 |
false |
patch |
[RHSA-2017:2486], [CVE-2015-3253], [CVE-2016-6814] |
RHSA-2017:2486: groovy security update (Important) |
| oval:com.redhat.rhsa:def:20172484 |
false |
patch |
[RHSA-2017:2484], [CVE-2017-1000117] |
RHSA-2017:2484: git security update (Important) |
| oval:com.redhat.rhsa:def:20172480 |
false |
patch |
[RHSA-2017:2480], [CVE-2017-9800] |
RHSA-2017:2480: subversion security update (Important) |
| oval:com.redhat.rhsa:def:20172479 |
false |
patch |
[RHSA-2017:2479], [CVE-2017-3167], [CVE-2017-3169], [CVE-2017-7668], [CVE-2017-7679], [CVE-2017-9788] |
RHSA-2017:2479: httpd security update (Important) |
| oval:com.redhat.rhsa:def:20172471 |
false |
patch |
[RHSA-2017:2471], [CVE-2017-7506] |
RHSA-2017:2471: spice security update (Important) |
| oval:com.redhat.rhsa:def:20172456 |
false |
patch |
[RHSA-2017:2456], [CVE-2017-7753], [CVE-2017-7779], [CVE-2017-7784], [CVE-2017-7785], [CVE-2017-7786], [CVE-2017-7787], [CVE-2017-7791], [CVE-2017-7792], [CVE-2017-7798], [CVE-2017-7800], [CVE-2017-7801], [CVE-2017-7802], [CVE-2017-7803], [CVE-2017-7807], [CVE-2017-7809] |
RHSA-2017:2456: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20172445 |
false |
patch |
[RHSA-2017:2445], [CVE-2017-10664] |
RHSA-2017:2445: qemu-kvm security update (Moderate) |
| oval:com.redhat.rhsa:def:20172424 |
false |
patch |
[RHSA-2017:2424], [CVE-2017-10053], [CVE-2017-10067], [CVE-2017-10074], [CVE-2017-10081], [CVE-2017-10087], [CVE-2017-10089], [CVE-2017-10090], [CVE-2017-10096], [CVE-2017-10101], [CVE-2017-10102], [CVE-2017-10107], [CVE-2017-10108], [CVE-2017-10109], [CVE-2017-10110], [CVE-2017-10115], [CVE-2017-10116], [CVE-2017-10135], [CVE-2017-10243] |
RHSA-2017:2424: java-1.7.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20172423 |
false |
patch |
[RHSA-2017:2423], [CVE-2017-5645] |
RHSA-2017:2423: log4j security update (Important) |
| oval:com.redhat.rhsa:def:20172389 |
false |
patch |
[RHSA-2017:2389], [CVE-2017-10978], [CVE-2017-10983], [CVE-2017-10984], [CVE-2017-10985], [CVE-2017-10986], [CVE-2017-10987] |
RHSA-2017:2389: freeradius security update (Important) |
| oval:com.redhat.rhsa:def:20172388 |
false |
patch |
[RHSA-2017:2388], [CVE-2017-1000083] |
RHSA-2017:2388: evince security update (Important) |
| oval:com.redhat.rhsa:def:20172335 |
false |
patch |
[RHSA-2017:2335], [CVE-2017-7537] |
RHSA-2017:2335: pki-core security update (Moderate) |
| oval:com.redhat.rhsa:def:20172258 |
false |
patch |
[RHSA-2017:2258], [CVE-2017-5884], [CVE-2017-5885] |
RHSA-2017:2258: gtk-vnc security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20172247 |
false |
patch |
[RHSA-2017:2247], [CVE-2016-0762], [CVE-2016-5018], [CVE-2016-6794], [CVE-2016-6796], [CVE-2016-6797] |
RHSA-2017:2247: tomcat security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20172180 |
false |
patch |
[RHSA-2017:2180], [CVE-2017-7207] |
RHSA-2017:2180: ghostscript security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20172128 |
false |
patch |
[RHSA-2017:2128], [CVE-2015-7496] |
RHSA-2017:2128: gdm and gnome-session security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20172077 |
false |
patch |
[RHSA-2017:2077], [CVE-2014-7970], [CVE-2014-7975], [CVE-2015-8839], [CVE-2015-8970], [CVE-2016-10088], [CVE-2016-10147], [CVE-2016-10200], [CVE-2016-10741], [CVE-2016-6213], [CVE-2016-7042], [CVE-2016-7097], [CVE-2016-8645], [CVE-2016-9576], [CVE-2016-9588], [CVE-2016-9604], [CVE-2016-9685], [CVE-2016-9806], [CVE-2017-2584], [CVE-2017-2596], [CVE-2017-2647], [CVE-2017-2671], [CVE-2017-5551], [CVE-2017-5970], [CVE-2017-6001], [CVE-2017-6951], [CVE-2017-7187], [CVE-2017-7495], [CVE-2017-7616], [CVE-2017-7889], [CVE-2017-8797], [CVE-2017-8890], [CVE-2017-9074], [CVE-2017-9075], [CVE-2017-9076], [CVE-2017-9077], [CVE-2017-9242] |
RHSA-2017:2077: kernel-rt security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20172060 |
false |
patch |
[RHSA-2017:2060], [CVE-2016-10198], [CVE-2016-10199], [CVE-2016-9446], [CVE-2016-9810], [CVE-2016-9811], [CVE-2017-5837], [CVE-2017-5838], [CVE-2017-5839], [CVE-2017-5840], [CVE-2017-5841], [CVE-2017-5842], [CVE-2017-5843], [CVE-2017-5844], [CVE-2017-5845], [CVE-2017-5848] |
RHSA-2017:2060: GStreamer security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20172004 |
false |
patch |
[RHSA-2017:2004], [CVE-2014-9938], [CVE-2017-8386] |
RHSA-2017:2004: git security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20172000 |
false |
patch |
[RHSA-2017:2000], [CVE-2016-10207], [CVE-2017-5581], [CVE-2017-7392], [CVE-2017-7393], [CVE-2017-7394], [CVE-2017-7395], [CVE-2017-7396] |
RHSA-2017:2000: tigervnc and fltk security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20171983 |
false |
patch |
[RHSA-2017:1983], [CVE-2017-7484], [CVE-2017-7486] |
RHSA-2017:1983: postgresql security and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20171975 |
false |
patch |
[RHSA-2017:1975], [CVE-2017-7870] |
RHSA-2017:1975: libreoffice security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20171950 |
false |
patch |
[RHSA-2017:1950], [CVE-2017-9461] |
RHSA-2017:1950: samba security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20171871 |
false |
patch |
[RHSA-2017:1871], [CVE-2015-0261], [CVE-2015-2153], [CVE-2015-2154], [CVE-2015-2155], [CVE-2016-7922], [CVE-2016-7923], [CVE-2016-7924], [CVE-2016-7925], [CVE-2016-7926], [CVE-2016-7927], [CVE-2016-7928], [CVE-2016-7929], [CVE-2016-7930], [CVE-2016-7931], [CVE-2016-7932], [CVE-2016-7933], [CVE-2016-7934], [CVE-2016-7935], [CVE-2016-7936], [CVE-2016-7937], [CVE-2016-7938], [CVE-2016-7939], [CVE-2016-7940], [CVE-2016-7973], [CVE-2016-7974], [CVE-2016-7975], [CVE-2016-7983], [CVE-2016-7984], [CVE-2016-7985], [CVE-2016-7986], [CVE-2016-7992], [CVE-2016-7993], [CVE-2016-8574], [CVE-2016-8575], [CVE-2017-5202], [CVE-2017-5203], [CVE-2017-5204], [CVE-2017-5205], [CVE-2017-5341], [CVE-2017-5342], [CVE-2017-5482], [CVE-2017-5483], [CVE-2017-5484], [CVE-2017-5485], [CVE-2017-5486] |
RHSA-2017:1871: tcpdump security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20171859 |
false |
patch |
[RHSA-2017:1859], [CVE-2017-1000098], [CVE-2017-8932] |
RHSA-2017:1859: golang security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20171856 |
false |
patch |
[RHSA-2017:1856], [CVE-2016-4020], [CVE-2017-2633], [CVE-2017-5898] |
RHSA-2017:1856: qemu-kvm security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20171854 |
false |
patch |
[RHSA-2017:1854], [CVE-2014-3694], [CVE-2014-3695], [CVE-2014-3696], [CVE-2014-3698], [CVE-2017-2640] |
RHSA-2017:1854: pidgin security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20171809 |
false |
patch |
[RHSA-2017:1809], [CVE-2017-5648], [CVE-2017-5664] |
RHSA-2017:1809: tomcat security update (Important) |
| oval:com.redhat.rhsa:def:20171789 |
false |
patch |
[RHSA-2017:1789], [CVE-2017-10053], [CVE-2017-10067], [CVE-2017-10074], [CVE-2017-10078], [CVE-2017-10081], [CVE-2017-10087], [CVE-2017-10089], [CVE-2017-10090], [CVE-2017-10096], [CVE-2017-10101], [CVE-2017-10102], [CVE-2017-10107], [CVE-2017-10108], [CVE-2017-10109], [CVE-2017-10110], [CVE-2017-10111], [CVE-2017-10115], [CVE-2017-10116], [CVE-2017-10135], [CVE-2017-10193], [CVE-2017-10198], [CVE-2017-10243] |
RHSA-2017:1789: java-1.8.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20171681 |
false |
patch |
[RHSA-2017:1681], [CVE-2017-9524] |
RHSA-2017:1681: qemu-kvm security update (Important) |
| oval:com.redhat.rhsa:def:20171616 |
false |
patch |
[RHSA-2017:1616], [CVE-2017-1000364], [CVE-2017-1000379], [CVE-2017-2583], [CVE-2017-6214], [CVE-2017-7477], [CVE-2017-7645], [CVE-2017-7895] |
RHSA-2017:1616: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20171581 |
false |
patch |
[RHSA-2017:1581], [CVE-2017-9148] |
RHSA-2017:1581: freeradius security update (Important) |
| oval:com.redhat.rhsa:def:20171576 |
false |
patch |
[RHSA-2017:1576], [CVE-2017-9462] |
RHSA-2017:1576: mercurial security update (Important) |
| oval:com.redhat.rhsa:def:20171561 |
false |
patch |
[RHSA-2017:1561], [CVE-2017-5470], [CVE-2017-5472], [CVE-2017-7749], [CVE-2017-7750], [CVE-2017-7751], [CVE-2017-7752], [CVE-2017-7754], [CVE-2017-7756], [CVE-2017-7757], [CVE-2017-7758], [CVE-2017-7764], [CVE-2017-7771], [CVE-2017-7772], [CVE-2017-7773], [CVE-2017-7774], [CVE-2017-7775], [CVE-2017-7776], [CVE-2017-7777], [CVE-2017-7778] |
RHSA-2017:1561: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20171440 |
false |
patch |
[RHSA-2017:1440], [CVE-2017-5470], [CVE-2017-5472], [CVE-2017-7749], [CVE-2017-7750], [CVE-2017-7751], [CVE-2017-7752], [CVE-2017-7754], [CVE-2017-7756], [CVE-2017-7757], [CVE-2017-7758], [CVE-2017-7764], [CVE-2017-7771], [CVE-2017-7772], [CVE-2017-7773], [CVE-2017-7774], [CVE-2017-7775], [CVE-2017-7776], [CVE-2017-7777], [CVE-2017-7778] |
RHSA-2017:1440: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20171430 |
false |
patch |
[RHSA-2017:1430], [CVE-2017-7718], [CVE-2017-7980] |
RHSA-2017:1430: qemu-kvm security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20171298 |
false |
patch |
[RHSA-2017:1298], [CVE-2016-10208], [CVE-2016-7910], [CVE-2016-8646], [CVE-2017-7308] |
RHSA-2017:1298: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20171270 |
false |
patch |
[RHSA-2017:1270], [CVE-2017-7494] |
RHSA-2017:1270: samba security update (Important) |
| oval:com.redhat.rhsa:def:20171265 |
false |
patch |
[RHSA-2017:1265], [CVE-2016-2125], [CVE-2016-2126], [CVE-2017-2619] |
RHSA-2017:1265: samba security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20171264 |
false |
patch |
[RHSA-2017:1264], [CVE-2017-8422] |
RHSA-2017:1264: kdelibs security update (Important) |
| oval:com.redhat.rhsa:def:20171263 |
false |
patch |
[RHSA-2017:1263], [CVE-2017-8779] |
RHSA-2017:1263: libtirpc security update (Important) |
| oval:com.redhat.rhsa:def:20171262 |
false |
patch |
[RHSA-2017:1262], [CVE-2017-8779] |
RHSA-2017:1262: rpcbind security update (Important) |
| oval:com.redhat.rhsa:def:20171230 |
false |
patch |
[RHSA-2017:1230], [CVE-2017-8291] |
RHSA-2017:1230: ghostscript security update (Important) |
| oval:com.redhat.rhsa:def:20171204 |
false |
patch |
[RHSA-2017:1204], [CVE-2017-3509], [CVE-2017-3511], [CVE-2017-3526], [CVE-2017-3533], [CVE-2017-3539], [CVE-2017-3544] |
RHSA-2017:1204: java-1.7.0-openjdk security update (Moderate) |
| oval:com.redhat.rhsa:def:20171201 |
false |
patch |
[RHSA-2017:1201], [CVE-2016-10195], [CVE-2016-10196], [CVE-2016-10197], [CVE-2017-5429], [CVE-2017-5432], [CVE-2017-5433], [CVE-2017-5434], [CVE-2017-5435], [CVE-2017-5436], [CVE-2017-5438], [CVE-2017-5439], [CVE-2017-5440], [CVE-2017-5441], [CVE-2017-5442], [CVE-2017-5443], [CVE-2017-5444], [CVE-2017-5445], [CVE-2017-5446], [CVE-2017-5447], [CVE-2017-5449], [CVE-2017-5451], [CVE-2017-5454], [CVE-2017-5459], [CVE-2017-5460], [CVE-2017-5464], [CVE-2017-5465], [CVE-2017-5466], [CVE-2017-5467], [CVE-2017-5469] |
RHSA-2017:1201: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20171108 |
false |
patch |
[RHSA-2017:1108], [CVE-2017-3509], [CVE-2017-3511], [CVE-2017-3526], [CVE-2017-3533], [CVE-2017-3539], [CVE-2017-3544] |
RHSA-2017:1108: java-1.8.0-openjdk security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20171106 |
false |
patch |
[RHSA-2017:1106], [CVE-2016-10195], [CVE-2016-10196], [CVE-2016-10197], [CVE-2017-5429], [CVE-2017-5430], [CVE-2017-5432], [CVE-2017-5433], [CVE-2017-5434], [CVE-2017-5435], [CVE-2017-5436], [CVE-2017-5438], [CVE-2017-5439], [CVE-2017-5440], [CVE-2017-5441], [CVE-2017-5442], [CVE-2017-5443], [CVE-2017-5444], [CVE-2017-5445], [CVE-2017-5446], [CVE-2017-5447], [CVE-2017-5448], [CVE-2017-5449], [CVE-2017-5451], [CVE-2017-5454], [CVE-2017-5455], [CVE-2017-5456], [CVE-2017-5459], [CVE-2017-5460], [CVE-2017-5464], [CVE-2017-5465], [CVE-2017-5466], [CVE-2017-5467], [CVE-2017-5469] |
RHSA-2017:1106: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20170987 |
false |
patch |
[RHSA-2017:0987], [CVE-2016-9603] |
RHSA-2017:0987: qemu-kvm security update (Important) |
| oval:com.redhat.rhsa:def:20170935 |
false |
patch |
[RHSA-2017:0935], [CVE-2016-6816], [CVE-2016-8745] |
RHSA-2017:0935: tomcat security update (Moderate) |
| oval:com.redhat.rhsa:def:20170931 |
false |
patch |
[RHSA-2017:0931], [CVE-2016-8650], [CVE-2016-9793], [CVE-2017-2618], [CVE-2017-2636] |
RHSA-2017:0931: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20170920 |
false |
patch |
[RHSA-2017:0920], [CVE-2017-2668] |
RHSA-2017:0920: 389-ds-base security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20170914 |
false |
patch |
[RHSA-2017:0914], [CVE-2017-3157] |
RHSA-2017:0914: libreoffice security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20170906 |
false |
patch |
[RHSA-2017:0906], [CVE-2016-0736], [CVE-2016-2161], [CVE-2016-8743] |
RHSA-2017:0906: httpd security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20170838 |
false |
patch |
[RHSA-2017:0838], [CVE-2016-5139], [CVE-2016-5158], [CVE-2016-5159], [CVE-2016-7163], [CVE-2016-9573], [CVE-2016-9675] |
RHSA-2017:0838: openjpeg security update (Moderate) |
| oval:com.redhat.rhsa:def:20170837 |
false |
patch |
[RHSA-2017:0837], [CVE-2017-5208], [CVE-2017-5332], [CVE-2017-5333], [CVE-2017-6009], [CVE-2017-6010], [CVE-2017-6011] |
RHSA-2017:0837: icoutils security update (Important) |
| oval:com.redhat.rhsa:def:20170558 |
false |
patch |
[RHSA-2017:0558], [CVE-2017-5428] |
RHSA-2017:0558: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20170498 |
false |
patch |
[RHSA-2017:0498], [CVE-2017-5398], [CVE-2017-5400], [CVE-2017-5401], [CVE-2017-5402], [CVE-2017-5404], [CVE-2017-5405], [CVE-2017-5407], [CVE-2017-5408], [CVE-2017-5410] |
RHSA-2017:0498: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20170461 |
false |
patch |
[RHSA-2017:0461], [CVE-2017-5398], [CVE-2017-5400], [CVE-2017-5401], [CVE-2017-5402], [CVE-2017-5404], [CVE-2017-5405], [CVE-2017-5407], [CVE-2017-5408], [CVE-2017-5410] |
RHSA-2017:0461: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20170396 |
false |
patch |
[RHSA-2017:0396], [CVE-2017-2615], [CVE-2017-2620] |
RHSA-2017:0396: qemu-kvm security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20170388 |
false |
patch |
[RHSA-2017:0388], [CVE-2017-2590] |
RHSA-2017:0388: ipa security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20170387 |
false |
patch |
[RHSA-2017:0387], [CVE-2016-8630], [CVE-2016-8655], [CVE-2016-9083], [CVE-2016-9084] |
RHSA-2017:0387: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20170372 |
false |
patch |
[RHSA-2017:0372], [CVE-2016-5195], [CVE-2016-7039], [CVE-2016-8666] |
RHSA-2017:0372: kernel-aarch64 security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20170295 |
false |
patch |
[RHSA-2017:0295], [CVE-2017-6074] |
RHSA-2017:0295: kernel-rt security update (Important) |
| oval:com.redhat.rhsa:def:20170269 |
false |
patch |
[RHSA-2017:0269], [CVE-2016-5546], [CVE-2016-5547], [CVE-2016-5548], [CVE-2016-5552], [CVE-2017-3231], [CVE-2017-3241], [CVE-2017-3252], [CVE-2017-3253], [CVE-2017-3261], [CVE-2017-3272], [CVE-2017-3289] |
RHSA-2017:0269: java-1.7.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20170254 |
false |
patch |
[RHSA-2017:0254], [CVE-2016-9577], [CVE-2016-9578] |
RHSA-2017:0254: spice security update (Moderate) |
| oval:com.redhat.rhsa:def:20170252 |
false |
patch |
[RHSA-2017:0252], [CVE-2016-7426], [CVE-2016-7429], [CVE-2016-7433], [CVE-2016-9310], [CVE-2016-9311] |
RHSA-2017:0252: ntp security update (Moderate) |
| oval:com.redhat.rhsa:def:20170238 |
false |
patch |
[RHSA-2017:0238], [CVE-2017-5373], [CVE-2017-5375], [CVE-2017-5376], [CVE-2017-5378], [CVE-2017-5380], [CVE-2017-5383], [CVE-2017-5390], [CVE-2017-5396] |
RHSA-2017:0238: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20170190 |
false |
patch |
[RHSA-2017:0190], [CVE-2017-5373], [CVE-2017-5375], [CVE-2017-5376], [CVE-2017-5378], [CVE-2017-5380], [CVE-2017-5383], [CVE-2017-5386], [CVE-2017-5390], [CVE-2017-5396] |
RHSA-2017:0190: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20170182 |
false |
patch |
[RHSA-2017:0182], [CVE-2016-10002] |
RHSA-2017:0182: squid security update (Moderate) |
| oval:com.redhat.rhsa:def:20170180 |
false |
patch |
[RHSA-2017:0180], [CVE-2016-5546], [CVE-2016-5547], [CVE-2016-5548], [CVE-2016-5552], [CVE-2017-3231], [CVE-2017-3241], [CVE-2017-3252], [CVE-2017-3253], [CVE-2017-3261], [CVE-2017-3272], [CVE-2017-3289] |
RHSA-2017:0180: java-1.8.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20170091 |
false |
patch |
[RHSA-2017:0091], [CVE-2016-6828], [CVE-2016-7117], [CVE-2016-9555] |
RHSA-2017:0091: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20170083 |
false |
patch |
[RHSA-2017:0083], [CVE-2016-2857] |
RHSA-2017:0083: qemu-kvm security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20170061 |
false |
patch |
[RHSA-2017:0061], [CVE-2016-5542], [CVE-2016-5554], [CVE-2016-5573], [CVE-2016-5582], [CVE-2016-5597] |
RHSA-2017:0061: java-1.6.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20170021 |
false |
patch |
[RHSA-2017:0021], [CVE-2016-9445], [CVE-2016-9809], [CVE-2016-9812], [CVE-2016-9813] |
RHSA-2017:0021: gstreamer1-plugins-bad-free security update (Moderate) |
| oval:com.redhat.rhsa:def:20170020 |
false |
patch |
[RHSA-2017:0020], [CVE-2016-9634], [CVE-2016-9635], [CVE-2016-9636], [CVE-2016-9807], [CVE-2016-9808] |
RHSA-2017:0020: gstreamer1-plugins-good security update (Moderate) |
| oval:com.redhat.rhsa:def:20170019 |
false |
patch |
[RHSA-2017:0019], [CVE-2016-9634], [CVE-2016-9635], [CVE-2016-9636], [CVE-2016-9807], [CVE-2016-9808] |
RHSA-2017:0019: gstreamer-plugins-good security update (Moderate) |
| oval:com.redhat.rhsa:def:20170018 |
false |
patch |
[RHSA-2017:0018], [CVE-2016-9445], [CVE-2016-9447], [CVE-2016-9809] |
RHSA-2017:0018: gstreamer-plugins-bad-free security update (Moderate) |
| oval:com.redhat.rhsa:def:20170013 |
false |
patch |
[RHSA-2017:0013], [CVE-2013-5653], [CVE-2016-7977], [CVE-2016-7978], [CVE-2016-7979], [CVE-2016-8602] |
RHSA-2017:0013: ghostscript security update (Moderate) |
| oval:com.redhat.rhsa:def:20170001 |
false |
patch |
[RHSA-2017:0001], [CVE-2016-7030], [CVE-2016-9575] |
RHSA-2017:0001: ipa security update (Moderate) |
| oval:com.redhat.rhsa:def:20162973 |
false |
patch |
[RHSA-2016:2973], [CVE-2016-9893], [CVE-2016-9895], [CVE-2016-9899], [CVE-2016-9900], [CVE-2016-9901], [CVE-2016-9902], [CVE-2016-9905] |
RHSA-2016:2973: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20162946 |
false |
patch |
[RHSA-2016:2946], [CVE-2016-9893], [CVE-2016-9895], [CVE-2016-9897], [CVE-2016-9898], [CVE-2016-9899], [CVE-2016-9900], [CVE-2016-9901], [CVE-2016-9902], [CVE-2016-9904], [CVE-2016-9905] |
RHSA-2016:2946: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20162850 |
false |
patch |
[RHSA-2016:2850], [CVE-2016-9079] |
RHSA-2016:2850: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20162843 |
false |
patch |
[RHSA-2016:2843], [CVE-2016-9079] |
RHSA-2016:2843: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20162825 |
false |
patch |
[RHSA-2016:2825], [CVE-2016-5290] |
RHSA-2016:2825: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20162819 |
false |
patch |
[RHSA-2016:2819], [CVE-2016-8704], [CVE-2016-8705], [CVE-2016-8706] |
RHSA-2016:2819: memcached security update (Important) |
| oval:com.redhat.rhsa:def:20162809 |
false |
patch |
[RHSA-2016:2809], [CVE-2016-8638] |
RHSA-2016:2809: ipsilon security update (Important) |
| oval:com.redhat.rhsa:def:20162780 |
false |
patch |
[RHSA-2016:2780], [CVE-2016-5290], [CVE-2016-5291], [CVE-2016-5296], [CVE-2016-5297], [CVE-2016-9064], [CVE-2016-9066] |
RHSA-2016:2780: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20162658 |
false |
patch |
[RHSA-2016:2658], [CVE-2016-10165], [CVE-2016-5542], [CVE-2016-5554], [CVE-2016-5573], [CVE-2016-5582], [CVE-2016-5597] |
RHSA-2016:2658: java-1.7.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20162614 |
false |
patch |
[RHSA-2016:2614], [CVE-2016-7035] |
RHSA-2016:2614: pacemaker security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20162607 |
false |
patch |
[RHSA-2016:2607], [CVE-2014-8165] |
RHSA-2016:2607: powerpc-utils-python security update (Moderate) |
| oval:com.redhat.rhsa:def:20162606 |
false |
patch |
[RHSA-2016:2606], [CVE-2016-5423], [CVE-2016-5424] |
RHSA-2016:2606: postgresql security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20162605 |
false |
patch |
[RHSA-2016:2605], [CVE-2016-5011] |
RHSA-2016:2605: util-linux security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20162604 |
false |
patch |
[RHSA-2016:2604], [CVE-2016-7050] |
RHSA-2016:2604: resteasy-base security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20162603 |
false |
patch |
[RHSA-2016:2603], [CVE-2016-5361] |
RHSA-2016:2603: libreswan security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20162602 |
false |
patch |
[RHSA-2016:2602], [CVE-2016-3099] |
RHSA-2016:2602: mod_nss security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20162601 |
false |
patch |
[RHSA-2016:2601], [CVE-2016-5384] |
RHSA-2016:2601: fontconfig security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20162600 |
false |
patch |
[RHSA-2016:2600], [CVE-2016-2569], [CVE-2016-2570], [CVE-2016-2571], [CVE-2016-2572], [CVE-2016-3948] |
RHSA-2016:2600: squid security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162599 |
false |
patch |
[RHSA-2016:2599], [CVE-2014-0230], [CVE-2015-5174], [CVE-2015-5345], [CVE-2015-5351], [CVE-2016-0706], [CVE-2016-0714], [CVE-2016-0763], [CVE-2016-3092] |
RHSA-2016:2599: tomcat security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162598 |
false |
patch |
[RHSA-2016:2598], [CVE-2016-5399], [CVE-2016-5766], [CVE-2016-5767], [CVE-2016-5768] |
RHSA-2016:2598: php security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20162597 |
false |
patch |
[RHSA-2016:2597], [CVE-2016-5410] |
RHSA-2016:2597: firewalld security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162596 |
false |
patch |
[RHSA-2016:2596], [CVE-2016-0720], [CVE-2016-0721] |
RHSA-2016:2596: pcs security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162595 |
false |
patch |
[RHSA-2016:2595], [CVE-2016-3492], [CVE-2016-5612], [CVE-2016-5616], [CVE-2016-5624], [CVE-2016-5626], [CVE-2016-5629], [CVE-2016-6662], [CVE-2016-6663], [CVE-2016-8283] |
RHSA-2016:2595: mariadb security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20162594 |
false |
patch |
[RHSA-2016:2594], [CVE-2016-4992], [CVE-2016-5405], [CVE-2016-5416] |
RHSA-2016:2594: 389-ds-base security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162593 |
false |
patch |
[RHSA-2016:2593], [CVE-2016-7091] |
RHSA-2016:2593: sudo security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20162592 |
false |
patch |
[RHSA-2016:2592], [CVE-2016-4455] |
RHSA-2016:2592: subscription-manager security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162591 |
false |
patch |
[RHSA-2016:2591], [CVE-2016-3119], [CVE-2016-3120] |
RHSA-2016:2591: krb5 security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20162590 |
false |
patch |
[RHSA-2016:2590], [CVE-2016-2774] |
RHSA-2016:2590: dhcp security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162589 |
false |
patch |
[RHSA-2016:2589], [CVE-2016-4994] |
RHSA-2016:2589: gimp security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162588 |
false |
patch |
[RHSA-2016:2588], [CVE-2015-8325] |
RHSA-2016:2588: openssh security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162587 |
false |
patch |
[RHSA-2016:2587], [CVE-2016-4971] |
RHSA-2016:2587: wget security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20162586 |
false |
patch |
[RHSA-2016:2586], [CVE-2016-5636] |
RHSA-2016:2586: python security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20162585 |
false |
patch |
[RHSA-2016:2585], [CVE-2016-1981], [CVE-2016-3712] |
RHSA-2016:2585: qemu-kvm security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162584 |
false |
patch |
[RHSA-2016:2584], [CVE-2013-4312], [CVE-2015-8374], [CVE-2015-8543], [CVE-2015-8746], [CVE-2015-8812], [CVE-2015-8844], [CVE-2015-8845], [CVE-2015-8956], [CVE-2016-2053], [CVE-2016-2069], [CVE-2016-2117], [CVE-2016-2384], [CVE-2016-2847], [CVE-2016-3070], [CVE-2016-3156], [CVE-2016-3699], [CVE-2016-3841], [CVE-2016-4569], [CVE-2016-4578], [CVE-2016-4581], [CVE-2016-4794], [CVE-2016-5829], [CVE-2016-6136], [CVE-2016-6198], [CVE-2016-6327], [CVE-2016-6480], [CVE-2017-13167] |
RHSA-2016:2584: kernel-rt security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20162583 |
false |
patch |
[RHSA-2016:2583], [CVE-2015-5194], [CVE-2015-5195], [CVE-2015-5196], [CVE-2015-5219], [CVE-2015-7691], [CVE-2015-7692], [CVE-2015-7701], [CVE-2015-7702], [CVE-2015-7703], [CVE-2015-7852], [CVE-2015-7974], [CVE-2015-7977], [CVE-2015-7978], [CVE-2015-7979], [CVE-2015-8158] |
RHSA-2016:2583: ntp security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20162582 |
false |
patch |
[RHSA-2016:2582], [CVE-2015-8803], [CVE-2015-8804], [CVE-2015-8805], [CVE-2016-6489] |
RHSA-2016:2582: nettle security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20162581 |
false |
patch |
[RHSA-2016:2581], [CVE-2016-0764] |
RHSA-2016:2581: NetworkManager security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20162580 |
false |
patch |
[RHSA-2016:2580], [CVE-2015-8868] |
RHSA-2016:2580: poppler security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20162579 |
false |
patch |
[RHSA-2016:2579], [CVE-2016-0794], [CVE-2016-0795] |
RHSA-2016:2579: libreoffice security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162578 |
false |
patch |
[RHSA-2016:2578], [CVE-2016-7797] |
RHSA-2016:2578: pacemaker security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162577 |
false |
patch |
[RHSA-2016:2577], [CVE-2015-5160], [CVE-2015-5313], [CVE-2016-5008] |
RHSA-2016:2577: libvirt security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162576 |
false |
patch |
[RHSA-2016:2576], [CVE-2015-8869] |
RHSA-2016:2576: libguestfs and virt-p2v security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162575 |
false |
patch |
[RHSA-2016:2575], [CVE-2016-5419], [CVE-2016-5420], [CVE-2016-7141] |
RHSA-2016:2575: curl security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20162574 |
false |
patch |
[RHSA-2016:2574], [CVE-2013-4312], [CVE-2015-8374], [CVE-2015-8543], [CVE-2015-8746], [CVE-2015-8812], [CVE-2015-8844], [CVE-2015-8845], [CVE-2015-8956], [CVE-2016-2053], [CVE-2016-2069], [CVE-2016-2117], [CVE-2016-2384], [CVE-2016-2847], [CVE-2016-3044], [CVE-2016-3070], [CVE-2016-3156], [CVE-2016-3699], [CVE-2016-3841], [CVE-2016-4569], [CVE-2016-4578], [CVE-2016-4581], [CVE-2016-4794], [CVE-2016-5412], [CVE-2016-5828], [CVE-2016-5829], [CVE-2016-6136], [CVE-2016-6198], [CVE-2016-6327], [CVE-2016-6480], [CVE-2016-7914], [CVE-2016-7915], [CVE-2016-9794], [CVE-2017-13167], [CVE-2018-16597] |
RHSA-2016:2574: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20162573 |
false |
patch |
[RHSA-2016:2573], [CVE-2016-3075] |
RHSA-2016:2573: glibc security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20162110 |
false |
patch |
[RHSA-2016:2110], [CVE-2016-5195], [CVE-2016-7039], [CVE-2016-8666] |
RHSA-2016:2110: kernel-rt security update (Important) |
| oval:com.redhat.rhsa:def:20162098 |
false |
patch |
[RHSA-2016:2098], [CVE-2016-5195] |
RHSA-2016:2098: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20162079 |
false |
patch |
[RHSA-2016:2079], [CVE-2016-10165], [CVE-2016-5542], [CVE-2016-5554], [CVE-2016-5573], [CVE-2016-5582], [CVE-2016-5597] |
RHSA-2016:2079: java-1.8.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20162047 |
false |
patch |
[RHSA-2016:2047], [CVE-2016-7039], [CVE-2016-8666] |
RHSA-2016:2047: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20162046 |
false |
patch |
[RHSA-2016:2046], [CVE-2014-7810], [CVE-2015-5346], [CVE-2016-5388], [CVE-2016-5425], [CVE-2016-6325] |
RHSA-2016:2046: tomcat security update (Important) |
| oval:com.redhat.rhsa:def:20161985 |
false |
patch |
[RHSA-2016:1985], [CVE-2016-5257] |
RHSA-2016:1985: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20161978 |
false |
patch |
[RHSA-2016:1978], [CVE-2016-1000111] |
RHSA-2016:1978: python-twisted-web security update (Important) |
| oval:com.redhat.rhsa:def:20161944 |
false |
patch |
[RHSA-2016:1944], [CVE-2016-2776] |
RHSA-2016:1944: bind security update (Important) |
| oval:com.redhat.rhsa:def:20161940 |
false |
patch |
[RHSA-2016:1940], [CVE-2016-2177], [CVE-2016-2178], [CVE-2016-2179], [CVE-2016-2180], [CVE-2016-2181], [CVE-2016-2182], [CVE-2016-6302], [CVE-2016-6304], [CVE-2016-6306] |
RHSA-2016:1940: openssl security update (Important) |
| oval:com.redhat.rhsa:def:20161912 |
false |
patch |
[RHSA-2016:1912], [CVE-2016-5250], [CVE-2016-5257], [CVE-2016-5261], [CVE-2016-5270], [CVE-2016-5272], [CVE-2016-5274], [CVE-2016-5276], [CVE-2016-5277], [CVE-2016-5278], [CVE-2016-5280], [CVE-2016-5281], [CVE-2016-5284] |
RHSA-2016:1912: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20161875 |
false |
patch |
[RHSA-2016:1875], [CVE-2016-3134], [CVE-2016-4997], [CVE-2016-4998], [CVE-2016-6197], [CVE-2016-6198] |
RHSA-2016:1875: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20161847 |
false |
patch |
[RHSA-2016:1847], [CVE-2016-3134], [CVE-2016-4997], [CVE-2016-4998], [CVE-2016-6197], [CVE-2016-6198] |
RHSA-2016:1847: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20161844 |
false |
patch |
[RHSA-2016:1844], [CVE-2015-8916], [CVE-2015-8917], [CVE-2015-8919], [CVE-2015-8920], [CVE-2015-8921], [CVE-2015-8922], [CVE-2015-8923], [CVE-2015-8924], [CVE-2015-8925], [CVE-2015-8926], [CVE-2015-8928], [CVE-2015-8930], [CVE-2015-8931], [CVE-2015-8932], [CVE-2015-8934], [CVE-2016-1541], [CVE-2016-4300], [CVE-2016-4302], [CVE-2016-4809], [CVE-2016-5418], [CVE-2016-5844], [CVE-2016-6250], [CVE-2016-7166] |
RHSA-2016:1844: libarchive security update (Important) |
| oval:com.redhat.rhsa:def:20161809 |
false |
patch |
[RHSA-2016:1809], [CVE-2016-2836] |
RHSA-2016:1809: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20161797 |
false |
patch |
[RHSA-2016:1797], [CVE-2016-5404] |
RHSA-2016:1797: ipa security update (Moderate) |
| oval:com.redhat.rhsa:def:20161776 |
false |
patch |
[RHSA-2016:1776], [CVE-2016-3458], [CVE-2016-3500], [CVE-2016-3508], [CVE-2016-3550], [CVE-2016-3606] |
RHSA-2016:1776: java-1.6.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20161633 |
false |
patch |
[RHSA-2016:1633], [CVE-2016-5696] |
RHSA-2016:1633: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20161632 |
false |
patch |
[RHSA-2016:1632], [CVE-2016-5696] |
RHSA-2016:1632: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20161626 |
false |
patch |
[RHSA-2016:1626], [CVE-2016-0772], [CVE-2016-1000110], [CVE-2016-5699] |
RHSA-2016:1626: python security update (Moderate) |
| oval:com.redhat.rhsa:def:20161613 |
false |
patch |
[RHSA-2016:1613], [CVE-2016-5385] |
RHSA-2016:1613: php security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20161606 |
false |
patch |
[RHSA-2016:1606], [CVE-2016-5126], [CVE-2016-5403] |
RHSA-2016:1606: qemu-kvm security update (Moderate) |
| oval:com.redhat.rhsa:def:20161602 |
false |
patch |
[RHSA-2016:1602], [CVE-2016-0640], [CVE-2016-0641], [CVE-2016-0643], [CVE-2016-0644], [CVE-2016-0646], [CVE-2016-0647], [CVE-2016-0648], [CVE-2016-0649], [CVE-2016-0650], [CVE-2016-0666], [CVE-2016-3452], [CVE-2016-3477], [CVE-2016-3521], [CVE-2016-3615], [CVE-2016-5440], [CVE-2016-5444] |
RHSA-2016:1602: mariadb security update (Important) |
| oval:com.redhat.rhsa:def:20161551 |
false |
patch |
[RHSA-2016:1551], [CVE-2016-2830], [CVE-2016-2836], [CVE-2016-2837], [CVE-2016-2838], [CVE-2016-5252], [CVE-2016-5254], [CVE-2016-5258], [CVE-2016-5259], [CVE-2016-5262], [CVE-2016-5263], [CVE-2016-5264], [CVE-2016-5265] |
RHSA-2016:1551: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20161546 |
false |
patch |
[RHSA-2016:1546], [CVE-2014-8127], [CVE-2014-8129], [CVE-2014-8130], [CVE-2014-9330], [CVE-2014-9655], [CVE-2015-1547], [CVE-2015-7554], [CVE-2015-8665], [CVE-2015-8668], [CVE-2015-8683], [CVE-2015-8781], [CVE-2015-8782], [CVE-2015-8783], [CVE-2015-8784], [CVE-2016-3632], [CVE-2016-3945], [CVE-2016-3990], [CVE-2016-3991], [CVE-2016-5320] |
RHSA-2016:1546: libtiff security update (Important) |
| oval:com.redhat.rhsa:def:20161541 |
false |
patch |
[RHSA-2016:1541], [CVE-2015-8660], [CVE-2016-4470] |
RHSA-2016:1541: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20161539 |
false |
patch |
[RHSA-2016:1539], [CVE-2015-8660], [CVE-2016-2143], [CVE-2016-4470] |
RHSA-2016:1539: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20161538 |
false |
patch |
[RHSA-2016:1538], [CVE-2015-5739], [CVE-2015-5740], [CVE-2015-5741], [CVE-2016-3959], [CVE-2016-5386] |
RHSA-2016:1538: golang security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20161504 |
false |
patch |
[RHSA-2016:1504], [CVE-2016-3458], [CVE-2016-3500], [CVE-2016-3508], [CVE-2016-3550], [CVE-2016-3598], [CVE-2016-3606], [CVE-2016-3610] |
RHSA-2016:1504: java-1.7.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20161486 |
false |
patch |
[RHSA-2016:1486], [CVE-2016-2119] |
RHSA-2016:1486: samba security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20161458 |
false |
patch |
[RHSA-2016:1458], [CVE-2016-3458], [CVE-2016-3500], [CVE-2016-3508], [CVE-2016-3550], [CVE-2016-3587], [CVE-2016-3598], [CVE-2016-3606], [CVE-2016-3610] |
RHSA-2016:1458: java-1.8.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20161422 |
false |
patch |
[RHSA-2016:1422], [CVE-2016-5387] |
RHSA-2016:1422: httpd security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20161392 |
false |
patch |
[RHSA-2016:1392], [CVE-2016-2818] |
RHSA-2016:1392: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20161301 |
false |
patch |
[RHSA-2016:1301], [CVE-2015-8767], [CVE-2016-3707], [CVE-2016-4565] |
RHSA-2016:1301: kernel-rt security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20161296 |
false |
patch |
[RHSA-2016:1296], [CVE-2015-8869] |
RHSA-2016:1296: ocaml security update (Moderate) |
| oval:com.redhat.rhsa:def:20161293 |
false |
patch |
[RHSA-2016:1293], [CVE-2016-4444], [CVE-2016-4446], [CVE-2016-4989] |
RHSA-2016:1293: setroubleshoot and setroubleshoot-plugins security update (Important) |
| oval:com.redhat.rhsa:def:20161292 |
false |
patch |
[RHSA-2016:1292], [CVE-2016-1762], [CVE-2016-1833], [CVE-2016-1834], [CVE-2016-1835], [CVE-2016-1836], [CVE-2016-1837], [CVE-2016-1838], [CVE-2016-1839], [CVE-2016-1840], [CVE-2016-3627], [CVE-2016-3705], [CVE-2016-4447], [CVE-2016-4448], [CVE-2016-4449] |
RHSA-2016:1292: libxml2 security update (Important) |
| oval:com.redhat.rhsa:def:20161277 |
false |
patch |
[RHSA-2016:1277], [CVE-2015-8767], [CVE-2016-4565] |
RHSA-2016:1277: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20161237 |
false |
patch |
[RHSA-2016:1237], [CVE-2015-8895], [CVE-2015-8896], [CVE-2015-8897], [CVE-2015-8898], [CVE-2016-5118], [CVE-2016-5239], [CVE-2016-5240] |
RHSA-2016:1237: ImageMagick security update (Important) |
| oval:com.redhat.rhsa:def:20161217 |
false |
patch |
[RHSA-2016:1217], [CVE-2016-2818], [CVE-2016-2819], [CVE-2016-2821], [CVE-2016-2822], [CVE-2016-2828], [CVE-2016-2831] |
RHSA-2016:1217: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20161205 |
false |
patch |
[RHSA-2016:1205], [CVE-2016-0749], [CVE-2016-2150] |
RHSA-2016:1205: spice security update (Important) |
| oval:com.redhat.rhsa:def:20161141 |
false |
patch |
[RHSA-2016:1141], [CVE-2015-7979], [CVE-2016-1547], [CVE-2016-1548], [CVE-2016-1550], [CVE-2016-2518] |
RHSA-2016:1141: ntp security update (Moderate) |
| oval:com.redhat.rhsa:def:20161139 |
false |
patch |
[RHSA-2016:1139], [CVE-2016-4051], [CVE-2016-4052], [CVE-2016-4053], [CVE-2016-4054], [CVE-2016-4553], [CVE-2016-4554], [CVE-2016-4555], [CVE-2016-4556] |
RHSA-2016:1139: squid security update (Moderate) |
| oval:com.redhat.rhsa:def:20161086 |
false |
patch |
[RHSA-2016:1086], [CVE-2016-3698] |
RHSA-2016:1086: libndp security update (Moderate) |
| oval:com.redhat.rhsa:def:20161051 |
false |
patch |
[RHSA-2016:1051], [CVE-2016-0758] |
RHSA-2016:1051: kernel-rt security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20161041 |
false |
patch |
[RHSA-2016:1041], [CVE-2016-2805], [CVE-2016-2807] |
RHSA-2016:1041: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20161033 |
false |
patch |
[RHSA-2016:1033], [CVE-2016-0758], [CVE-2016-3044] |
RHSA-2016:1033: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20161025 |
false |
patch |
[RHSA-2016:1025], [CVE-2015-2328], [CVE-2015-3217], [CVE-2015-5073], [CVE-2015-8385], [CVE-2015-8386], [CVE-2015-8388], [CVE-2015-8391], [CVE-2016-3191] |
RHSA-2016:1025: pcre security update (Important) |
| oval:com.redhat.rhsa:def:20160726 |
false |
patch |
[RHSA-2016:0726], [CVE-2016-3714], [CVE-2016-3715], [CVE-2016-3716], [CVE-2016-3717], [CVE-2016-3718] |
RHSA-2016:0726: ImageMagick security update (Important) |
| oval:com.redhat.rhsa:def:20160724 |
false |
patch |
[RHSA-2016:0724], [CVE-2016-3710] |
RHSA-2016:0724: qemu-kvm security update (Important) |
| oval:com.redhat.rhsa:def:20160723 |
false |
patch |
[RHSA-2016:0723], [CVE-2016-0686], [CVE-2016-0687], [CVE-2016-0695], [CVE-2016-3425], [CVE-2016-3427] |
RHSA-2016:0723: java-1.6.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20160722 |
false |
patch |
[RHSA-2016:0722], [CVE-2016-0799], [CVE-2016-2105], [CVE-2016-2106], [CVE-2016-2107], [CVE-2016-2108], [CVE-2016-2109], [CVE-2016-2842] |
RHSA-2016:0722: openssl security update (Important) |
| oval:com.redhat.rhsa:def:20160706 |
false |
patch |
[RHSA-2016:0706], [CVE-2016-3068], [CVE-2016-3069] |
RHSA-2016:0706: mercurial security update (Important) |
| oval:com.redhat.rhsa:def:20160695 |
false |
patch |
[RHSA-2016:0695], [CVE-2016-1526], [CVE-2016-2805], [CVE-2016-2806], [CVE-2016-2807], [CVE-2016-2808], [CVE-2016-2814] |
RHSA-2016:0695: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20160685 |
false |
patch |
[RHSA-2016:0685], [CVE-2016-1978], [CVE-2016-1979] |
RHSA-2016:0685: nss, nspr, nss-softokn, and nss-util security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20160676 |
false |
patch |
[RHSA-2016:0676], [CVE-2016-0686], [CVE-2016-0687], [CVE-2016-0695], [CVE-2016-3425], [CVE-2016-3427] |
RHSA-2016:0676: java-1.7.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20160650 |
false |
patch |
[RHSA-2016:0650], [CVE-2016-0686], [CVE-2016-0687], [CVE-2016-0695], [CVE-2016-3425], [CVE-2016-3426], [CVE-2016-3427] |
RHSA-2016:0650: java-1.8.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20160612 |
false |
patch |
[RHSA-2016:0612], [CVE-2015-5370], [CVE-2016-2110], [CVE-2016-2111], [CVE-2016-2112], [CVE-2016-2113], [CVE-2016-2114], [CVE-2016-2115], [CVE-2016-2118] |
RHSA-2016:0612: samba and samba4 security, bug fix, and enhancement update (Critical) |
| oval:com.redhat.rhsa:def:20160594 |
false |
patch |
[RHSA-2016:0594], [CVE-2016-1521], [CVE-2016-1522], [CVE-2016-1523], [CVE-2016-1526] |
RHSA-2016:0594: graphite2 security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20160534 |
false |
patch |
[RHSA-2016:0534], [CVE-2015-4792], [CVE-2015-4802], [CVE-2015-4815], [CVE-2015-4816], [CVE-2015-4819], [CVE-2015-4826], [CVE-2015-4830], [CVE-2015-4836], [CVE-2015-4858], [CVE-2015-4861], [CVE-2015-4870], [CVE-2015-4879], [CVE-2015-4913], [CVE-2016-0505], [CVE-2016-0546], [CVE-2016-0596], [CVE-2016-0597], [CVE-2016-0598], [CVE-2016-0600], [CVE-2016-0606], [CVE-2016-0608], [CVE-2016-0609], [CVE-2016-0616], [CVE-2016-0642], [CVE-2016-0651], [CVE-2016-2047], [CVE-2016-3471] |
RHSA-2016:0534: mariadb security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20160532 |
false |
patch |
[RHSA-2016:0532], [CVE-2015-8629], [CVE-2015-8630], [CVE-2015-8631] |
RHSA-2016:0532: krb5 security update (Moderate) |
| oval:com.redhat.rhsa:def:20160513 |
false |
patch |
[RHSA-2016:0513], [CVE-2016-0636] |
RHSA-2016:0513: java-1.8.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20160512 |
false |
patch |
[RHSA-2016:0512], [CVE-2016-0636] |
RHSA-2016:0512: java-1.7.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20160496 |
false |
patch |
[RHSA-2016:0496], [CVE-2016-2315], [CVE-2016-2324] |
RHSA-2016:0496: git security update (Important) |
| oval:com.redhat.rhsa:def:20160465 |
false |
patch |
[RHSA-2016:0465], [CVE-2016-1908], [CVE-2016-3115] |
RHSA-2016:0465: openssh security update (Moderate) |
| oval:com.redhat.rhsa:def:20160460 |
false |
patch |
[RHSA-2016:0460], [CVE-2016-1952], [CVE-2016-1954], [CVE-2016-1957], [CVE-2016-1960], [CVE-2016-1961], [CVE-2016-1964], [CVE-2016-1966], [CVE-2016-1974], [CVE-2016-1977], [CVE-2016-2790], [CVE-2016-2791], [CVE-2016-2792], [CVE-2016-2793], [CVE-2016-2794], [CVE-2016-2795], [CVE-2016-2796], [CVE-2016-2797], [CVE-2016-2798], [CVE-2016-2799], [CVE-2016-2800], [CVE-2016-2801], [CVE-2016-2802] |
RHSA-2016:0460: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20160459 |
false |
patch |
[RHSA-2016:0459], [CVE-2016-1285], [CVE-2016-1286] |
RHSA-2016:0459: bind security update (Important) |
| oval:com.redhat.rhsa:def:20160448 |
false |
patch |
[RHSA-2016:0448], [CVE-2015-7560] |
RHSA-2016:0448: samba security update (Moderate) |
| oval:com.redhat.rhsa:def:20160430 |
false |
patch |
[RHSA-2016:0430], [CVE-2016-0729] |
RHSA-2016:0430: xerces-c security update (Important) |
| oval:com.redhat.rhsa:def:20160428 |
false |
patch |
[RHSA-2016:0428], [CVE-2016-0787] |
RHSA-2016:0428: libssh2 security update (Moderate) |
| oval:com.redhat.rhsa:def:20160373 |
false |
patch |
[RHSA-2016:0373], [CVE-2016-1952], [CVE-2016-1954], [CVE-2016-1957], [CVE-2016-1958], [CVE-2016-1960], [CVE-2016-1961], [CVE-2016-1962], [CVE-2016-1964], [CVE-2016-1965], [CVE-2016-1966], [CVE-2016-1973], [CVE-2016-1974], [CVE-2016-1977], [CVE-2016-2790], [CVE-2016-2791], [CVE-2016-2792], [CVE-2016-2793], [CVE-2016-2794], [CVE-2016-2795], [CVE-2016-2796], [CVE-2016-2797], [CVE-2016-2798], [CVE-2016-2799], [CVE-2016-2800], [CVE-2016-2801], [CVE-2016-2802] |
RHSA-2016:0373: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20160372 |
false |
patch |
[RHSA-2016:0372], [CVE-2015-0293], [CVE-2015-3197], [CVE-2016-0703], [CVE-2016-0704], [CVE-2016-0800] |
RHSA-2016:0372: openssl098e security update (Important) |
| oval:com.redhat.rhsa:def:20160370 |
false |
patch |
[RHSA-2016:0370], [CVE-2016-1950] |
RHSA-2016:0370: nss-util security update (Critical) |
| oval:com.redhat.rhsa:def:20160346 |
false |
patch |
[RHSA-2016:0346], [CVE-2016-0773] |
RHSA-2016:0346: postgresql security update (Important) |
| oval:com.redhat.rhsa:def:20160301 |
false |
patch |
[RHSA-2016:0301], [CVE-2015-3197], [CVE-2016-0702], [CVE-2016-0705], [CVE-2016-0797], [CVE-2016-0800] |
RHSA-2016:0301: openssl security update (Important) |
| oval:com.redhat.rhsa:def:20160258 |
false |
patch |
[RHSA-2016:0258], [CVE-2016-1521], [CVE-2016-1522], [CVE-2016-1523], [CVE-2016-1930], [CVE-2016-1935] |
RHSA-2016:0258: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20160212 |
false |
patch |
[RHSA-2016:0212], [CVE-2015-5157], [CVE-2015-7872] |
RHSA-2016:0212: kernel-rt security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20160204 |
false |
patch |
[RHSA-2016:0204], [CVE-2016-0741] |
RHSA-2016:0204: 389-ds-base security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20160197 |
false |
patch |
[RHSA-2016:0197], [CVE-2016-1521], [CVE-2016-1522], [CVE-2016-1523], [CVE-2016-1969] |
RHSA-2016:0197: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20160189 |
false |
patch |
[RHSA-2016:0189], [CVE-2015-3256] |
RHSA-2016:0189: polkit security update (Moderate) |
| oval:com.redhat.rhsa:def:20160188 |
false |
patch |
[RHSA-2016:0188], [CVE-2015-7529] |
RHSA-2016:0188: sos security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20160185 |
false |
patch |
[RHSA-2016:0185], [CVE-2015-5157], [CVE-2015-7872] |
RHSA-2016:0185: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20160176 |
false |
patch |
[RHSA-2016:0176], [CVE-2015-5229], [CVE-2015-7547] |
RHSA-2016:0176: glibc security and bug fix update (Critical) |
| oval:com.redhat.rhsa:def:20160083 |
false |
patch |
[RHSA-2016:0083], [CVE-2016-1714] |
RHSA-2016:0083: qemu-kvm security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20160073 |
false |
patch |
[RHSA-2016:0073], [CVE-2015-8704] |
RHSA-2016:0073: bind security update (Moderate) |
| oval:com.redhat.rhsa:def:20160071 |
false |
patch |
[RHSA-2016:0071], [CVE-2016-1930], [CVE-2016-1935] |
RHSA-2016:0071: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20160067 |
false |
patch |
[RHSA-2016:0067], [CVE-2016-0402], [CVE-2016-0448], [CVE-2016-0466], [CVE-2016-0483], [CVE-2016-0494] |
RHSA-2016:0067: java-1.6.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20160065 |
false |
patch |
[RHSA-2016:0065], [CVE-2016-0728] |
RHSA-2016:0065: kernel-rt security update (Important) |
| oval:com.redhat.rhsa:def:20160064 |
false |
patch |
[RHSA-2016:0064], [CVE-2016-0728] |
RHSA-2016:0064: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20160063 |
false |
patch |
[RHSA-2016:0063], [CVE-2015-8138] |
RHSA-2016:0063: ntp security update (Important) |
| oval:com.redhat.rhsa:def:20160054 |
false |
patch |
[RHSA-2016:0054], [CVE-2015-4871], [CVE-2015-7575], [CVE-2016-0402], [CVE-2016-0448], [CVE-2016-0466], [CVE-2016-0483], [CVE-2016-0494] |
RHSA-2016:0054: java-1.7.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20160049 |
false |
patch |
[RHSA-2016:0049], [CVE-2015-7575], [CVE-2016-0402], [CVE-2016-0448], [CVE-2016-0466], [CVE-2016-0475], [CVE-2016-0483], [CVE-2016-0494] |
RHSA-2016:0049: java-1.8.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20160043 |
false |
patch |
[RHSA-2016:0043], [CVE-2016-0777], [CVE-2016-0778] |
RHSA-2016:0043: openssh security update (Moderate) |
| oval:com.redhat.rhsa:def:20160012 |
false |
patch |
[RHSA-2016:0012], [CVE-2015-7575] |
RHSA-2016:0012: gnutls security update (Moderate) |
| oval:com.redhat.rhsa:def:20160009 |
false |
patch |
[RHSA-2016:0009], [CVE-2015-3223], [CVE-2015-5330] |
RHSA-2016:0009: libldb security update (Moderate) |
| oval:com.redhat.rhsa:def:20160008 |
false |
patch |
[RHSA-2016:0008], [CVE-2015-7575] |
RHSA-2016:0008: openssl security update (Moderate) |
| oval:com.redhat.rhsa:def:20160007 |
false |
patch |
[RHSA-2016:0007], [CVE-2015-7575] |
RHSA-2016:0007: nss security update (Moderate) |
| oval:com.redhat.rhsa:def:20160006 |
false |
patch |
[RHSA-2016:0006], [CVE-2015-5252], [CVE-2015-5296], [CVE-2015-5299], [CVE-2015-5330] |
RHSA-2016:0006: samba security update (Moderate) |
| oval:com.redhat.rhsa:def:20160005 |
false |
patch |
[RHSA-2016:0005], [CVE-2015-7236] |
RHSA-2016:0005: rpcbind security update (Moderate) |
| oval:com.redhat.rhsa:def:20160001 |
false |
patch |
[RHSA-2016:0001], [CVE-2015-7201], [CVE-2015-7205], [CVE-2015-7212], [CVE-2015-7213], [CVE-2015-7214] |
RHSA-2016:0001: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20152657 |
false |
patch |
[RHSA-2015:2657], [CVE-2015-7201], [CVE-2015-7205], [CVE-2015-7210], [CVE-2015-7212], [CVE-2015-7213], [CVE-2015-7214], [CVE-2015-7222] |
RHSA-2015:2657: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20152655 |
false |
patch |
[RHSA-2015:2655], [CVE-2015-8000] |
RHSA-2015:2655: bind security update (Important) |
| oval:com.redhat.rhsa:def:20152623 |
false |
patch |
[RHSA-2015:2623], [CVE-2015-8370] |
RHSA-2015:2623: grub2 security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20152619 |
false |
patch |
[RHSA-2015:2619], [CVE-2015-4551], [CVE-2015-5212], [CVE-2015-5213], [CVE-2015-5214] |
RHSA-2015:2619: libreoffice security update (Moderate) |
| oval:com.redhat.rhsa:def:20152617 |
false |
patch |
[RHSA-2015:2617], [CVE-2015-3194], [CVE-2015-3195], [CVE-2015-3196] |
RHSA-2015:2617: openssl security update (Moderate) |
| oval:com.redhat.rhsa:def:20152596 |
false |
patch |
[RHSA-2015:2596], [CVE-2015-8126], [CVE-2015-8472] |
RHSA-2015:2596: libpng security update (Moderate) |
| oval:com.redhat.rhsa:def:20152595 |
false |
patch |
[RHSA-2015:2595], [CVE-2015-7981], [CVE-2015-8126], [CVE-2015-8472] |
RHSA-2015:2595: libpng12 security update (Moderate) |
| oval:com.redhat.rhsa:def:20152561 |
false |
patch |
[RHSA-2015:2561], [CVE-2015-7545] |
RHSA-2015:2561: git security update (Moderate) |
| oval:com.redhat.rhsa:def:20152552 |
false |
patch |
[RHSA-2015:2552], [CVE-2015-5307], [CVE-2015-8104] |
RHSA-2015:2552: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20152550 |
false |
patch |
[RHSA-2015:2550], [CVE-2015-1819], [CVE-2015-5312], [CVE-2015-7497], [CVE-2015-7498], [CVE-2015-7499], [CVE-2015-7500], [CVE-2015-7941], [CVE-2015-7942], [CVE-2015-8241], [CVE-2015-8242], [CVE-2015-8317], [CVE-2015-8710] |
RHSA-2015:2550: libxml2 security update (Moderate) |
| oval:com.redhat.rhsa:def:20152522 |
false |
patch |
[RHSA-2015:2522], [CVE-2015-7501] |
RHSA-2015:2522: apache-commons-collections security update (Important) |
| oval:com.redhat.rhsa:def:20152519 |
false |
patch |
[RHSA-2015:2519], [CVE-2015-4513], [CVE-2015-7189], [CVE-2015-7193], [CVE-2015-7197], [CVE-2015-7198], [CVE-2015-7199], [CVE-2015-7200] |
RHSA-2015:2519: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20152505 |
false |
patch |
[RHSA-2015:2505], [CVE-2015-5273], [CVE-2015-5287], [CVE-2015-5302] |
RHSA-2015:2505: abrt and libreport security update (Moderate) |
| oval:com.redhat.rhsa:def:20152455 |
false |
patch |
[RHSA-2015:2455], [CVE-2014-8602] |
RHSA-2015:2455: unbound security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20152417 |
false |
patch |
[RHSA-2015:2417], [CVE-2014-8169] |
RHSA-2015:2417: autofs security, bug fix and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152411 |
false |
patch |
[RHSA-2015:2411], [CVE-2013-7421], [CVE-2014-8171], [CVE-2014-9419], [CVE-2014-9644], [CVE-2015-2925], [CVE-2015-3339], [CVE-2015-4170], [CVE-2015-5283], [CVE-2015-7613], [CVE-2015-7837] |
RHSA-2015:2411: kernel-rt security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20152401 |
false |
patch |
[RHSA-2015:2401], [CVE-2015-5281] |
RHSA-2015:2401: grub2 security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20152393 |
false |
patch |
[RHSA-2015:2393], [CVE-2014-8710], [CVE-2014-8711], [CVE-2014-8712], [CVE-2014-8713], [CVE-2014-8714], [CVE-2015-0562], [CVE-2015-0563], [CVE-2015-0564], [CVE-2015-2188], [CVE-2015-2189], [CVE-2015-2191], [CVE-2015-3182], [CVE-2015-3810], [CVE-2015-3811], [CVE-2015-3812], [CVE-2015-3813], [CVE-2015-6243], [CVE-2015-6244], [CVE-2015-6245], [CVE-2015-6246], [CVE-2015-6248] |
RHSA-2015:2393: wireshark security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152383 |
false |
patch |
[RHSA-2015:2383], [CVE-2015-1867] |
RHSA-2015:2383: pacemaker security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152378 |
false |
patch |
[RHSA-2015:2378], [CVE-2015-3455] |
RHSA-2015:2378: squid security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20152369 |
false |
patch |
[RHSA-2015:2369], [CVE-2015-3248] |
RHSA-2015:2369: openhpi security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20152360 |
false |
patch |
[RHSA-2015:2360], [CVE-2015-3258], [CVE-2015-3279] |
RHSA-2015:2360: cups-filters security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152355 |
false |
patch |
[RHSA-2015:2355], [CVE-2015-5292] |
RHSA-2015:2355: sssd security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20152345 |
false |
patch |
[RHSA-2015:2345], [CVE-2014-3565] |
RHSA-2015:2345: net-snmp security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20152315 |
false |
patch |
[RHSA-2015:2315], [CVE-2015-0272], [CVE-2015-2924] |
RHSA-2015:2315: NetworkManager security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152290 |
false |
patch |
[RHSA-2015:2290], [CVE-2015-3225] |
RHSA-2015:2290: pcs security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152248 |
false |
patch |
[RHSA-2015:2248], [CVE-2014-8119] |
RHSA-2015:2248: netcf security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152241 |
false |
patch |
[RHSA-2015:2241], [CVE-2015-1821], [CVE-2015-1822], [CVE-2015-1853] |
RHSA-2015:2241: chrony security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152237 |
false |
patch |
[RHSA-2015:2237], [CVE-2015-2675] |
RHSA-2015:2237: rest security update (Low) |
| oval:com.redhat.rhsa:def:20152233 |
false |
patch |
[RHSA-2015:2233], [CVE-2014-8240], [CVE-2014-8241] |
RHSA-2015:2233: tigervnc security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152231 |
false |
patch |
[RHSA-2015:2231], [CVE-2014-9297], [CVE-2014-9298], [CVE-2014-9750], [CVE-2014-9751], [CVE-2015-1798], [CVE-2015-1799], [CVE-2015-3405] |
RHSA-2015:2231: ntp security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152199 |
false |
patch |
[RHSA-2015:2199], [CVE-2013-7423], [CVE-2015-1472], [CVE-2015-1473], [CVE-2015-1781] |
RHSA-2015:2199: glibc security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152184 |
false |
patch |
[RHSA-2015:2184], [CVE-2015-2704] |
RHSA-2015:2184: realmd security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152180 |
false |
patch |
[RHSA-2015:2180], [CVE-2013-0334] |
RHSA-2015:2180: rubygem-bundler and rubygem-thor security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152172 |
false |
patch |
[RHSA-2015:2172], [CVE-2015-5277] |
RHSA-2015:2172: glibc security update (Important) |
| oval:com.redhat.rhsa:def:20152159 |
false |
patch |
[RHSA-2015:2159], [CVE-2014-3613], [CVE-2014-3707], [CVE-2014-8150], [CVE-2015-3143], [CVE-2015-3148] |
RHSA-2015:2159: curl security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152155 |
false |
patch |
[RHSA-2015:2155], [CVE-2014-0207], [CVE-2014-0237], [CVE-2014-0238], [CVE-2014-3478], [CVE-2014-3479], [CVE-2014-3480], [CVE-2014-3487], [CVE-2014-3538], [CVE-2014-3587], [CVE-2014-3710], [CVE-2014-8116], [CVE-2014-8117], [CVE-2014-9652], [CVE-2014-9653] |
RHSA-2015:2155: file security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20152154 |
false |
patch |
[RHSA-2015:2154], [CVE-2014-5355], [CVE-2015-2694] |
RHSA-2015:2154: krb5 security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152152 |
false |
patch |
[RHSA-2015:2152], [CVE-2010-5313], [CVE-2013-7421], [CVE-2014-3647], [CVE-2014-7842], [CVE-2014-8171], [CVE-2014-9419], [CVE-2014-9644], [CVE-2015-0239], [CVE-2015-2925], [CVE-2015-3288], [CVE-2015-3339], [CVE-2015-4170], [CVE-2015-5283], [CVE-2015-6526], [CVE-2015-7553], [CVE-2015-7613], [CVE-2015-7837], [CVE-2015-8215], [CVE-2016-0774] |
RHSA-2015:2152: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20152151 |
false |
patch |
[RHSA-2015:2151], [CVE-2012-2150] |
RHSA-2015:2151: xfsprogs security, bug fix and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20152140 |
false |
patch |
[RHSA-2015:2140], [CVE-2015-1782] |
RHSA-2015:2140: libssh2 security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20152131 |
false |
patch |
[RHSA-2015:2131], [CVE-2014-8182], [CVE-2015-3276] |
RHSA-2015:2131: openldap security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152111 |
false |
patch |
[RHSA-2015:2111], [CVE-2015-1345] |
RHSA-2015:2111: grep security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20152108 |
false |
patch |
[RHSA-2015:2108], [CVE-2014-9112] |
RHSA-2015:2108: cpio security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20152101 |
false |
patch |
[RHSA-2015:2101], [CVE-2013-1752], [CVE-2013-1753], [CVE-2014-4616], [CVE-2014-4650], [CVE-2014-7185] |
RHSA-2015:2101: python security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152088 |
false |
patch |
[RHSA-2015:2088], [CVE-2015-5600], [CVE-2015-6563], [CVE-2015-6564] |
RHSA-2015:2088: openssh security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152086 |
false |
patch |
[RHSA-2015:2086], [CVE-2015-4734], [CVE-2015-4803], [CVE-2015-4805], [CVE-2015-4806], [CVE-2015-4835], [CVE-2015-4842], [CVE-2015-4843], [CVE-2015-4844], [CVE-2015-4860], [CVE-2015-4872], [CVE-2015-4881], [CVE-2015-4882], [CVE-2015-4883], [CVE-2015-4893], [CVE-2015-4903], [CVE-2015-4911] |
RHSA-2015:2086: java-1.6.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20152079 |
false |
patch |
[RHSA-2015:2079], [CVE-2014-8484], [CVE-2014-8485], [CVE-2014-8501], [CVE-2014-8502], [CVE-2014-8503], [CVE-2014-8504], [CVE-2014-8737], [CVE-2014-8738] |
RHSA-2015:2079: binutils security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20152078 |
false |
patch |
[RHSA-2015:2078], [CVE-2015-5288], [CVE-2015-5289] |
RHSA-2015:2078: postgresql security update (Moderate) |
| oval:com.redhat.rhsa:def:20151982 |
false |
patch |
[RHSA-2015:1982], [CVE-2015-4513], [CVE-2015-7188], [CVE-2015-7189], [CVE-2015-7193], [CVE-2015-7194], [CVE-2015-7196], [CVE-2015-7197], [CVE-2015-7198], [CVE-2015-7199], [CVE-2015-7200] |
RHSA-2015:1982: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20151981 |
false |
patch |
[RHSA-2015:1981], [CVE-2015-7181], [CVE-2015-7182], [CVE-2015-7183] |
RHSA-2015:1981: nss, nss-util, and nspr security update (Critical) |
| oval:com.redhat.rhsa:def:20151979 |
false |
patch |
[RHSA-2015:1979], [CVE-2015-3240] |
RHSA-2015:1979: libreswan security and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20151978 |
false |
patch |
[RHSA-2015:1978], [CVE-2014-8559], [CVE-2015-5156] |
RHSA-2015:1978: kernel security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20151977 |
false |
patch |
[RHSA-2015:1977], [CVE-2014-8559], [CVE-2015-5156] |
RHSA-2015:1977: kernel-rt security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20151943 |
false |
patch |
[RHSA-2015:1943], [CVE-2015-1779] |
RHSA-2015:1943: qemu-kvm security update (Moderate) |
| oval:com.redhat.rhsa:def:20151930 |
false |
patch |
[RHSA-2015:1930], [CVE-2015-5300], [CVE-2015-7704] |
RHSA-2015:1930: ntp security update (Important) |
| oval:com.redhat.rhsa:def:20151920 |
false |
patch |
[RHSA-2015:1920], [CVE-2015-4734], [CVE-2015-4803], [CVE-2015-4805], [CVE-2015-4806], [CVE-2015-4835], [CVE-2015-4840], [CVE-2015-4842], [CVE-2015-4843], [CVE-2015-4844], [CVE-2015-4860], [CVE-2015-4872], [CVE-2015-4881], [CVE-2015-4882], [CVE-2015-4883], [CVE-2015-4893], [CVE-2015-4903], [CVE-2015-4911] |
RHSA-2015:1920: java-1.7.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20151919 |
false |
patch |
[RHSA-2015:1919], [CVE-2015-4734], [CVE-2015-4803], [CVE-2015-4805], [CVE-2015-4806], [CVE-2015-4835], [CVE-2015-4840], [CVE-2015-4842], [CVE-2015-4843], [CVE-2015-4844], [CVE-2015-4860], [CVE-2015-4868], [CVE-2015-4872], [CVE-2015-4881], [CVE-2015-4882], [CVE-2015-4883], [CVE-2015-4893], [CVE-2015-4903], [CVE-2015-4911] |
RHSA-2015:1919: java-1.8.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20151917 |
false |
patch |
[RHSA-2015:1917], [CVE-2015-0848], [CVE-2015-4588], [CVE-2015-4695], [CVE-2015-4696] |
RHSA-2015:1917: libwmf security update (Important) |
| oval:com.redhat.rhsa:def:20151890 |
false |
patch |
[RHSA-2015:1890], [CVE-2015-5260], [CVE-2015-5261] |
RHSA-2015:1890: spice security update (Important) |
| oval:com.redhat.rhsa:def:20151852 |
false |
patch |
[RHSA-2015:1852], [CVE-2015-4500], [CVE-2015-4509], [CVE-2015-4517], [CVE-2015-4519], [CVE-2015-4520], [CVE-2015-4521], [CVE-2015-4522], [CVE-2015-7174], [CVE-2015-7175], [CVE-2015-7176], [CVE-2015-7177], [CVE-2015-7180] |
RHSA-2015:1852: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20151840 |
false |
patch |
[RHSA-2015:1840], [CVE-2015-6908] |
RHSA-2015:1840: openldap security update (Important) |
| oval:com.redhat.rhsa:def:20151834 |
false |
patch |
[RHSA-2015:1834], [CVE-2015-4500], [CVE-2015-4506], [CVE-2015-4509], [CVE-2015-4511], [CVE-2015-4517], [CVE-2015-4519], [CVE-2015-4520], [CVE-2015-4521], [CVE-2015-4522], [CVE-2015-7174], [CVE-2015-7175], [CVE-2015-7176], [CVE-2015-7177], [CVE-2015-7180] |
RHSA-2015:1834: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20151793 |
false |
patch |
[RHSA-2015:1793], [CVE-2015-5165] |
RHSA-2015:1793: qemu-kvm security fix update (Moderate) |
| oval:com.redhat.rhsa:def:20151788 |
false |
patch |
[RHSA-2015:1788], [CVE-2014-9585], [CVE-2015-0275], [CVE-2015-1333], [CVE-2015-3212], [CVE-2015-4700], [CVE-2015-5364], [CVE-2015-5366] |
RHSA-2015:1788: kernel-rt security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20151778 |
false |
patch |
[RHSA-2015:1778], [CVE-2014-9585], [CVE-2015-0275], [CVE-2015-1333], [CVE-2015-3212], [CVE-2015-4700], [CVE-2015-5364], [CVE-2015-5366] |
RHSA-2015:1778: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20151742 |
false |
patch |
[RHSA-2015:1742], [CVE-2015-0248], [CVE-2015-0251], [CVE-2015-3184], [CVE-2015-3187] |
RHSA-2015:1742: subversion security update (Moderate) |
| oval:com.redhat.rhsa:def:20151741 |
false |
patch |
[RHSA-2015:1741], [CVE-2015-3281] |
RHSA-2015:1741: haproxy security update (Important) |
| oval:com.redhat.rhsa:def:20151714 |
false |
patch |
[RHSA-2015:1714], [CVE-2015-3247] |
RHSA-2015:1714: spice security update (Important) |
| oval:com.redhat.rhsa:def:20151708 |
false |
patch |
[RHSA-2015:1708], [CVE-2015-1802], [CVE-2015-1803], [CVE-2015-1804] |
RHSA-2015:1708: libXfont security update (Important) |
| oval:com.redhat.rhsa:def:20151705 |
false |
patch |
[RHSA-2015:1705], [CVE-2015-5722] |
RHSA-2015:1705: bind security update (Important) |
| oval:com.redhat.rhsa:def:20151700 |
false |
patch |
[RHSA-2015:1700], [CVE-2015-5189], [CVE-2015-5190] |
RHSA-2015:1700: pcs security update (Important) |
| oval:com.redhat.rhsa:def:20151699 |
false |
patch |
[RHSA-2015:1699], [CVE-2015-2730] |
RHSA-2015:1699: nss-softokn security update (Moderate) |
| oval:com.redhat.rhsa:def:20151695 |
false |
patch |
[RHSA-2015:1695], [CVE-2015-0254] |
RHSA-2015:1695: jakarta-taglibs-standard security update (Important) |
| oval:com.redhat.rhsa:def:20151694 |
false |
patch |
[RHSA-2015:1694], [CVE-2015-4491] |
RHSA-2015:1694: gdk-pixbuf2 security update (Moderate) |
| oval:com.redhat.rhsa:def:20151693 |
false |
patch |
[RHSA-2015:1693], [CVE-2015-4497], [CVE-2015-4498] |
RHSA-2015:1693: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20151682 |
false |
patch |
[RHSA-2015:1682], [CVE-2015-4473], [CVE-2015-4487], [CVE-2015-4488], [CVE-2015-4489], [CVE-2015-4491] |
RHSA-2015:1682: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20151667 |
false |
patch |
[RHSA-2015:1667], [CVE-2015-3183], [CVE-2015-3185] |
RHSA-2015:1667: httpd security update (Moderate) |
| oval:com.redhat.rhsa:def:20151665 |
false |
patch |
[RHSA-2015:1665], [CVE-2015-0433], [CVE-2015-0441], [CVE-2015-0499], [CVE-2015-0501], [CVE-2015-0505], [CVE-2015-2568], [CVE-2015-2571], [CVE-2015-2573], [CVE-2015-2582], [CVE-2015-2620], [CVE-2015-2643], [CVE-2015-2648], [CVE-2015-3152], [CVE-2015-4737], [CVE-2015-4752], [CVE-2015-4757], [CVE-2015-4864] |
RHSA-2015:1665: mariadb security update (Moderate) |
| oval:com.redhat.rhsa:def:20151640 |
false |
patch |
[RHSA-2015:1640], [CVE-2015-3238] |
RHSA-2015:1640: pam security update (Moderate) |
| oval:com.redhat.rhsa:def:20151636 |
false |
patch |
[RHSA-2015:1636], [CVE-2015-5621], [CVE-2018-1000116] |
RHSA-2015:1636: net-snmp security update (Moderate) |
| oval:com.redhat.rhsa:def:20151635 |
false |
patch |
[RHSA-2015:1635], [CVE-2015-3414], [CVE-2015-3415], [CVE-2015-3416] |
RHSA-2015:1635: sqlite security update (Moderate) |
| oval:com.redhat.rhsa:def:20151586 |
false |
patch |
[RHSA-2015:1586], [CVE-2015-4473], [CVE-2015-4475], [CVE-2015-4478], [CVE-2015-4479], [CVE-2015-4480], [CVE-2015-4484], [CVE-2015-4485], [CVE-2015-4486], [CVE-2015-4487], [CVE-2015-4488], [CVE-2015-4489], [CVE-2015-4491], [CVE-2015-4492], [CVE-2015-4493] |
RHSA-2015:1586: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20151581 |
false |
patch |
[RHSA-2015:1581], [CVE-2015-4495] |
RHSA-2015:1581: firefox security update (Important) |
| oval:com.redhat.rhsa:def:20151565 |
false |
patch |
[RHSA-2015:1565], [CVE-2014-9715], [CVE-2015-2666], [CVE-2015-2922], [CVE-2015-3636] |
RHSA-2015:1565: kernel-rt security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20151534 |
false |
patch |
[RHSA-2015:1534], [CVE-2014-9715], [CVE-2015-2666], [CVE-2015-2922], [CVE-2015-3636] |
RHSA-2015:1534: kernel security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20151526 |
false |
patch |
[RHSA-2015:1526], [CVE-2015-2590], [CVE-2015-2601], [CVE-2015-2621], [CVE-2015-2625], [CVE-2015-2628], [CVE-2015-2632], [CVE-2015-2808], [CVE-2015-4000], [CVE-2015-4731], [CVE-2015-4732], [CVE-2015-4733], [CVE-2015-4748], [CVE-2015-4749], [CVE-2015-4760] |
RHSA-2015:1526: java-1.6.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20151513 |
false |
patch |
[RHSA-2015:1513], [CVE-2015-5477] |
RHSA-2015:1513: bind security update (Important) |
| oval:com.redhat.rhsa:def:20151510 |
false |
patch |
[RHSA-2015:1510], [CVE-2015-3213] |
RHSA-2015:1510: clutter security update (Moderate) |
| oval:com.redhat.rhsa:def:20151507 |
false |
patch |
[RHSA-2015:1507], [CVE-2015-3214], [CVE-2015-5154] |
RHSA-2015:1507: qemu-kvm security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20151483 |
false |
patch |
[RHSA-2015:1483], [CVE-2015-3245], [CVE-2015-3246] |
RHSA-2015:1483: libuser security update (Important) |
| oval:com.redhat.rhsa:def:20151455 |
false |
patch |
[RHSA-2015:1455], [CVE-2015-2724], [CVE-2015-2725], [CVE-2015-2731], [CVE-2015-2734], [CVE-2015-2735], [CVE-2015-2736], [CVE-2015-2737], [CVE-2015-2738], [CVE-2015-2739], [CVE-2015-2740], [CVE-2015-2741] |
RHSA-2015:1455: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20151443 |
false |
patch |
[RHSA-2015:1443], [CVE-2015-4620] |
RHSA-2015:1443: bind security update (Important) |
| oval:com.redhat.rhsa:def:20151229 |
false |
patch |
[RHSA-2015:1229], [CVE-2015-2590], [CVE-2015-2601], [CVE-2015-2621], [CVE-2015-2625], [CVE-2015-2628], [CVE-2015-2632], [CVE-2015-2808], [CVE-2015-4000], [CVE-2015-4731], [CVE-2015-4732], [CVE-2015-4733], [CVE-2015-4748], [CVE-2015-4749], [CVE-2015-4760] |
RHSA-2015:1229: java-1.7.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20151228 |
false |
patch |
[RHSA-2015:1228], [CVE-2015-2590], [CVE-2015-2601], [CVE-2015-2621], [CVE-2015-2625], [CVE-2015-2628], [CVE-2015-2632], [CVE-2015-2659], [CVE-2015-2808], [CVE-2015-3149], [CVE-2015-4000], [CVE-2015-4731], [CVE-2015-4732], [CVE-2015-4733], [CVE-2015-4748], [CVE-2015-4749], [CVE-2015-4760] |
RHSA-2015:1228: java-1.8.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20151207 |
false |
patch |
[RHSA-2015:1207], [CVE-2015-2722], [CVE-2015-2724], [CVE-2015-2725], [CVE-2015-2727], [CVE-2015-2728], [CVE-2015-2729], [CVE-2015-2731], [CVE-2015-2733], [CVE-2015-2734], [CVE-2015-2735], [CVE-2015-2736], [CVE-2015-2737], [CVE-2015-2738], [CVE-2015-2739], [CVE-2015-2740], [CVE-2015-2741], [CVE-2015-2743] |
RHSA-2015:1207: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20151194 |
false |
patch |
[RHSA-2015:1194], [CVE-2015-3165], [CVE-2015-3166], [CVE-2015-3167] |
RHSA-2015:1194: postgresql security update (Moderate) |
| oval:com.redhat.rhsa:def:20151193 |
false |
patch |
[RHSA-2015:1193], [CVE-2015-0252] |
RHSA-2015:1193: xerces-c security update (Moderate) |
| oval:com.redhat.rhsa:def:20151185 |
false |
patch |
[RHSA-2015:1185], [CVE-2015-2721], [CVE-2015-4000] |
RHSA-2015:1185: nss security update (Moderate) |
| oval:com.redhat.rhsa:def:20151154 |
false |
patch |
[RHSA-2015:1154], [CVE-2015-3204] |
RHSA-2015:1154: libreswan security, bug fix and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20151153 |
false |
patch |
[RHSA-2015:1153], [CVE-2015-2775] |
RHSA-2015:1153: mailman security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20151139 |
false |
patch |
[RHSA-2015:1139], [CVE-2014-9420], [CVE-2014-9529], [CVE-2014-9584], [CVE-2015-1573], [CVE-2015-1593], [CVE-2015-1805], [CVE-2015-2830] |
RHSA-2015:1139: kernel-rt security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20151137 |
false |
patch |
[RHSA-2015:1137], [CVE-2014-9420], [CVE-2014-9529], [CVE-2014-9584], [CVE-2015-1573], [CVE-2015-1593], [CVE-2015-1805], [CVE-2015-2830] |
RHSA-2015:1137: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20151135 |
false |
patch |
[RHSA-2015:1135], [CVE-2014-8142], [CVE-2014-9652], [CVE-2014-9705], [CVE-2014-9709], [CVE-2015-0231], [CVE-2015-0232], [CVE-2015-0273], [CVE-2015-2301], [CVE-2015-2348], [CVE-2015-2783], [CVE-2015-2787], [CVE-2015-3307], [CVE-2015-3329], [CVE-2015-3330], [CVE-2015-3411], [CVE-2015-3412], [CVE-2015-4021], [CVE-2015-4022], [CVE-2015-4024], [CVE-2015-4025], [CVE-2015-4026], [CVE-2015-4147], [CVE-2015-4148], [CVE-2015-4598], [CVE-2015-4599], [CVE-2015-4600], [CVE-2015-4601], [CVE-2015-4602], [CVE-2015-4603], [CVE-2015-4604], [CVE-2015-4605], [CVE-2015-4643] |
RHSA-2015:1135: php security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20151123 |
false |
patch |
[RHSA-2015:1123], [CVE-2014-9679], [CVE-2015-1158], [CVE-2015-1159] |
RHSA-2015:1123: cups security update (Important) |
| oval:com.redhat.rhsa:def:20151115 |
false |
patch |
[RHSA-2015:1115], [CVE-2014-8176], [CVE-2015-1789], [CVE-2015-1790], [CVE-2015-1791], [CVE-2015-1792], [CVE-2015-3216] |
RHSA-2015:1115: openssl security update (Moderate) |
| oval:com.redhat.rhsa:def:20151090 |
false |
patch |
[RHSA-2015:1090], [CVE-2015-1863], [CVE-2015-4142] |
RHSA-2015:1090: wpa_supplicant security and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20151083 |
false |
patch |
[RHSA-2015:1083], [CVE-2015-1869], [CVE-2015-1870], [CVE-2015-3142], [CVE-2015-3147], [CVE-2015-3150], [CVE-2015-3151], [CVE-2015-3159], [CVE-2015-3315] |
RHSA-2015:1083: abrt security update (Important) |
| oval:com.redhat.rhsa:def:20151072 |
false |
patch |
[RHSA-2015:1072], [CVE-2015-4000] |
RHSA-2015:1072: openssl security update (Moderate) |
| oval:com.redhat.rhsa:def:20151012 |
false |
patch |
[RHSA-2015:1012], [CVE-2015-2708], [CVE-2015-2710], [CVE-2015-2713], [CVE-2015-2716] |
RHSA-2015:1012: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20150999 |
false |
patch |
[RHSA-2015:0999], [CVE-2015-3456] |
RHSA-2015:0999: qemu-kvm security update (Important) |
| oval:com.redhat.rhsa:def:20150988 |
false |
patch |
[RHSA-2015:0988], [CVE-2015-0797], [CVE-2015-2708], [CVE-2015-2710], [CVE-2015-2713], [CVE-2015-2716], [CVE-2015-4496] |
RHSA-2015:0988: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20150987 |
false |
patch |
[RHSA-2015:0987], [CVE-2015-3331] |
RHSA-2015:0987: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20150986 |
false |
patch |
[RHSA-2015:0986], [CVE-2015-0267] |
RHSA-2015:0986: kexec-tools security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20150983 |
false |
patch |
[RHSA-2015:0983], [CVE-2014-0227] |
RHSA-2015:0983: tomcat security update (Moderate) |
| oval:com.redhat.rhsa:def:20150981 |
false |
patch |
[RHSA-2015:0981], [CVE-2015-3331] |
RHSA-2015:0981: kernel-rt security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20150980 |
false |
patch |
[RHSA-2015:0980], [CVE-2015-1848], [CVE-2015-3983] |
RHSA-2015:0980: pcs security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20150895 |
false |
patch |
[RHSA-2015:0895], [CVE-2015-1854] |
RHSA-2015:0895: 389-ds-base security update (Important) |
| oval:com.redhat.rhsa:def:20150809 |
false |
patch |
[RHSA-2015:0809], [CVE-2005-1080], [CVE-2015-0460], [CVE-2015-0469], [CVE-2015-0470], [CVE-2015-0477], [CVE-2015-0478], [CVE-2015-0480], [CVE-2015-0488] |
RHSA-2015:0809: java-1.8.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20150808 |
false |
patch |
[RHSA-2015:0808], [CVE-2005-1080], [CVE-2015-0460], [CVE-2015-0469], [CVE-2015-0477], [CVE-2015-0478], [CVE-2015-0480], [CVE-2015-0488] |
RHSA-2015:0808: java-1.6.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20150806 |
false |
patch |
[RHSA-2015:0806], [CVE-2005-1080], [CVE-2015-0460], [CVE-2015-0469], [CVE-2015-0477], [CVE-2015-0478], [CVE-2015-0480], [CVE-2015-0488] |
RHSA-2015:0806: java-1.7.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20150797 |
false |
patch |
[RHSA-2015:0797], [CVE-2015-0255] |
RHSA-2015:0797: xorg-x11-server security update (Moderate) |
| oval:com.redhat.rhsa:def:20150771 |
false |
patch |
[RHSA-2015:0771], [CVE-2015-0801], [CVE-2015-0807], [CVE-2015-0813], [CVE-2015-0815], [CVE-2015-0816] |
RHSA-2015:0771: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20150767 |
false |
patch |
[RHSA-2015:0767], [CVE-2014-8962], [CVE-2014-9028] |
RHSA-2015:0767: flac security update (Important) |
| oval:com.redhat.rhsa:def:20150766 |
false |
patch |
[RHSA-2015:0766], [CVE-2015-0801], [CVE-2015-0807], [CVE-2015-0813], [CVE-2015-0815], [CVE-2015-0816] |
RHSA-2015:0766: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20150750 |
false |
patch |
[RHSA-2015:0750], [CVE-2014-8161], [CVE-2015-0241], [CVE-2015-0243], [CVE-2015-0244] |
RHSA-2015:0750: postgresql security update (Moderate) |
| oval:com.redhat.rhsa:def:20150749 |
false |
patch |
[RHSA-2015:0749], [CVE-2014-0191] |
RHSA-2015:0749: libxml2 security update (Moderate) |
| oval:com.redhat.rhsa:def:20150729 |
false |
patch |
[RHSA-2015:0729], [CVE-2015-1815] |
RHSA-2015:0729: setroubleshoot security update (Important) |
| oval:com.redhat.rhsa:def:20150728 |
false |
patch |
[RHSA-2015:0728], [CVE-2015-0283], [CVE-2015-1827] |
RHSA-2015:0728: ipa and slapi-nis security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20150727 |
false |
patch |
[RHSA-2015:0727], [CVE-2014-8159], [CVE-2015-1421] |
RHSA-2015:0727: kernel-rt security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20150726 |
false |
patch |
[RHSA-2015:0726], [CVE-2014-8159], [CVE-2015-1421] |
RHSA-2015:0726: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20150718 |
false |
patch |
[RHSA-2015:0718], [CVE-2015-0817], [CVE-2015-0818] |
RHSA-2015:0718: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20150716 |
false |
patch |
[RHSA-2015:0716], [CVE-2015-0209], [CVE-2015-0286], [CVE-2015-0287], [CVE-2015-0288], [CVE-2015-0289], [CVE-2015-0292], [CVE-2015-0293], [CVE-2016-0703], [CVE-2016-0704] |
RHSA-2015:0716: openssl security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20150700 |
false |
patch |
[RHSA-2015:0700], [CVE-2014-8139], [CVE-2014-8140], [CVE-2014-8141], [CVE-2014-9636] |
RHSA-2015:0700: unzip security update (Moderate) |
| oval:com.redhat.rhsa:def:20150696 |
false |
patch |
[RHSA-2015:0696], [CVE-2014-9657], [CVE-2014-9658], [CVE-2014-9660], [CVE-2014-9661], [CVE-2014-9663], [CVE-2014-9664], [CVE-2014-9667], [CVE-2014-9669], [CVE-2014-9670], [CVE-2014-9671], [CVE-2014-9673], [CVE-2014-9674], [CVE-2014-9675] |
RHSA-2015:0696: freetype security update (Important) |
| oval:com.redhat.rhsa:def:20150672 |
false |
patch |
[RHSA-2015:0672], [CVE-2015-1349] |
RHSA-2015:0672: bind security update (Moderate) |
| oval:com.redhat.rhsa:def:20150642 |
false |
patch |
[RHSA-2015:0642], [CVE-2015-0822], [CVE-2015-0827], [CVE-2015-0831], [CVE-2015-0836] |
RHSA-2015:0642: thunderbird security update (Important) |
| oval:com.redhat.rhsa:def:20150535 |
false |
patch |
[RHSA-2015:0535], [CVE-2014-7300] |
RHSA-2015:0535: GNOME Shell security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20150442 |
false |
patch |
[RHSA-2015:0442], [CVE-2010-5312], [CVE-2012-6662] |
RHSA-2015:0442: ipa security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20150439 |
false |
patch |
[RHSA-2015:0439], [CVE-2014-4341], [CVE-2014-4342], [CVE-2014-4343], [CVE-2014-4344], [CVE-2014-4345], [CVE-2014-5352], [CVE-2014-5353], [CVE-2014-9421], [CVE-2014-9422], [CVE-2014-9423] |
RHSA-2015:0439: krb5 security, bug fix and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20150430 |
false |
patch |
[RHSA-2015:0430], [CVE-2014-0189] |
RHSA-2015:0430: virt-who security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20150425 |
false |
patch |
[RHSA-2015:0425], [CVE-2014-2653], [CVE-2014-9278] |
RHSA-2015:0425: openssh security, bug fix and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20150416 |
false |
patch |
[RHSA-2015:0416], [CVE-2014-8105], [CVE-2014-8112] |
RHSA-2015:0416: 389-ds-base security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20150384 |
false |
patch |
[RHSA-2015:0384], [CVE-2014-4040] |
RHSA-2015:0384: powerpc-utils security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20150383 |
false |
patch |
[RHSA-2015:0383], [CVE-2014-4038], [CVE-2014-4039] |
RHSA-2015:0383: ppc64-diag security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20150377 |
false |
patch |
[RHSA-2015:0377], [CVE-2014-0247], [CVE-2014-3575], [CVE-2014-3693] |
RHSA-2015:0377: libreoffice security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20150349 |
false |
patch |
[RHSA-2015:0349], [CVE-2014-3640], [CVE-2014-7815], [CVE-2014-7840], [CVE-2014-8106] |
RHSA-2015:0349: qemu-kvm security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20150330 |
false |
patch |
[RHSA-2015:0330], [CVE-2014-8964] |
RHSA-2015:0330: pcre security and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20150327 |
false |
patch |
[RHSA-2015:0327], [CVE-2014-6040], [CVE-2014-8121] |
RHSA-2015:0327: glibc security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20150325 |
false |
patch |
[RHSA-2015:0325], [CVE-2013-5704], [CVE-2014-3581] |
RHSA-2015:0325: httpd security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20150323 |
false |
patch |
[RHSA-2015:0323], [CVE-2014-8136], [CVE-2015-0236] |
RHSA-2015:0323: libvirt security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20150301 |
false |
patch |
[RHSA-2015:0301], [CVE-2014-9273] |
RHSA-2015:0301: hivex security, bug fix, and enhancement update (Moderate) |
| oval:com.redhat.rhsa:def:20150290 |
false |
patch |
[RHSA-2015:0290], [CVE-2014-3690], [CVE-2014-3940], [CVE-2014-7825], [CVE-2014-7826], [CVE-2014-8086], [CVE-2014-8160], [CVE-2014-8172], [CVE-2014-8173], [CVE-2014-8709], [CVE-2014-8884], [CVE-2015-0274] |
RHSA-2015:0290: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20150265 |
false |
patch |
[RHSA-2015:0265], [CVE-2015-0822], [CVE-2015-0827], [CVE-2015-0831], [CVE-2015-0836] |
RHSA-2015:0265: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20150252 |
false |
patch |
[RHSA-2015:0252], [CVE-2015-0240] |
RHSA-2015:0252: samba security update (Important) |
| oval:com.redhat.rhsa:def:20150166 |
false |
patch |
[RHSA-2015:0166], [CVE-2014-3528], [CVE-2014-3580], [CVE-2014-8108] |
RHSA-2015:0166: subversion security update (Moderate) |
| oval:com.redhat.rhsa:def:20150118 |
false |
patch |
[RHSA-2015:0118], [CVE-2014-6568], [CVE-2015-0374], [CVE-2015-0381], [CVE-2015-0382], [CVE-2015-0391], [CVE-2015-0411], [CVE-2015-0432] |
RHSA-2015:0118: mariadb security update (Moderate) |
| oval:com.redhat.rhsa:def:20150102 |
false |
patch |
[RHSA-2015:0102], [CVE-2014-4171], [CVE-2014-5471], [CVE-2014-5472], [CVE-2014-7145], [CVE-2014-7822], [CVE-2014-7841] |
RHSA-2015:0102: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20150100 |
false |
patch |
[RHSA-2015:0100], [CVE-2014-9130] |
RHSA-2015:0100: libyaml security update (Moderate) |
| oval:com.redhat.rhsa:def:20150092 |
false |
patch |
[RHSA-2015:0092], [CVE-2015-0235] |
RHSA-2015:0092: glibc security update (Critical) |
| oval:com.redhat.rhsa:def:20150085 |
false |
patch |
[RHSA-2015:0085], [CVE-2014-3566], [CVE-2014-6585], [CVE-2014-6587], [CVE-2014-6591], [CVE-2014-6593], [CVE-2014-6601], [CVE-2015-0383], [CVE-2015-0395], [CVE-2015-0407], [CVE-2015-0408], [CVE-2015-0410], [CVE-2015-0412] |
RHSA-2015:0085: java-1.6.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20150074 |
false |
patch |
[RHSA-2015:0074], [CVE-2014-8157], [CVE-2014-8158] |
RHSA-2015:0074: jasper security update (Important) |
| oval:com.redhat.rhsa:def:20150067 |
false |
patch |
[RHSA-2015:0067], [CVE-2014-3566], [CVE-2014-6585], [CVE-2014-6587], [CVE-2014-6591], [CVE-2014-6593], [CVE-2014-6601], [CVE-2015-0383], [CVE-2015-0395], [CVE-2015-0407], [CVE-2015-0408], [CVE-2015-0410], [CVE-2015-0412] |
RHSA-2015:0067: java-1.7.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20150066 |
false |
patch |
[RHSA-2015:0066], [CVE-2014-3570], [CVE-2014-3571], [CVE-2014-3572], [CVE-2014-8275], [CVE-2015-0204], [CVE-2015-0205], [CVE-2015-0206] |
RHSA-2015:0066: openssl security update (Moderate) |
| oval:com.redhat.rhsa:def:20150046 |
false |
patch |
[RHSA-2015:0046], [CVE-2014-8634], [CVE-2014-8638], [CVE-2014-8639], [CVE-2014-8641] |
RHSA-2015:0046: firefox security and bug fix update (Critical) |
| oval:com.redhat.rhsa:def:20150008 |
false |
patch |
[RHSA-2015:0008], [CVE-2014-7823] |
RHSA-2015:0008: libvirt security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20142024 |
false |
patch |
[RHSA-2014:2024], [CVE-2014-9293], [CVE-2014-9294], [CVE-2014-9295], [CVE-2014-9296] |
RHSA-2014:2024: ntp security update (Important) |
| oval:com.redhat.rhsa:def:20142023 |
false |
patch |
[RHSA-2014:2023], [CVE-2014-7817] |
RHSA-2014:2023: glibc security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20142021 |
false |
patch |
[RHSA-2014:2021], [CVE-2014-8137], [CVE-2014-8138], [CVE-2014-9029] |
RHSA-2014:2021: jasper security update (Important) |
| oval:com.redhat.rhsa:def:20142010 |
false |
patch |
[RHSA-2014:2010], [CVE-2014-9322] |
RHSA-2014:2010: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20141999 |
false |
patch |
[RHSA-2014:1999], [CVE-2004-2771], [CVE-2014-7844] |
RHSA-2014:1999: mailx security update (Moderate) |
| oval:com.redhat.rhsa:def:20141984 |
false |
patch |
[RHSA-2014:1984], [CVE-2014-8500] |
RHSA-2014:1984: bind security update (Important) |
| oval:com.redhat.rhsa:def:20141983 |
false |
patch |
[RHSA-2014:1983], [CVE-2014-8091], [CVE-2014-8092], [CVE-2014-8093], [CVE-2014-8094], [CVE-2014-8095], [CVE-2014-8096], [CVE-2014-8097], [CVE-2014-8098], [CVE-2014-8099], [CVE-2014-8100], [CVE-2014-8101], [CVE-2014-8102], [CVE-2014-8103] |
RHSA-2014:1983: xorg-x11-server security update (Important) |
| oval:com.redhat.rhsa:def:20141976 |
false |
patch |
[RHSA-2014:1976], [CVE-2013-6435], [CVE-2014-8118] |
RHSA-2014:1976: rpm security update (Important) |
| oval:com.redhat.rhsa:def:20141971 |
false |
patch |
[RHSA-2014:1971], [CVE-2013-2929], [CVE-2014-1739], [CVE-2014-3181], [CVE-2014-3182], [CVE-2014-3184], [CVE-2014-3185], [CVE-2014-3186], [CVE-2014-3631], [CVE-2014-3673], [CVE-2014-3687], [CVE-2014-3688], [CVE-2014-4027], [CVE-2014-4652], [CVE-2014-4654], [CVE-2014-4655], [CVE-2014-4656], [CVE-2014-5045], [CVE-2014-6410] |
RHSA-2014:1971: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20141956 |
false |
patch |
[RHSA-2014:1956], [CVE-2014-3686] |
RHSA-2014:1956: wpa_supplicant security update (Moderate) |
| oval:com.redhat.rhsa:def:20141948 |
false |
patch |
[RHSA-2014:1948] |
RHSA-2014:1948: nss, nss-util, and nss-softokn security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20141919 |
false |
patch |
[RHSA-2014:1919], [CVE-2014-1587], [CVE-2014-1590], [CVE-2014-1592], [CVE-2014-1593], [CVE-2014-1594] |
RHSA-2014:1919: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20141912 |
false |
patch |
[RHSA-2014:1912], [CVE-2014-4975], [CVE-2014-8080], [CVE-2014-8090] |
RHSA-2014:1912: ruby security update (Moderate) |
| oval:com.redhat.rhsa:def:20141870 |
false |
patch |
[RHSA-2014:1870], [CVE-2014-0209], [CVE-2014-0210], [CVE-2014-0211] |
RHSA-2014:1870: libXfont security update (Important) |
| oval:com.redhat.rhsa:def:20141861 |
false |
patch |
[RHSA-2014:1861], [CVE-2012-5615], [CVE-2014-2494], [CVE-2014-4207], [CVE-2014-4243], [CVE-2014-4258], [CVE-2014-4260], [CVE-2014-4274], [CVE-2014-4287], [CVE-2014-6463], [CVE-2014-6464], [CVE-2014-6469], [CVE-2014-6484], [CVE-2014-6505], [CVE-2014-6507], [CVE-2014-6520], [CVE-2014-6530], [CVE-2014-6551], [CVE-2014-6555], [CVE-2014-6559] |
RHSA-2014:1861: mariadb security update (Important) |
| oval:com.redhat.rhsa:def:20141846 |
false |
patch |
[RHSA-2014:1846], [CVE-2014-8564] |
RHSA-2014:1846: gnutls security update (Moderate) |
| oval:com.redhat.rhsa:def:20141827 |
false |
patch |
[RHSA-2014:1827], [CVE-2014-6053], [CVE-2014-6054], [CVE-2014-6055] |
RHSA-2014:1827: kdenetwork security update (Moderate) |
| oval:com.redhat.rhsa:def:20141826 |
false |
patch |
[RHSA-2014:1826], [CVE-2014-6051], [CVE-2014-6052], [CVE-2014-6053], [CVE-2014-6054], [CVE-2014-6055] |
RHSA-2014:1826: libvncserver security update (Moderate) |
| oval:com.redhat.rhsa:def:20141801 |
false |
patch |
[RHSA-2014:1801], [CVE-2014-3675], [CVE-2014-3676], [CVE-2014-3677] |
RHSA-2014:1801: shim security update (Moderate) |
| oval:com.redhat.rhsa:def:20141795 |
false |
patch |
[RHSA-2014:1795], [CVE-2014-4337], [CVE-2014-4338] |
RHSA-2014:1795: cups-filters security update (Moderate) |
| oval:com.redhat.rhsa:def:20141767 |
false |
patch |
[RHSA-2014:1767], [CVE-2014-3668], [CVE-2014-3669], [CVE-2014-3670], [CVE-2014-3710] |
RHSA-2014:1767: php security update (Important) |
| oval:com.redhat.rhsa:def:20141764 |
false |
patch |
[RHSA-2014:1764], [CVE-2014-4877] |
RHSA-2014:1764: wget security update (Moderate) |
| oval:com.redhat.rhsa:def:20141724 |
false |
patch |
[RHSA-2014:1724], [CVE-2014-3611], [CVE-2014-3645], [CVE-2014-3646], [CVE-2014-4653], [CVE-2014-5077] |
RHSA-2014:1724: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20141676 |
false |
patch |
[RHSA-2014:1676], [CVE-2014-6421], [CVE-2014-6422], [CVE-2014-6423], [CVE-2014-6424], [CVE-2014-6425], [CVE-2014-6426], [CVE-2014-6427], [CVE-2014-6428], [CVE-2014-6429], [CVE-2014-6430], [CVE-2014-6431], [CVE-2014-6432] |
RHSA-2014:1676: wireshark security update (Moderate) |
| oval:com.redhat.rhsa:def:20141669 |
false |
patch |
[RHSA-2014:1669], [CVE-2014-3615] |
RHSA-2014:1669: qemu-kvm security and bug fix update (Low) |
| oval:com.redhat.rhsa:def:20141655 |
false |
patch |
[RHSA-2014:1655], [CVE-2014-3660] |
RHSA-2014:1655: libxml2 security update (Moderate) |
| oval:com.redhat.rhsa:def:20141652 |
false |
patch |
[RHSA-2014:1652], [CVE-2014-3513], [CVE-2014-3567] |
RHSA-2014:1652: openssl security update (Important) |
| oval:com.redhat.rhsa:def:20141635 |
false |
patch |
[RHSA-2014:1635], [CVE-2014-1574], [CVE-2014-1576], [CVE-2014-1577], [CVE-2014-1578], [CVE-2014-1581], [CVE-2014-1583] |
RHSA-2014:1635: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20141634 |
false |
patch |
[RHSA-2014:1634], [CVE-2014-6457], [CVE-2014-6502], [CVE-2014-6504], [CVE-2014-6506], [CVE-2014-6511], [CVE-2014-6512], [CVE-2014-6517], [CVE-2014-6519], [CVE-2014-6531], [CVE-2014-6558] |
RHSA-2014:1634: java-1.6.0-openjdk security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20141620 |
false |
patch |
[RHSA-2014:1620], [CVE-2014-6457], [CVE-2014-6502], [CVE-2014-6504], [CVE-2014-6506], [CVE-2014-6511], [CVE-2014-6512], [CVE-2014-6517], [CVE-2014-6519], [CVE-2014-6531], [CVE-2014-6558] |
RHSA-2014:1620: java-1.7.0-openjdk security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20141397 |
false |
patch |
[RHSA-2014:1397], [CVE-2014-3634] |
RHSA-2014:1397: rsyslog security update (Important) |
| oval:com.redhat.rhsa:def:20141359 |
false |
patch |
[RHSA-2014:1359], [CVE-2014-5033] |
RHSA-2014:1359: polkit-qt security update (Important) |
| oval:com.redhat.rhsa:def:20141352 |
false |
patch |
[RHSA-2014:1352], [CVE-2014-3633], [CVE-2014-3657] |
RHSA-2014:1352: libvirt security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20141327 |
false |
patch |
[RHSA-2014:1327], [CVE-2014-2497], [CVE-2014-3478], [CVE-2014-3538], [CVE-2014-3587], [CVE-2014-3597], [CVE-2014-4670], [CVE-2014-4698], [CVE-2014-5120] |
RHSA-2014:1327: php security update (Moderate) |
| oval:com.redhat.rhsa:def:20141319 |
false |
patch |
[RHSA-2014:1319], [CVE-2013-4002] |
RHSA-2014:1319: xerces-j2 security update (Moderate) |
| oval:com.redhat.rhsa:def:20141307 |
false |
patch |
[RHSA-2014:1307], [CVE-2014-1568] |
RHSA-2014:1307: nss security update (Important) |
| oval:com.redhat.rhsa:def:20141306 |
false |
patch |
[RHSA-2014:1306], [CVE-2014-7169], [CVE-2014-7186], [CVE-2014-7187] |
RHSA-2014:1306: bash security update (Important) |
| oval:com.redhat.rhsa:def:20141293 |
false |
patch |
[RHSA-2014:1293], [CVE-2014-6271] |
RHSA-2014:1293: bash security update (Critical) |
| oval:com.redhat.rhsa:def:20141292 |
false |
patch |
[RHSA-2014:1292], [CVE-2014-6269] |
RHSA-2014:1292: haproxy security update (Moderate) |
| oval:com.redhat.rhsa:def:20141281 |
false |
patch |
[RHSA-2014:1281], [CVE-2014-3917] |
RHSA-2014:1281: kernel security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20141172 |
false |
patch |
[RHSA-2014:1172], [CVE-2014-3618] |
RHSA-2014:1172: procmail security update (Important) |
| oval:com.redhat.rhsa:def:20141166 |
false |
patch |
[RHSA-2014:1166], [CVE-2014-3577] |
RHSA-2014:1166: jakarta-commons-httpclient security update (Important) |
| oval:com.redhat.rhsa:def:20141147 |
false |
patch |
[RHSA-2014:1147], [CVE-2014-3609] |
RHSA-2014:1147: squid security update (Important) |
| oval:com.redhat.rhsa:def:20141146 |
false |
patch |
[RHSA-2014:1146], [CVE-2014-3577] |
RHSA-2014:1146: httpcomponents-client security update (Important) |
| oval:com.redhat.rhsa:def:20141144 |
false |
patch |
[RHSA-2014:1144], [CVE-2014-1562], [CVE-2014-1567] |
RHSA-2014:1144: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20141110 |
false |
patch |
[RHSA-2014:1110], [CVE-2014-0475], [CVE-2014-5119] |
RHSA-2014:1110: glibc security update (Important) |
| oval:com.redhat.rhsa:def:20141091 |
false |
patch |
[RHSA-2014:1091], [CVE-2014-0240] |
RHSA-2014:1091: mod_wsgi security update (Important) |
| oval:com.redhat.rhsa:def:20141073 |
false |
patch |
[RHSA-2014:1073], [CVE-2014-1492] |
RHSA-2014:1073: nss, nss-util, nss-softokn security, bug fix, and enhancement update (Low) |
| oval:com.redhat.rhsa:def:20141052 |
false |
patch |
[RHSA-2014:1052], [CVE-2014-3505], [CVE-2014-3506], [CVE-2014-3507], [CVE-2014-3508], [CVE-2014-3509], [CVE-2014-3510], [CVE-2014-3511] |
RHSA-2014:1052: openssl security update (Moderate) |
| oval:com.redhat.rhsa:def:20141034 |
false |
patch |
[RHSA-2014:1034], [CVE-2014-0119] |
RHSA-2014:1034: tomcat security update (Low) |
| oval:com.redhat.rhsa:def:20141031 |
false |
patch |
[RHSA-2014:1031], [CVE-2014-3562] |
RHSA-2014:1031: 389-ds-base security update (Important) |
| oval:com.redhat.rhsa:def:20141023 |
false |
patch |
[RHSA-2014:1023], [CVE-2014-0181], [CVE-2014-2672], [CVE-2014-2673], [CVE-2014-2706], [CVE-2014-3534], [CVE-2014-4667] |
RHSA-2014:1023: kernel security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20141013 |
false |
patch |
[RHSA-2014:1013], [CVE-2013-7345], [CVE-2014-0207], [CVE-2014-0237], [CVE-2014-0238], [CVE-2014-3479], [CVE-2014-3480], [CVE-2014-3487], [CVE-2014-3515], [CVE-2014-4049], [CVE-2014-4721] |
RHSA-2014:1013: php security update (Moderate) |
| oval:com.redhat.rhsa:def:20141011 |
false |
patch |
[RHSA-2014:1011], [CVE-2014-3490] |
RHSA-2014:1011: resteasy-base security update (Moderate) |
| oval:com.redhat.rhsa:def:20141008 |
false |
patch |
[RHSA-2014:1008], [CVE-2014-3560] |
RHSA-2014:1008: samba security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20140927 |
false |
patch |
[RHSA-2014:0927], [CVE-2013-4148], [CVE-2013-4149], [CVE-2013-4150], [CVE-2013-4151], [CVE-2013-4527], [CVE-2013-4529], [CVE-2013-4535], [CVE-2013-4536], [CVE-2013-4541], [CVE-2013-4542], [CVE-2013-6399], [CVE-2014-0182], [CVE-2014-0222], [CVE-2014-0223], [CVE-2014-3461] |
RHSA-2014:0927: qemu-kvm security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20140923 |
false |
patch |
[RHSA-2014:0923], [CVE-2014-4699], [CVE-2014-4943] |
RHSA-2014:0923: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20140921 |
false |
patch |
[RHSA-2014:0921], [CVE-2013-4352], [CVE-2014-0117], [CVE-2014-0118], [CVE-2014-0226], [CVE-2014-0231] |
RHSA-2014:0921: httpd security update (Important) |
| oval:com.redhat.rhsa:def:20140919 |
false |
patch |
[RHSA-2014:0919], [CVE-2014-1547], [CVE-2014-1555], [CVE-2014-1556], [CVE-2014-1557] |
RHSA-2014:0919: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20140916 |
false |
patch |
[RHSA-2014:0916], [CVE-2014-1544] |
RHSA-2014:0916: nss and nspr security update (Critical) |
| oval:com.redhat.rhsa:def:20140914 |
false |
patch |
[RHSA-2014:0914], [CVE-2014-0179], [CVE-2014-5177] |
RHSA-2014:0914: libvirt security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20140907 |
false |
patch |
[RHSA-2014:0907], [CVE-2014-2490], [CVE-2014-4209], [CVE-2014-4216], [CVE-2014-4218], [CVE-2014-4219], [CVE-2014-4244], [CVE-2014-4252], [CVE-2014-4262], [CVE-2014-4263], [CVE-2014-4266] |
RHSA-2014:0907: java-1.6.0-openjdk security and bug fix update (Important) |
| oval:com.redhat.rhsa:def:20140889 |
false |
patch |
[RHSA-2014:0889], [CVE-2014-2483], [CVE-2014-2490], [CVE-2014-4209], [CVE-2014-4216], [CVE-2014-4218], [CVE-2014-4219], [CVE-2014-4221], [CVE-2014-4223], [CVE-2014-4244], [CVE-2014-4252], [CVE-2014-4262], [CVE-2014-4263], [CVE-2014-4266] |
RHSA-2014:0889: java-1.7.0-openjdk security update (Critical) |
| oval:com.redhat.rhsa:def:20140867 |
false |
patch |
[RHSA-2014:0867], [CVE-2014-0178], [CVE-2014-0244], [CVE-2014-3493] |
RHSA-2014:0867: samba security update (Moderate) |
| oval:com.redhat.rhsa:def:20140861 |
false |
patch |
[RHSA-2014:0861], [CVE-2014-4607] |
RHSA-2014:0861: lzo security update (Moderate) |
| oval:com.redhat.rhsa:def:20140827 |
false |
patch |
[RHSA-2014:0827], [CVE-2014-0075], [CVE-2014-0096], [CVE-2014-0099] |
RHSA-2014:0827: tomcat security update (Moderate) |
| oval:com.redhat.rhsa:def:20140790 |
false |
patch |
[RHSA-2014:0790], [CVE-2014-3430] |
RHSA-2014:0790: dovecot security update (Moderate) |
| oval:com.redhat.rhsa:def:20140786 |
false |
patch |
[RHSA-2014:0786], [CVE-2014-0206], [CVE-2014-1737], [CVE-2014-1738], [CVE-2014-2568], [CVE-2014-2851], [CVE-2014-3144], [CVE-2014-3145], [CVE-2014-3153] |
RHSA-2014:0786: kernel security, bug fix, and enhancement update (Important) |
| oval:com.redhat.rhsa:def:20140741 |
false |
patch |
[RHSA-2014:0741], [CVE-2014-1533], [CVE-2014-1538], [CVE-2014-1541] |
RHSA-2014:0741: firefox security update (Critical) |
| oval:com.redhat.rhsa:def:20140704 |
false |
patch |
[RHSA-2014:0704], [CVE-2014-2894] |
RHSA-2014:0704: qemu-kvm security and bug fix update (Moderate) |
| oval:com.redhat.rhsa:def:20140703 |
false |
patch |
[RHSA-2014:0703], [CVE-2013-6370], [CVE-2013-6371] |
RHSA-2014:0703: json-c security update (Moderate) |
| oval:com.redhat.rhsa:def:20140702 |
false |
patch |
[RHSA-2014:0702], [CVE-2014-0384], [CVE-2014-2419], [CVE-2014-2430], [CVE-2014-2431], [CVE-2014-2432], [CVE-2014-2436], [CVE-2014-2438], [CVE-2019-2481] |
RHSA-2014:0702: mariadb security update (Moderate) |
| oval:com.redhat.rhsa:def:20140687 |
false |
patch |
[RHSA-2014:0687], [CVE-2014-3467], [CVE-2014-3468], [CVE-2014-3469] |
RHSA-2014:0687: libtasn1 security update (Moderate) |
| oval:com.redhat.rhsa:def:20140686 |
false |
patch |
[RHSA-2014:0686], [CVE-2013-4286], [CVE-2013-4322], [CVE-2014-0186] |
RHSA-2014:0686: tomcat security update (Important) |
| oval:com.redhat.rhsa:def:20140685 |
false |
patch |
[RHSA-2014:0685], [CVE-2014-0429], [CVE-2014-0446], [CVE-2014-0451], [CVE-2014-0452], [CVE-2014-0453], [CVE-2014-0456], [CVE-2014-0457], [CVE-2014-0458], [CVE-2014-0460], [CVE-2014-0461], [CVE-2014-1876], [CVE-2014-2397], [CVE-2014-2398], [CVE-2014-2403], [CVE-2014-2412], [CVE-2014-2414], [CVE-2014-2421], [CVE-2014-2423], [CVE-2014-2427] |
RHSA-2014:0685: java-1.6.0-openjdk security update (Important) |
| oval:com.redhat.rhsa:def:20140684 |
false |
patch |
[RHSA-2014:0684], [CVE-2014-3465], [CVE-2014-3466] |
RHSA-2014:0684: gnutls security update (Important) |
| oval:com.redhat.rhsa:def:20140680 |
false |
patch |
[RHSA-2014:0680], [CVE-2014-0224] |
RHSA-2014:0680: openssl098e security update (Important) |
| oval:com.redhat.rhsa:def:20140679 |
false |
patch |
[RHSA-2014:0679], [CVE-2010-5298], [CVE-2014-0195], [CVE-2014-0198], [CVE-2014-0221], [CVE-2014-0224], [CVE-2014-3470] |
RHSA-2014:0679: openssl security update (Important) |
| oval:com.redhat.rhsa:def:20140678 |
false |
patch |
[RHSA-2014:0678], [CVE-2014-0196] |
RHSA-2014:0678: kernel security update (Important) |
| oval:com.redhat.rhsa:def:20140675 |
false |
patch |
[RHSA-2014:0675], [CVE-2014-0429], [CVE-2014-0446], [CVE-2014-0451], [CVE-2014-0452], [CVE-2014-0453], [CVE-2014-0454], [CVE-2014-0455], [CVE-2014-0456], [CVE-2014-0457], [CVE-2014-0458], [CVE-2014-0459], [CVE-2014-0460], [CVE-2014-0461], [CVE-2014-1876], [CVE-2014-2397], [CVE-2014-2398], [CVE-2014-2402], [CVE-2014-2403], [CVE-2014-2412], [CVE-2014-2413], [CVE-2014-2414], [CVE-2014-2421], [CVE-2014-2423], [CVE-2014-2427] |
RHSA-2014:0675: java-1.7.0-openjdk security update (Critical) |
| oval:com.redhat.rhea:def:20180705 |
false |
patch |
[RHEA-2018:0705], [CVE-2017-11108], [CVE-2017-11541], [CVE-2017-11542], [CVE-2017-11543], [CVE-2017-11544], [CVE-2017-12893], [CVE-2017-12894], [CVE-2017-12895], [CVE-2017-12896], [CVE-2017-12897], [CVE-2017-12898], [CVE-2017-12899], [CVE-2017-12900], [CVE-2017-12901], [CVE-2017-12902], [CVE-2017-12985], [CVE-2017-12986], [CVE-2017-12987], [CVE-2017-12988], [CVE-2017-12989], [CVE-2017-12990], [CVE-2017-12991], [CVE-2017-12992], [CVE-2017-12993], [CVE-2017-12994], [CVE-2017-12995], [CVE-2017-12996], [CVE-2017-12997], [CVE-2017-12998], [CVE-2017-12999], [CVE-2017-13000], [CVE-2017-13001], [CVE-2017-13002], [CVE-2017-13003], [CVE-2017-13004], [CVE-2017-13005], [CVE-2017-13006], [CVE-2017-13007], [CVE-2017-13008], [CVE-2017-13009], [CVE-2017-13010], [CVE-2017-13011], [CVE-2017-13012], [CVE-2017-13013], [CVE-2017-13014], [CVE-2017-13015], [CVE-2017-13016], [CVE-2017-13017], [CVE-2017-13018], [CVE-2017-13019], [CVE-2017-13020], [CVE-2017-13021], [CVE-2017-13022], [CVE-2017-13023], [CVE-2017-13024], [CVE-2017-13025], [CVE-2017-13026], [CVE-2017-13027], [CVE-2017-13028], [CVE-2017-13029], [CVE-2017-13030], [CVE-2017-13031], [CVE-2017-13032], [CVE-2017-13033], [CVE-2017-13034], [CVE-2017-13035], [CVE-2017-13036], [CVE-2017-13037], [CVE-2017-13038], [CVE-2017-13039], [CVE-2017-13040], [CVE-2017-13041], [CVE-2017-13042], [CVE-2017-13043], [CVE-2017-13044], [CVE-2017-13045], [CVE-2017-13046], [CVE-2017-13047], [CVE-2017-13048], [CVE-2017-13049], [CVE-2017-13050], [CVE-2017-13051], [CVE-2017-13052], [CVE-2017-13053], [CVE-2017-13054], [CVE-2017-13055], [CVE-2017-13687], [CVE-2017-13688], [CVE-2017-13689], [CVE-2017-13690], [CVE-2017-13725] |
RHEA-2018:0705: tcpdump bug fix and enhancement update (None) |
| oval:com.redhat.rhea:def:20152126 |
false |
patch |
[RHEA-2015:2126], [CVE-2014-9447] |
RHEA-2015:2126: elfutils bug fix and enhancement update (None) |
| oval:com.redhat.rhea:def:20150369 |
false |
patch |
[RHEA-2015:0369], [CVE-2014-0172] |
RHEA-2015:0369: elfutils bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20171991 |
false |
patch |
[RHBA-2017:1991], [CVE-2018-14622] |
RHBA-2017:1991: libtirpc bug fix update (None) |
| oval:com.redhat.rhba:def:20162206 |
false |
patch |
[RHBA-2016:2206], [CVE-2016-10727] |
RHBA-2016:2206: evolution-data-server bug fix update (None) |
| oval:com.redhat.rhba:def:20152457 |
false |
patch |
[RHBA-2015:2457], [CVE-2015-5234], [CVE-2015-5235] |
RHBA-2015:2457: icedtea-web bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20152424 |
false |
patch |
[RHBA-2015:2424], [CVE-2014-9680] |
RHBA-2015:2424: sudo bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20152395 |
false |
patch |
[RHBA-2015:2395], [CVE-2014-3585] |
RHBA-2015:2395: redhat-upgrade-tool bug fix update (None) |
| oval:com.redhat.rhba:def:20152287 |
false |
patch |
[RHBA-2015:2287], [CVE-2016-4445] |
RHBA-2015:2287: setroubleshoot bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20152258 |
false |
patch |
[RHBA-2015:2258], [CVE-2015-7540] |
RHBA-2015:2258: samba bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20152197 |
false |
patch |
[RHBA-2015:2197], [CVE-2015-1774] |
RHBA-2015:2197: libreoffice bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20152161 |
false |
patch |
[RHBA-2015:2161], [CVE-2014-3215] |
RHBA-2015:2161: libcap-ng bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20152142 |
false |
patch |
[RHBA-2015:2142], [CVE-2015-2327] |
RHBA-2015:2142: pcre bug fix update (None) |
| oval:com.redhat.rhba:def:20152116 |
false |
patch |
[RHBA-2015:2116], [CVE-2016-3190] |
RHBA-2015:2116: GTK+ bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20152092 |
false |
patch |
[RHBA-2015:2092], [CVE-2016-7796] |
RHBA-2015:2092: systemd bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20151554 |
false |
patch |
[RHBA-2015:1554], [CVE-2015-3230] |
RHBA-2015:1554: 389-ds-base bug fix update (None) |
| oval:com.redhat.rhba:def:20150965 |
false |
patch |
[RHBA-2015:0965], [CVE-2014-1569] |
RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20150584 |
false |
patch |
[RHBA-2015:0584], [CVE-2014-5118] |
RHBA-2015:0584: tboot bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20150441 |
false |
patch |
[RHBA-2015:0441], [CVE-2014-0249] |
RHBA-2015:0441: sssd bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20150386 |
false |
patch |
[RHBA-2015:0386], [CVE-2014-2856], [CVE-2014-3537], [CVE-2014-5029], [CVE-2014-5030], [CVE-2014-5031] |
RHBA-2015:0386: cups bug fix and enhancement update (None) |
| oval:com.redhat.rhba:def:20150364 |
false |
patch |
[RHBA-2015:0364], [CVE-2014-1545] |
RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (None) |